F Jiang, Y Fu, BB Gupta, Y Liang, S Rho… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Deep learning methods, eg, convolutional neural networks (CNNs) and Recurrent Neural Networks (RNNs), have achieved great success in image processing and natural language …
Cloud computing gained much popularity in the recent past due to its many internet-based services related to data, application, operating system, and eliminating the need for central …
LO Anyanwu, J Keengwe… - … Conference on Information …, 2010 - ieeexplore.ieee.org
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all …
In this paper we report a novel application-basedmodel as a suitable alternative for the classification and identification ofattacks on a computer network, and thus guarantee its …
AH Yaacob, NM Ahmad, NN Ahmad… - International Journal of …, 2012 - academia.edu
The proliferation of web application and the pervasiveness of mobile technology make web- based attacks even more attractive and even easier to launch. Web Application Firewall …
Load shedding plays a key part in the avoidance of the power system outage. The frequency and voltage fluidity leads to the spread of a power system into sub-systems and leads to the …
Cloud computing gained much popularity in the recent past due to its many internet-based services related to data, application, operating system, and eliminating the need for central …