Deep echo state networks for detecting internet worm and ransomware attacks

T Sharma, K Patni, Z Li… - 2023 IEEE international …, 2023 - ieeexplore.ieee.org
With the advancement of technology over the last decade, there has been a rapid increase
in the number and types of malware attacks such as worms whose primary function is to self …

Case Study: Understanding Internet Anomalies

HK Takhar, LF Oliveira… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Machine learning algorithms have been applied to address a variety of engineering and
scientific problems. The Internet has historically been prone to failures and attacks that …

[PDF][PDF] Machine learning for classifying anomalies and intrusions in communication networks

Z Li - 2022 - summit.sfu.ca
Cyber attacks are becoming more sophisticated and, hence, more difficult to detect. Using
efficient and effective machine learning techniques to detect network anomalies and …

[PDF][PDF] Lightweight Intrusion Detection Using Reservoir Computing

J Deng, W Shen, Y Feng, G Lu, G Shen, L Cui, S Lyu - cdn.techscience.cn
The blockchain-empowered Internet of Vehicles (IoV) enables various services and
achieves data security and privacy, significantly advancing modern vehicle systems …