Fusion of deep learning based cyberattack detection and classification model for intelligent systems
出版年份 2022 全文链接
标题
Fusion of deep learning based cyberattack detection and classification model for intelligent systems
作者
关键词
-
出版物
Cluster Computing-The Journal of Networks Software Tools and Applications
Volume -, Issue -, Pages -
出版商
Springer Science and Business Media LLC
发表日期
2022-08-03
DOI
10.1007/s10586-022-03686-0
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey
- (2022) Hashim Albasheer et al. SENSORS
- A deep learning- based frechet and dirichlet model for intrusion detection in IWSN
- (2021) Omar A. Alzubi JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
- An Efficient DenseNet-Based Deep Learning Model for Malware Detection
- (2021) Jeyaprakash Hemalatha et al. Entropy
- Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics
- (2021) Nighat Usman et al. Future Generation Computer Systems-The International Journal of eScience
- Intelligent malware detection based on graph convolutional network
- (2021) Shanxi Li et al. JOURNAL OF SUPERCOMPUTING
- Prediction of seasonal maximum wave height for unevenly spaced time series by Black Widow Optimization algorithm
- (2021) Sargol Memar et al. MARINE STRUCTURES
- Stock Price Forecast Based on CNN-BiLSTM-ECA Model
- (2021) Yu Chen et al. Scientific Programming
- An efficient malware detection approach with feature weighting based on Harris Hawks optimization
- (2021) Omar A. Alzubi et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Short-Term Traffic Speed Prediction Method for Urban Road Sections Based on Wavelet Transform and Gated Recurrent Unit
- (2020) Xin Fu et al. MATHEMATICAL PROBLEMS IN ENGINEERING
- An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks
- (2020) Prabhat Kumar et al. COMPUTER COMMUNICATIONS
- CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
- (2020) Muhammad Shafiq et al. IEEE Internet of Things Journal
- Black Widow Optimization Algorithm: A novel meta-heuristic approach for solving engineering optimization problems
- (2019) Vahideh Hayyolalam et al. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
- Formal verification approaches and standards in the cloud computing: A comprehensive and systematic review
- (2018) Alireza Souri et al. COMPUTER STANDARDS & INTERFACES
- A state-of-the-art survey of malware detection approaches using data mining techniques
- (2018) Alireza Souri et al. Human-centric Computing and Information Sciences
- DeepAM: a heterogeneous deep learning framework for intelligent malware detection
- (2017) Yanfang Ye et al. KNOWLEDGE AND INFORMATION SYSTEMS
- A Weighted Voting Classifier Based on Differential Evolution
- (2014) Yong Zhang et al. Abstract and Applied Analysis
- A survey of emerging threats in cybersecurity
- (2014) Julian Jang-Jaccard et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
Become a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get StartedAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started