Transfer learning based attack detection for wireless communication networks

S Li, J Pang, Q Wu, N Yao… - … and Computation: Practice …, 2021 - Wiley Online Library
Wireless communication network attack detection is important in the field of wireless
communication network data mining. Transfer learning is a powerful tool to solve the …

[PDF][PDF] Enhancing Cloud Security: An Optimization-based Deep Learning Model for Detecting Denial-of-Service Attacks

L Alhazmi - International Journal of Advanced Computer Science …, 2023 - academia.edu
DoS (Denial-of-Service) attacks pose an imminent threat to cloud services and could cause
significant financial and intellectual damage to cloud service providers and their customers …

[PDF][PDF] Intelligent Systems with Applications

MU Hossain, MA Rahman, MM Islam, A Akhter… - 2022 - researchgate.net
abstract Recently, the number of road accidents has been increased worldwide due to the
distraction of the drivers. This rapid road crush often leads to injuries, loss of properties …

Hypervisor Based Intrusion Detection Using Enhanced Radial Basis Neural Network on Cloud Environment

NSK Anumukonda, RK Yadav… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Cloud computing has grown to be a significant component of the IT sector in the current
digital economy. Despite its advantages such as reduced capital costs and operational …

Optimized Deep Ensemble Technique for Malicious Behavior Classification in Cloud

VM Mohan, S Singh, PP Jadhav - Cybernetics and Systems, 2023 - Taylor & Francis
We must find novel approaches to improve intrusion detection systems in cloud computing
as network traffic increases and attacks become more pervasive and complex. This study …

Automated Denial of Service Detection Using Moth Flame Optimization With Machine Learning in Cloud Environment

A Thillaivanan, SR Wategaonkar… - … and Systems for …, 2023 - ieeexplore.ieee.org
Denial of Service (DoS) attack detection refers to preventing and detecting malicious
attempts to make network resources or services unavailable to its intended users. DoS …

A novel deep learning based intrusion detection system for the IoT-Cloud platform with blockchain and data encryption mechanisms

KK Ponniah, B Retnaswamy - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
Abstract The Internet of Things (IoT) integrated Cloud (IoT-Cloud) has gotten much attention
in the past decade. This technology's rapid growth makes it even more critical. As a result, it …

[PDF][PDF] A Vulnerability based Attack Detection and Mitigation in Cloud SaaS Framework.

R Saisindhutheja, GK Shyam, S Makka - Journal of Engineering Science & …, 2022 - jestr.org
Cloud computing provides various cost-effective on-demand services to the user and so it is
rising up as a real trend in the IT service model. More particularly, the security is the ultimate …

[PDF][PDF] Computer and Information Sciences

N Talpur, SJ Abdulkadir, EAP Akhir, MH Hasan… - 2023 - researchgate.net
abstract The novel Deep Neuro-Fuzzy System (DNFS) has attracted significant attention
from researchers due to the model's adaptability and rule-based structure. The model has …

DDOS SALDIRILARININ MAKİNE ÖĞRENİMİ ALGORİTMALARIYLA TESPİTİ

S Asarkaya, O Kaynar, İ Yelmen, F Yıldırım… - Tasarım Mimarlık ve …, 2021 - dergipark.org.tr
DDoS saldırıları, network saldırıları içerisinde en sık rastlanan saldırı türüdür. Bu saldırılar
sonucunda bireyler ve şirketler para, itibar ve zaman kaybı gibi sorunlarla uğraşmak …