Over the last five years there has been an increase in the frequency and diversity of network attacks. This holds true, as more and more organizations admit compromises on a daily …
Clustering algorithms have emerged as an alternative powerful meta-learning tool to accurately analyze the massive volume of data generated by modern applications. In …
T Shapira, Y Shavitt - IEEE Transactions on Network and …, 2021 - ieeexplore.ieee.org
Identifying the type of a network flow or a specific application has many advantages, such as, traffic engineering, or to detect and prevent application or application types that violate …
Traffic classification groups similar or related traffic data, which is one main stream technique of data fusion in the field of network management and security. With the rapid …
In an era of growing data complexity and volume and the advent of big data, feature selection has a key role to play in helping reduce high-dimensionality in machine learning …
K Lin, X Xu, H Gao - Computer Networks, 2021 - Elsevier
Abstract In the Industrial Internet of Things (IIoT) in the 5G era, the growth of smart devices will generate a large amount of data traffic, bringing a huge challenge of network traffic …
T Shapira, Y Shavitt - IEEE INFOCOM 2019-IEEE conference …, 2019 - ieeexplore.ieee.org
Identifying the type of a network flow or a specific application has many advantages, but become harder in recent years due to the use of encryption, eg, by VPN and Tor. Current …
L Haghnegahdar, Y Wang - Neural computing and applications, 2020 - Springer
The smart grid is a revolutionary, intelligent, next-generation power system. Due to its cyber infrastructure nature, it must be able to accurately and detect potential cyber-attacks and …
Internet of Things (IoT) networks have become an increasingly attractive target of cyberattacks. Powerful Machine Learning (ML) models have recently been adopted to …