A vital field of research is network anomaly detection. Several research papers in this topic have previously been published, using various methodologies or algorithms. The …
FA Mazarbhuiya, M Shenify - Applied Sciences, 2023 - mdpi.com
Finding real-time anomalies in any network system is recognized as one of the most challenging studies in the field of information security. It has so many applications, such as …
FA Mazarbhuiya, M Shenify - Applied Sciences, 2023 - mdpi.com
The challenging issues of computer networks and databases are not only the intrusion detection but also the reduction of false positives and increase of detection rate. In any …
FA Mazarbhuiya - ICIC Express Letters, Forthcoming, 2022 - papers.ssrn.com
IoT technology has significantly contributed in the improvement of quality of life by facilitating various real-life smart applications. IoT consists of large number of interconnecting digital …
M Shenify, FA Mazarbhuiya, AS Wungreiphi - Applied Sciences, 2024 - mdpi.com
There are many applications of anomaly detection in the Internet of Things domain. IoT technology consists of a large number of interconnecting digital devices not only generating …
H Pratama, FF Lubis… - … journaL Information System, 2024 - jom.fti.budiluhur.ac.id
This research aims to determine the direction of research in the analysis of mixed data types. The world is currently filled with increasingly diverse data, especially in terms of data types …
Y Sugianela, T Ahmad - ICIC Express Letters, Part B: Applications, 2022 - icicelb.org
The era of big data, which is coming with a complicated and big scope of data, has caused the increase of the possibility of network attack. One of those possible attacks is DDoS or …
FAA Mazarbhuiya, MA Shenify, AS Wungreiphi - 2023 - preprints.org
There are many applications of anomaly detection in IoT domain. IoT technology consists of large number of interconnecting digital devices not only generating huge data continuously …
Finding anomalies in the real-time system is recognized as one of most challenging study in information security. It has so many applications like IoT, and Stock-Market. In any IoT …