5   Artículos

 
en línea
Sikha S. Bagui, Dustin Mink, Subhash C. Bagui, Michael Plain, Jadarius Hill and Marshall Elam    
There has been a great deal of research in the area of using graph engines and graph databases to model network traffic and network attacks, but the novelty of this research lies in visually or graphically representing the Reconnaissance Tactic (TA0043) ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Sikha Bagui, Dustin Mink, Subhash Bagui, Sakthivel Subramaniam and Daniel Wallace    
This study, focusing on identifying rare attacks in imbalanced network intrusion datasets, explored the effect of using different ratios of oversampled to undersampled data for binary classification. Two designs were compared: random undersampling before... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Sikha S. Bagui, Dustin Mink, Subhash C. Bagui and Sakthivel Subramaniam    
Machine Learning is widely used in cybersecurity for detecting network intrusions. Though network attacks are increasing steadily, the percentage of such attacks to actual network traffic is significantly less. And here lies the problem in training Machi... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Dustin M. Mink, Jeffrey McDonald, Sikha Bagui, William B. Glisson, Jordan Shropshire, Ryan Benton and Samuel Russ    
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing. This work lays out a da... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »