DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks

D Moon, H Im, I Kim, JH Park - The Journal of supercomputing, 2017 - Springer
Due to rapid growth of communications and networks, a cyber-attack with malicious codes
has been coming as a new paradigm in information security area since last few years. In …

Anomaly detection model based on data stream clustering

C Yin, S Zhang, Z Yin, J Wang - Cluster Computing, 2019 - Springer
Intrusion detection provides important protection for network security and anomaly detection
as a type of intrusion detection, which can recognize the pattern of normal behaviors and …

Improved clustering algorithm based on high-speed network data stream

C Yin, L Xia, S Zhang, R Sun, J Wang - Soft Computing, 2018 - Springer
With the continuous development of network technology, the attack has become the biggest
threat to the stable operation of the network. Intrusion detection technology is a proactive …

Persuasive factors and weakness for security vulnerabilities in BIG IOT data in healthcare solution

MS Gaur, S Kumar, NK Gaur… - Journal of Physics …, 2021 - iopscience.iop.org
In the present scenario, public health is a global challenge. In view of COVID-19 pandemic,
interventions of emerging technologies hasbeen highly increased and post-pandemica big …

A secure IoT-fog enabled smart decision making system using machine learning for intensive care unit

A Banerjee, BK Mohanta, SS Panda… - 2020 International …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a connection of smart things and act quickly in any environment.
Fog computing based framework has been used to be integrated with IoT to enable real-time …

Exploratory Data Analysis and Customer Churn Prediction for the Telecommunication Industry

KD Singh, PD Singh, A Bansal, G Kaur… - … on Advances in …, 2023 - ieeexplore.ieee.org
The telecommunications business is one of the key industries with a higher risk of revenue
loss owing to client turnover and environmental impact. Thus, efficient and effective churn …

Data-filtering system to avoid total data distortion in IoT networking

DY Kim, YS Jeong, S Kim - Symmetry, 2017 - mdpi.com
In the Internet of Things (IoT) networking, numerous objects are connected to a network.
They sense events and deliver the sensed information to the cloud. A lot of data is generated …

Education 4.0: Exploring the potential of disruptive technologies in transforming learning

KD Singh, P Singh, G Kaur, V Khullar… - 2023 international …, 2023 - ieeexplore.ieee.org
Education 4.0 refers to the integration of digital technologies into the education system,
resulting in a more flexible and student-centered approach to teaching and learning …

Strategies for data stream mining method applied in anomaly detection

R Sun, S Zhang, C Yin, J Wang, S Min - Cluster Computing, 2019 - Springer
Anomaly detection, which is a method of intrusion detection, detects anomaly behaviors and
protects network security. Data mining technology has been integrated to improve the …

Security risk analysis and design reengineering for smart healthcare

M Sharma Gaur, NK Gaur, S Kumar… - Data, Engineering and …, 2022 - Springer
In view of evolving the smart cities, emerging technologies interventions and the adoption of
embedded sensor devices increasing rapidly in every domain. From the smart home to the …