Attributed networks, in which network connectivity and node attributes are available, have been increasingly used to model real-world information systems, such as social media and e …
Graph-based anomaly detection (GBAD) approaches are among the most popular techniques used to analyze connectivity patterns in communication networks and identify …
The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …
M Nawir, A Amir, N Yaakob, OB Lynn - Bulletin of Electrical Engineering …, 2019 - beei.org
Network anomaly detection system enables to monitor computer network that behaves differently from the network protocol and it is many implemented in various domains. Yet, the …
N Moustafa, M Keshk, KKR Choo, T Lynar… - Future Generation …, 2021 - Elsevier
There are various data management and security tools deployed at the cloud for storing and analyzing big data generated by the Internet of Things (IoT) and Industrial IoT (IIoT) systems …
N Moustafa, G Creech, J Slay - Progress in Computing, Analytics and …, 2018 - Springer
An intrusion detection system (IDS) plays a significant role in recognising suspicious activities in hosts or networks, even though this system still has the challenge of producing …
H Liu, X Xu, E Li, S Zhang, X Li - IEEE Transactions on Neural …, 2021 - ieeexplore.ieee.org
Identifying anomalies from data has attracted increasing attention in recent years due to its broad range of potential applications. Although many efforts have been made for anomaly …
Anomaly-based intrusion detection systems (IDSs) have been deployed to monitor network activity and to protect systems and the Internet of Things (IoT) devices from attacks (or …
Cyber-attacks was organized in a simple and random way in the past. However attacks are carried out systematically and long term nowadays. In addition, the high calculation volume …