[图书][B] Cyber threat intelligence: challenges and opportunities

M Conti, T Dargahi, A Dehghantanha - 2018 - Springer
The ever increasing number of cyber attacks requires the cyber security and forensic
specialists to detect, analyze and defend against the cyber threats in almost real-time. In …

Stacked one-class broad learning system for intrusion detection in industry 4.0

K Yang, Y Shi, Z Yu, Q Yang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the vigorous development of Industry 4.0, industrial Big Data has turned into the core
element of the Industrial Internet of Things. As one of the most fundamental and …

Machine learning for detecting anomalies and intrusions in communication networks

Z Li, ALG Rios, L Trajković - IEEE Journal on Selected Areas in …, 2021 - ieeexplore.ieee.org
Cyber attacks are becoming more sophisticated and, hence, more difficult to detect. Using
efficient and effective machine learning techniques to detect network anomalies and …

Detection of denial of service attacks in communication networks

ALG Rios, Z Li, K Bekshentayeva… - 2020 IEEE international …, 2020 - ieeexplore.ieee.org
Detection of evolving cyber attacks is a challenging task for conventional network intrusion
detection techniques. Various supervised machine learning algorithms have been …

Evaluation of support vector machine kernels for detecting network anomalies

P Batta, M Singh, Z Li, Q Ding… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is used to exchange routing information across the Internet.
BGP anomalies severely affect network performance and, hence, algorithms for anomaly …

A deep learning approach to radio signal denoising

E Almazrouei, G Gianini, N Almoosa… - 2019 IEEE Wireless …, 2019 - ieeexplore.ieee.org
This paper proposes a Deep Learning approach to radio signal de-noising. This approach is
data-driven, thus it allows de-noising signals, corresponding to distinct protocols, without …

Selection of effective features for BGP anomaly detection

T Arai, K Nakano, B Chakraborty - 2019 IEEE 10th International …, 2019 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) is the internet's default protocol for managing connectivity
between Autonomous Systems (AS). Anomalies happen to occur time to time and it is a …

BGP anomalies classification using features based on as relationship graphs

TB Paiva, Y Siqueira, DM Batista… - 2021 IEEE Latin …, 2021 - ieeexplore.ieee.org
Ensuring the correct behavior of the Border Gateway Protocol (BGP) is essential for keeping
a good quality of service on the internet. When an anomalous behavior is detected …

Detection of denial of service attacks using echo state networks

K Bekshentayeva, L Trajković - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are major threats
to cybersecurity in communication networks. These cyber attacks are evolving and …

Aeration strategy based on numerical modelling and the response mechanism of microbial communities under various operating conditions

N Xiao, B Wang, JJ Huang, Z Huang, L Shi - Journal of Environmental …, 2022 - Elsevier
Aeration system is the main energy consumer in a wastewater treatment process. In this
paper, the Naive Bayes classification (NBC) algorithm and response surface method (RSM) …