163   Artículos

 
en línea
Max Schrötter, Andreas Niemann and Bettina Schnor    
Over the last few years, a plethora of papers presenting machine-learning-based approaches for intrusion detection have been published. However, the majority of those papers do not compare their results with a proper baseline of a signature-based intrusi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari    
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay    
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis    
The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individual... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Qiang Liu, Rui Han and Yang Li    
Idle bandwidth resources are inefficiently distributed among different users. Currently, the utilization of user bandwidth resources mostly relies on traditional IP networks, implementing relevant techniques at the application layer, which creates scalab... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jota Samper and Weichun Liao    
This article challenges the narrow definition of informal settlements as solely lacking a formal framework, which overlooks the dynamic city-making and urban design processes within these areas. Communities? self-building processes and areas? constant gr... ver más
Revista: Urban Science    Formato: Electrónico

 
en línea
Surasit Songma, Theera Sathuphan and Thanakorn Pamutha    
This article examines intrusion detection systems in depth using the CSE-CIC-IDS-2018 dataset. The investigation is divided into three stages: to begin, data cleaning, exploratory data analysis, and data normalization procedures (min-max and Z-score) are... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Subhan Ullah, Zahid Mahmood, Nabeel Ali, Tahir Ahmad and Attaullah Buriro    
The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of interconnected systems, which has also increased the vulnerability of IoT devices to security threats such as distributed denial-of-service (DDoS) attacks. In this p... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Faeiz Alserhani and Alaa Aljared    
With the increased sophistication of cyber-attacks, there is a greater demand for effective network intrusion detection systems (NIDS) to protect against various threats. Traditional NIDS are incapable of detecting modern and sophisticated attacks due to... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mohammed Zakariah and Abdulaziz S. Almazyad    
The prevalence of Internet of Things (IoT) technologies is on the rise, making the identification of anomalies in IoT systems crucial for ensuring their security and reliability. However, many existing approaches rely on static classifiers and immutable ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 10     Siguiente »