[PDF][PDF] 网络入侵检测技术综述

蹇诗婕, 卢志刚, 杜丹, 姜波, 刘宝旭 - 信息安全学报, 2020 - jcs.iie.ac.cn
摘要随着互联网时代的发展, 内部威胁, 零日漏洞和DoS 攻击等攻击行为日益增加,
网络安全变得越来越重要, 入侵检测已成为网络攻击检测的一种重要手段. 随着机器学习算法的 …

BEST: Battery, Efficiency and Stability based trust mechanism using enhanced AODV for mitigation of Blackhole attack and its variants in MANETs.

N Khanna, M Sachdeva - Adhoc & Sensor Wireless …, 2020 - search.ebscohost.com
This paper attempts to resolve the issue of mitigation of blackhole attack and its variants by
presenting a battery, efficiency and stability based trust mechanism that performs both …

Role of Ubiquitous Computing and Mobile WSN Technologies and Implementation

G Suciu, I Hussain, G Petrescu - 2020 International Conference …, 2020 - ieeexplore.ieee.org
Computing capabilities such as real time data, unlimited connection, data from sensors,
environmental analysis, automated decisions (machine learning) are demanded by many …

The 16th International Scientific Conference eLearning and Software for Education Bucharest, April 23-24, 2020

G SUCIU, S ENE, I HUSSAIN, C ISTRATE - ceeol.com
The retail industry has come to a consensus on the use of new ICT technologies, such as
Cloud Computing, Big Data, IoT and Artificial Intelligence (AI), to create innovative …

[PDF][PDF] An intrusion detection system for SDN-Based tactical networks: a machine learning approach

SG Zwane - 2020 - mobileeservices.org
Network security is increasingly becoming a critical and continuous issue due to ongoing
advancements in Information and Communication Technologies (ICT) and the concomitant …

AN INTRODUCTION TO UBIQUITOUS COMPUTING IN THE MILITARY NETWORK.

G Suciu, S Ene, I Hussain… - eLearning & Software for …, 2020 - search.ebscohost.com
Ubiquitous computing analysis represents an emerging area that implements
communication technologies in day-to-day life actions. Ubiquitous computing changes the …