Network Intrusion Detection Model Based on Improved BYOL Self‐Supervised Learning

Z Wang, Z Li, J Wang, D Li - Security and Communication …, 2021 - Wiley Online Library
The combination of deep learning and intrusion detection has become a hot topic in today's
network security. In the face of massive, high‐dimensional network traffic with uneven …

Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks

S Rajasoundaran, SVNS Kumar, M Selvi… - Wireless …, 2021 - Springer
Abstract Wireless Sensor Networks (WSNs) contain multiple wireless sensor nodes
deployed around the geographical locations. The WSN used in military applications need …

A lightweight intelligent intrusion detection model for wireless sensor networks

JS Pan, F Fan, SC Chu, HQ Zhao… - Security and …, 2021 - Wiley Online Library
The wide application of wireless sensor networks (WSN) brings challenges to the
maintenance of their security, integrity, and confidentiality. As an important active defense …

[Retracted] Application of Fuzzy Decision Tree Algorithm Based on Mobile Computing in Sports Fitness Member Management

Z Gu, C He - Wireless Communications and Mobile Computing, 2021 - Wiley Online Library
After the reform and the opening, the economy of our country has developed rapidly, and the
living conditions of the people have become better and better. As a result, they have a lot of …

[Retracted] Sports Enterprise Marketing and Financial Risk Management Based on Decision Tree and Data Mining

Y Zhao - Journal of Healthcare Engineering, 2021 - Wiley Online Library
With the development of modern economy, traditional sports industry enterprises have also
been further developed in the financial business. How to ensure information security and …

[Retracted] Detecting Temporal Attacks: An Intrusion Detection System for Train Communication Ethernet Based on Dynamic Temporal Convolutional Network

C Yue, L Wang, D Wang, R Duo… - Security and …, 2021 - Wiley Online Library
The train communication Ethernet (TCE) of modern intelligent trains is under an ever‐
increasing threat of serious network attacks. Denial of service (DoS) and man in the middle …

An effective fuzzy clustering algorithm with outlier identification feature

A Gosain, S Dahiya - Journal of Intelligent & Fuzzy Systems, 2021 - content.iospress.com
Abstract DKIFCM (Density Based Kernelized Intuitionistic Fuzzy C Means) is the new
proposed clustering algorithm that is based on outlier identification, kernel functions, and …

Energy efficient clustering routing protocol and ACO algorithm in WSN

S Subramani, M Selvi, SVNS Kumar… - Advances in Computing …, 2021 - Springer
Abstract In a Wireless Sensor Network (WSN), there are some energy constrained tiny
sensor devices called nodes. These nodes can sense the environment, capture the data and …

[Retracted] Intrusion Detection Method Based on Adaptive Clonal Genetic Algorithm and Backpropagation Neural Network

Y Lu, M Liu, J Zhou, Z Li - Security and Communication …, 2021 - Wiley Online Library
Intrusion Detection System (IDS) is an important part of ensuring network security. When the
system faces network attacks, it can identify the source of threats in a timely and accurate …

Intrusion detection system based on rf-svm model optimized with feature selection

D Xuan, H Hu, B Wang, B Liu - 2021 International Conference …, 2021 - ieeexplore.ieee.org
With the emergence of increasingly growing network threats, network security becomes a
major issue which causes huge existing and potential losses, such as WannaCry. Various …