• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4643724)   Today's Articles (144)   Subscriber (50641)
For: Morfino V, Rampone S. Towards Near-Real-Time Intrusion Detection for IoT Devices using Supervised Learning and Apache Spark. Electronics 2020;9:444. [DOI: 10.3390/electronics9030444] [Citation(s) in RCA: 25] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/31/2022]
Number Cited by Other Article(s)
1
Wang Z, Ghaleb FA, Zainal A, Siraj MM, Lu X. An efficient intrusion detection model based on convolutional spiking neural network. Sci Rep 2024;14:7054. [PMID: 38528084 DOI: 10.1038/s41598-024-57691-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/25/2024] [Accepted: 03/20/2024] [Indexed: 03/27/2024]  Open
2
Ashkouti F, Khamforoosh K. A distributed computing model for big data anonymization in the networks. PLoS One 2023;18:e0285212. [PMID: 37115783 PMCID: PMC10146481 DOI: 10.1371/journal.pone.0285212] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/26/2023] [Accepted: 04/18/2023] [Indexed: 04/29/2023]  Open
3
Bagui S, Mink D, Bagui S, Ghosh T, McElroy T, Paredes E, Khasnavis N, Plenkers R. Detecting Reconnaissance and Discovery Tactics from the MITRE ATT&CK Framework in Zeek Conn Logs Using Spark's Machine Learning in the Big Data Framework. SENSORS (BASEL, SWITZERLAND) 2022;22:7999. [PMID: 36298351 PMCID: PMC9610873 DOI: 10.3390/s22207999] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/07/2022] [Revised: 10/17/2022] [Accepted: 10/18/2022] [Indexed: 06/16/2023]
4
Manzano Sanchez RA, Zaman M, Goel N, Naik K, Joshi R. Towards Developing a Robust Intrusion Detection Model Using Hadoop-Spark and Data Augmentation for IoT Networks. SENSORS (BASEL, SWITZERLAND) 2022;22:7726. [PMID: 36298077 PMCID: PMC9608938 DOI: 10.3390/s22207726] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/15/2022] [Revised: 10/04/2022] [Accepted: 10/06/2022] [Indexed: 06/16/2023]
5
An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks. Knowl Based Syst 2022. [DOI: 10.1016/j.knosys.2022.109762] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
6
Zhang C, Jia D, Wang L, Wang W, Liu F, Yang A. Comparative Research on Network Intrusion Detection Methods Based on Machine Learning. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102861] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
7
Fuzzy Local Information and Bhattacharya-Based C-Means Clustering and Optimized Deep Learning in Spark Framework for Intrusion Detection. ELECTRONICS 2022. [DOI: 10.3390/electronics11111675] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/01/2023]
8
Learning-Based Methods for Cyber Attacks Detection in IoT Systems: Methods, Analysis, and Future Prospects. ELECTRONICS 2022. [DOI: 10.3390/electronics11091502] [Citation(s) in RCA: 6] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/04/2022]
9
A Review of Efficient Real-Time Decision Making in the Internet of Things. TECHNOLOGIES 2022. [DOI: 10.3390/technologies10010012] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
10
Najafimehr M, Zarifzadeh S, Mostafavi S. A hybrid machine learning approach for detecting unprecedented DDoS attacks. THE JOURNAL OF SUPERCOMPUTING 2022;78:8106-8136. [PMID: 35017789 PMCID: PMC8739683 DOI: 10.1007/s11227-021-04253-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 12/16/2021] [Indexed: 06/14/2023]
11
A Novel Approach for Network Intrusion Detection Using Multistage Deep Learning Image Recognition. ELECTRONICS 2021. [DOI: 10.3390/electronics10151854] [Citation(s) in RCA: 23] [Impact Index Per Article: 7.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
12
A Recommendation Engine for Predicting Movie Ratings Using a Big Data Approach. ELECTRONICS 2021. [DOI: 10.3390/electronics10101215] [Citation(s) in RCA: 25] [Impact Index Per Article: 8.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
13
Siboni S, Cohen A. Anomaly Detection for Individual Sequences with Applications in Identifying Malicious Tools. ENTROPY 2020;22:e22060649. [PMID: 33286421 PMCID: PMC7517183 DOI: 10.3390/e22060649] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/25/2020] [Revised: 06/03/2020] [Accepted: 06/08/2020] [Indexed: 11/25/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA