AD Eunice, Q Gao, MY Zhu, Z Chen… - 2021 IEEE 3rd …, 2021 - ieeexplore.ieee.org
To improve the accuracy and real-time performance of anomaly detection models in complex network environments, a network anomaly detection model based on random forest …
M Wazid, AK Das - Wireless Personal Communications, 2016 - Springer
Sensor nodes in a wireless sensor network (WSN) may be lost due to enervation or malicious attacks by an adversary. WSNs deployed for several applications including …
Network anomaly detection is an important and dynamic research area. Many network intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …
M Zhu, K Ye, CZ Xu - Cloud Computing–CLOUD 2018: 11th International …, 2018 - Springer
Network anomaly detection is the process of determining when network behavior has deviated from the normal behavior. The detection of abnormal events in large dynamic …
M Pradhan, SK Pradhan, SK Sahu - International Journal of Engineering …, 2012 - Citeseer
In this research, anomaly detection using neural network is introduced. This research aims to experiment with user behaviour as parameters in anomaly intrusion detection using a …
A Gupta, LS Sharma - Information Security Journal: A Global …, 2020 - Taylor & Francis
Intrusion detection systems are one of the necessities of networks to identify the problem of network attacks. Organizations striving to protect their data from intruders are often …
Cyber-attacks was organized in a simple and random way in the past. However attacks are carried out systematically and long term nowadays. In addition, the high calculation volume …
B Li, S Zhang, K Li - Concurrency and computation: practice …, 2017 - Wiley Online Library
Anomaly detection plays a crucial part in identifying unforeseen attacks for network and information security. However, the accuracy of existing network anomaly detection …
MK Islam, P Hridi, MS Hossain… - 2020 30th international …, 2020 - ieeexplore.ieee.org
Anomaly detection systems are significant in recognizing intruders or suspicious activities by detecting unseen and unknown attacks. In this paper, we have worked on a benchmark …