• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4624706)   Today's Articles (236)   Subscriber (49418)
For: Bereziński P, Jasiul B, Szpyrka M. An Entropy-Based Network Anomaly Detection Method. Entropy 2015;17:2367-408. [DOI: 10.3390/e17042367] [Citation(s) in RCA: 110] [Impact Index Per Article: 12.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Number Cited by Other Article(s)
1
Provencher Langlois G, Buch J, Darbon J. Efficient First-Order Algorithms for Large-Scale, Non-Smooth Maximum Entropy Models with Application to Wildfire Science. ENTROPY (BASEL, SWITZERLAND) 2024;26:691. [PMID: 39202161 PMCID: PMC11353449 DOI: 10.3390/e26080691] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/08/2024] [Revised: 07/17/2024] [Accepted: 08/06/2024] [Indexed: 09/03/2024]
2
Berlin L, Galyaev A, Lysenko P. Comparison of Information Criteria for Detection of Useful Signals in Noisy Environments. SENSORS (BASEL, SWITZERLAND) 2023;23:2133. [PMID: 36850735 PMCID: PMC9966083 DOI: 10.3390/s23042133] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/16/2023] [Revised: 02/08/2023] [Accepted: 02/12/2023] [Indexed: 06/18/2023]
3
Skorski M. Towards More Efficient Rényi Entropy Estimation. ENTROPY (BASEL, SWITZERLAND) 2023;25:185. [PMID: 36832549 PMCID: PMC9955260 DOI: 10.3390/e25020185] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/03/2022] [Revised: 12/28/2022] [Accepted: 01/08/2023] [Indexed: 06/18/2023]
4
Li M, Zhou H, Qin Y. Two-Stage Intelligent Model for Detecting Malicious DDoS Behavior. SENSORS 2022;22:s22072532. [PMID: 35408146 PMCID: PMC9002896 DOI: 10.3390/s22072532] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/04/2022] [Revised: 03/22/2022] [Accepted: 03/23/2022] [Indexed: 02/01/2023]
5
Heo J, Jeong J. Deceptive Techniques to Hide a Compressed Video Stream for Information Security. SENSORS 2021;21:s21217200. [PMID: 34770505 PMCID: PMC8587723 DOI: 10.3390/s21217200] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/30/2021] [Revised: 10/27/2021] [Accepted: 10/27/2021] [Indexed: 11/16/2022]
6
Yu Q, Kavitha MS, Kurita T. Extensive framework based on novel convolutional and variational autoencoder based on maximization of mutual information for anomaly detection. Neural Comput Appl 2021. [DOI: 10.1007/s00521-021-06017-3] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
7
Zhang J, Li H, Xia B, Skitmore M, Pu S, Deng Q, Jin W. Development of a market-oriented EFQM excellence model for analyzing the implementation of quality management in developing countries. INTERNATIONAL JOURNAL OF CONSTRUCTION MANAGEMENT 2021. [DOI: 10.1080/15623599.2019.1590975] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
8
Paszkiewicz A. Modeling and Analysis of Anomalies in the Network Infrastructure Based on the Potts Model. ENTROPY 2021;23:e23080949. [PMID: 34441089 PMCID: PMC8394986 DOI: 10.3390/e23080949] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/07/2021] [Revised: 07/22/2021] [Accepted: 07/23/2021] [Indexed: 11/16/2022]
9
Benchmarking Analysis of the Accuracy of Classification Methods Related to Entropy. ENTROPY 2021;23:e23070850. [PMID: 34356391 PMCID: PMC8306704 DOI: 10.3390/e23070850] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/28/2021] [Revised: 06/18/2021] [Accepted: 06/24/2021] [Indexed: 11/19/2022]
10
Wang J, Wu X, Li M. Microcanonical and Canonical Ensembles for fMRI Brain Networks in Alzheimer's Disease. ENTROPY (BASEL, SWITZERLAND) 2021;23:216. [PMID: 33579012 PMCID: PMC7916760 DOI: 10.3390/e23020216] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/14/2020] [Revised: 02/03/2021] [Accepted: 02/08/2021] [Indexed: 12/22/2022]
11
Groote JF, Larsen KG. Network Traffic Classification by Program Synthesis. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS 2021. [PMCID: PMC7979161 DOI: 10.1007/978-3-030-72016-2_23] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
12
Baldini G. On the Application of Entropy Measures with Sliding Window for Intrusion Detection in Automotive In-Vehicle Networks. ENTROPY (BASEL, SWITZERLAND) 2020;22:E1044. [PMID: 33286812 PMCID: PMC7597103 DOI: 10.3390/e22091044] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/11/2020] [Revised: 09/07/2020] [Accepted: 09/16/2020] [Indexed: 11/16/2022]
13
Siboni S, Cohen A. Anomaly Detection for Individual Sequences with Applications in Identifying Malicious Tools. ENTROPY 2020;22:e22060649. [PMID: 33286421 PMCID: PMC7517183 DOI: 10.3390/e22060649] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/25/2020] [Revised: 06/03/2020] [Accepted: 06/08/2020] [Indexed: 11/25/2022]
14
Liu W, Mao Y, Ci L, Zhang F. A new approach of user-level intrusion detection with command sequence-to-sequence model. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2020. [DOI: 10.3233/jifs-179659] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
15
Cheng Q, Zhou Y, Feng Y, Liu Z. An unsupervised ensemble framework for node anomaly behavior detection in social network. Soft comput 2020. [DOI: 10.1007/s00500-019-04547-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
16
Tavolato P, Schölnast H, Tavolato-Wötzl C. Analytical modelling of cyber-physical systems: applying kinetic gas theory to anomaly detection in networks. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2020. [DOI: 10.1007/s11416-020-00349-9] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
17
Yu KS, Kim SH, Lim DW, Kim YS. A Multiple Rényi Entropy Based Intrusion Detection System for Connected Vehicles. ENTROPY 2020;22:e22020186. [PMID: 33285960 PMCID: PMC7516617 DOI: 10.3390/e22020186] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/31/2019] [Revised: 01/24/2020] [Accepted: 02/03/2020] [Indexed: 11/17/2022]
18
An Entropy-Based Car Failure Detection Method Based on Data Acquisition Pipeline. ENTROPY 2019;21:e21040426. [PMID: 33267140 PMCID: PMC7514915 DOI: 10.3390/e21040426] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/11/2019] [Revised: 04/18/2019] [Accepted: 04/18/2019] [Indexed: 12/05/2022]
19
Learning Entropy as a Learning-Based Information Concept. ENTROPY 2019;21:e21020166. [PMID: 33266882 PMCID: PMC7514648 DOI: 10.3390/e21020166] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/30/2018] [Revised: 01/28/2019] [Accepted: 02/05/2019] [Indexed: 12/02/2022]
20
Cross-Method-Based Analysis and Classification of Malicious Behavior by API Calls Extraction. APPLIED SCIENCES-BASEL 2019. [DOI: 10.3390/app9020239] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
21
Munk M, Benko L. Using Entropy in Web Usage Data Preprocessing. ENTROPY 2018;20:e20010067. [PMID: 33265164 PMCID: PMC7512266 DOI: 10.3390/e20010067] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/30/2017] [Revised: 01/10/2018] [Accepted: 01/13/2018] [Indexed: 11/16/2022]
22
Entropy-Based Economic Denial of Sustainability Detection. ENTROPY 2017. [DOI: 10.3390/e19120649] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
23
Callegari C, Giordano S, Pagano M. An information-theoretic method for the detection of anomalies in network traffic. Comput Secur 2017. [DOI: 10.1016/j.cose.2017.07.004] [Citation(s) in RCA: 23] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
24
Analysis and Potential Application of the Maturity of Growth Management in the Developing Construction Industry of a Province of China: A Case Study. SUSTAINABILITY 2017. [DOI: 10.3390/su9010143] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
25
Symmetric Fractional Diffusion and Entropy Production. ENTROPY 2016. [DOI: 10.3390/e18070275] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/20/2022]
26
An Integrated Diagnostic Framework to Manage Organization Sustainable Growth: An Empirical Case. SUSTAINABILITY 2016. [DOI: 10.3390/su8040301] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
27
A New Systematic Approach to Vulnerability Assessment of Innovation Capability of Construction Enterprises. SUSTAINABILITY 2015. [DOI: 10.3390/su8010017] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA