M Li, D Han, X Yin, H Liu, D Li - Security and Communication …, 2021 - hindawi.com
With the rapid development and widespread application of cloud computing, cloud computing open networks and service sharing scenarios have become more complex and …
RH Hwang, MC Peng, CW Huang, PC Lin… - IEEE …, 2020 - ieeexplore.ieee.org
Various attacks have emerged as the major threats to the success of a connected world like the Internet of Things (IoT), in which billions of devices interact with each other to facilitate …
K Lin, X Xu, F Xiao - Computer Networks, 2022 - Elsevier
Network malicious traffic detection is one of the essential tasks of computer networks, which has become an obstacle to network development as networks are expanding in size and …
J Wang, H Jin, J Chen, J Tan, K Zhong - Information Sciences, 2022 - Elsevier
IoMT technology has many advantages in healthcare system, such as optimizing the medical service model, improving the efficiency of hospital operation and management, and …
M Abdel-Basset, V Chang, H Hawash… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
The extensive propagation of industrial Internet of Things (IIoT) technologies has encouraged intruders to initiate a variety of attacks that need to be identified to maintain the …
BA NG, S Selvakumar - Future Generation Computer Systems, 2020 - Elsevier
The proliferation of Internet of things (IoT) devices has lured hackers to launch attacks. Therefore, anomalies in IoT traffic must be detected to mitigate these attacks and protect …
JR Rose, M Swann, G Bendiab… - 2021 IEEE 7th …, 2021 - ieeexplore.ieee.org
The rapid increase in the use of IoT devices brings many benefits to the digital society, ranging from improved efficiency to higher productivity. However, the limited resources and …
In order to study the application of deep learning in the design of network traffic anomaly detection device, aiming at two common problems in the field of network anomaly detection …
DDoS (Distributed Denial of Service) attacks have become a pressing threat to the security and integrity of computer networks and information systems, which are indispensable …