P Liu, Y Chen, X Nie, J Zhu, S Zhang… - 2019 IEEE 30th …, 2019 - ieeexplore.ieee.org
The failures of software service directly affect user experiences and service revenue. Thus operators monitor both service-level KPIs (eg, response time) and machine-level KPIs (eg …
N Duffield, P Haffner, B Krishnamurthy… - IEEE INFOCOM …, 2009 - ieeexplore.ieee.org
Rule-based packet classification is a powerful method for identifying traffic anomalies, with network security as a key application area. While popular systems like Snort are used in …
G Marín, P Casas… - 2019 IEEE Security and …, 2019 - ieeexplore.ieee.org
With the ever-growing occurrence of networking attacks, robust network security systems are essential to prevent and mitigate their harming effects. In recent years, machine learning …
M Thottan, G Liu, C Ji - Algorithms for next generation networks, 2010 - Springer
In recent years, network anomaly detection has become an important area for both commercial interests as well as academic research. Applications of anomaly detection …
M Aibin - Optical Switching and Networking, 2018 - Elsevier
The increased data transfers and rapidly evolving cloud services lead to the inevitable need for the new techniques applied to communication networks, such as AI, machine learning …
The use of unmanned autonomous vehicles is becoming more and more significant in recent years. The fact that the vehicles are unmanned (whether autonomous or not), can …
M Ma, W Lin, D Pan, P Wang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Nowadays, increasing business applications running in the cloud are embracing the microservice architecture. This article presents the challenges and implications of …
S Saheel, A Alvi, AR Ani, T Ahmed, MF Uddin - Journal of Network and …, 2024 - Elsevier
In the post-pandemic world, surveillance cameras play a key aspect when it comes to detecting various kinds of security risks. These can range from burglars entering a premises …
We propose a framework for anomaly detection in communication network logs along with automated extraction of human-readable annotations that explain the decision logic …