Detection and Correction of Abnormal IoT Data from Tea Plantations Based on Deep Learning

R Wang, J Feng, W Zhang, B Liu, T Wang, C Zhang… - Agriculture, 2023 - mdpi.com
This paper proposes a data anomaly detection and correction algorithm for the tea
plantation IoT system based on deep learning, aiming at the multi-cause and multi-feature …

Optimizing flow sampling for network anomaly detection

K Bartos, M Rehak, V Krmicek - 2011 7th international wireless …, 2011 - ieeexplore.ieee.org
Sampling techniques are widely employed in high-speed network traffic monitoring to allow
the analysis of high traffic volumes with limited resources. Sampling has measurable …

TVi: A visual querying system for network monitoring and anomaly detection

A Boschetti, L Salgarelli, C Muelder… - Proceedings of the 8th …, 2011 - dl.acm.org
Monitoring, anomaly detection and forensics are essential tasks that must be carried out
routinely for every computer network. The sheer volume of data generated by conventional …

Fail-Safe mechanism using entropy based misbehavior classification and detection in vehicular Ad Hoc networks

K Sharshembiev, SM Yoo, E Elmahdi… - … on Internet of Things …, 2019 - ieeexplore.ieee.org
A novel approach is proposed to perform real-time detection of node misbehavior using
selective flow sampling and entropy change. Nodes in vehicular ad hoc networks (VANETs) …

Knowledge-independent traffic monitoring: Unsupervised detection of network attacks

P Casas, J Mazel, P Owezarski - IEEE Network, 2012 - ieeexplore.ieee.org
The philosophy of traffic monitoring for detection of network attacks is based on an acquired
knowledge perspective: current techniques detect either the well-known attacks on which …

CoreFlow: Enriching Bro security events using network traffic monitoring data

R Koning, N Buraglio, C de Laat, P Grosso - Future Generation Computer …, 2018 - Elsevier
Attacks against network infrastructures can be detected by Intrusion Detection Systems
(IDS). Still reaction to these events are often limited by the lack of larger contextual …

Sequential defense against random and intentional attacks in complex networks

PY Chen, SM Cheng - Physical Review E, 2015 - APS
Network robustness against attacks is one of the most fundamental researches in network
science as it is closely associated with the reliability and functionality of various networking …

Optimized classification of firewall log data using heterogeneous ensemble techniques

D Sharma, V Wason, P Johri - 2021 International Conference …, 2021 - ieeexplore.ieee.org
In the ever-increasing time of network data exchange, the need for a smarter and automatic
filter for web data packets is a priority. Hence, in this research study, an optimized solution …

Inside packet sampling techniques: exploring modularity to enhance network measurements

JMC Silva, P Carvalho, SR Lima - International Journal of …, 2017 - Wiley Online Library
Traffic sampling is viewed as a prominent strategy contributing to lightweight and scalable
network measurements. Although multiple sampling techniques have been proposed and …

High-speed network traffic measurement method

周爱平, 程光, 郭晓军 - Journal of Software, 2013 - jos.org.cn
高速网络流量测量是目前实施实时准确地监测, 管理和控制网络的基础. 基于网络流量测量的
应用, 将网络流量测量分为抽样方法和数据流方法. 从不同的层次, 将抽样方法分为分组抽样和流 …