Počet záznamov: 1  

Deep learning for proactive network monitoring and security protection

  1. NázovDeep learning for proactive network monitoring and security protection
    Autor Nguyen Giang 1972- SAVINFO - Ústav informatiky SAV    SCOPUS    RID    ORCID
    Spoluautori Dlugolinský Štefan 1983- SAVINFO - Ústav informatiky SAV    SCOPUS    RID    ORCID

    Tran Viet 1972- SAVINFO - Ústav informatiky SAV    SCOPUS    RID    ORCID

    López García Álvaro

    Zdroj.dok. IEEE Access. Vol. 8, no. 1 (2020), art. no. 8966259, p. 19696-19716
    Jazyk dok.eng - angličtina
    URLURL link
    Druh dok.rozpis článkov z periodík (rzb)
    OhlasyTHASEEN, I. Sumaiya - CHITTURI, Arun Krishna - AL-TURJMAN, Fadi - SHANKAR, Achyut - GHALIB, Muhammad Rukunuddin - ABHISHEK, Kumar. An intelligent ensemble of long-short-term memory with genetic algorithm for network anomaly identification. In TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES. ISSN 2161-3915, 2020, vol., no., pp.
    CRIVELLARI, Alessandro - BEINAT, Euro. Forecasting Spatially-Distributed Urban Traffic Volumes via Multi-Target LSTM-Based Neural Network Regressor. In MATHEMATICS, 2020, vol. 8, no. 12, pp.
    ZHONG, Wei - YU, Ning - AI, Chunyu. Applying big data based deep learning system to intrusion detection. In Big Data Mining and Analytics. ISSN 20960654, 2020-09-01, 3, 3, pp. 181-195.
    INJADAT, MohammadNoor - MOUBAYED, Abdallah - NASSIF, Ali Bou - SHAMI, Abdallah. Machine learning towards intelligent systems: applications, challenges, and opportunities. In ARTIFICIAL INTELLIGENCE REVIEW. ISSN 0269-2821, 2021, vol., no., pp.
    SOLARTE PABON, Oswaldo - TORRENTE, Maria - PROVENCIO, Mariano - RODRIGUEZ-GONZALEZ, Alejandro - MENASALVAS, Ernestina. Integrating Speculation Detection and Deep Learning to Extract Lung Cancer Diagnosis from Clinical Notes. In APPLIED SCIENCES-BASEL, 2021, vol. 11, no. 2, pp.
    PERDICES, Daniel - GARCIA-DORADO, Jose Luis - RAMOS, Javier - DE POOL, Rodrigo - ARACIL, Javier. Towards the Automatic and Schedule-Aware Alerting of Internetwork Time Series. In IEEE ACCESS. ISSN 2169-3536, 2021, vol. 9, no., pp. 61346-61358.
    WEI, Yunkai - ZHOU, Sipei - LENG, Supeng - MAHARJAN, Sabita - ZHANG, Yan. Federated Learning Empowered End-Edge-Cloud Cooperation for 5G HetNet Security. In IEEE NETWORK. ISSN 0890-8044, 2021, vol. 35, no. 2, pp. 88-94.
    WU, Shiwen - ZHANG, Yuanxing - ZHANG, Wentao - BIAN, Kaigui - CUI, Bin. Enhanced review-based rating prediction by exploiting aside information and user influence. In KNOWLEDGE-BASED SYSTEMS. ISSN 0950-7051, 2021, vol. 222, no., pp.
    LIN, Yu-Yi - ZHENG, Wei-Zhong - CHU, Wei Chung - HAN, Ji-Yan - HUNG, Ying-Hsiu - HO, Guan-Min - CHANG, Chia-Yuan - LAI, Ying-Hui. A Speech Command Control-Based Recognition System for Dysarthric Patients Based on Deep Learning Technology. In APPLIED SCIENCES-BASEL, 2021, vol. 11, no. 6, pp.
    SZOSTAK, Daniel - WLODARCZYK, Adam - WALKOWIAK, Krzysztof. Machine Learning Classification and Regression Approaches for Optical Network Traffic Prediction. In ELECTRONICS, 2021, vol. 10, no. 13, pp.
    NARAYANANKUTTY, Hrishikesh. Self-Adapting Model-Based SDSec For IoT Networks Using Machine Learning. In 2021 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C), 2021, vol., no., pp. 92-93.
    TAYYAB, Muhammad - MARJANI, Mohsen - JHANJHI, N. Z. - HASHIM, Ibrahim Abaker Targio - ALMAZROI, Abdulwahab Ali - ALMAZROI, Abdulaleem Ali. Cryptographic Based Secure Model on Dataset for Deep Learning Algorithms. In CMC-COMPUTERS MATERIALS & CONTINUA. ISSN 1546-2218, 2021, vol. 69, no. 1, pp. 1183-1200.
    ALSOUFI, Muaadh A. - RAZAK, Shukor - SIRAJ, Maheyzah Md - NAFEA, Ibtehal - GHALEB, Fuad A. - SAEED, Faisal - NASSER, Maged. Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review. In APPLIED SCIENCES-BASEL, 2021, vol. 11, no. 18, pp. Dostupné na: https://doi.org/10.3390/app11188383.
    QI, Guohong - ZHOU, Jie - JIA, Wenxian - LIU, Menghan - ZHANG, Shengnan - XU, Mengying. Intrusion Detection for Network Based on Elite Clone Artificial Bee Colony and Back Propagation Neural Network. In WIRELESS COMMUNICATIONS & MOBILE COMPUTING. ISSN 1530-8669, 2021, vol. 2021, no., pp. Dostupné na: https://doi.org/10.1155/2021/9956371.
    IKRAM, Sumaiya Thaseen - CHERUKURI, Aswani Kumar - POORVA, Babu - USHASREE, Pamidi Sai - ZHANG, Yishuo - LIU, Xiao - LI, Gang. Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models. In CYBERNETICS AND INFORMATION TECHNOLOGIES. ISSN 1311-9702, 2021, vol. 21, no. 3, pp. 175-188. Dostupné na: https://doi.org/10.2478/cait-2020-0037.
    ARCHANA, C. - CHAITRA, H. P. - KHUSHI, M. - PRADHIKSHA NANDINI, T. - SIVARAMAN, E. - HONNAVALLI, Prasad. Cloud-based network Intrusion detection system using deep learning. In ACM International Conference Proceeding Series, 2021-08-25, pp. Dostupné na: https://doi.org/10.1145/3485557.3485562.
    LYSENKO, Sergii - BOBROVNIKOVA, Kira - GAJ, Piotr - SOCHOR, Tomas - FORKUN, Iryna. Resilient computer systems development for cyberattacks resistance. In CEUR Workshop Proceedings. ISSN 16130073, 2021-01-01, 2853, pp. 353-361.
    SHIKHALIYEV, R.H. One method for intellectual proactive monitoring of computer networks. In Problems of Information Technology. ISSN 2077-4001, 2021, no. 2, pp. 41-52.
    DONDO, M. - SULTANA, M. - VANDENBERGHE, G. Malicious activity detection. An analysis of current tools and methodologies for network defence in operational networks. Defence Research and Development Canada. Reference Document DRDC-RDDC-2021-D078. 2021, 60 p. https://cradpdf.drdc-rddc.gc.ca/PDFS/unc361/p813212_A1b.pdf.
    BIN ARFAJ, Bandar Abdulrhman - MISHRA, Shailendra - ALSHEHRI, Mohammed. Efficacy of Unconventional Penetration Testing Practices. In INTELLIGENT AUTOMATION AND SOFT COMPUTING. ISSN 1079-8587, 2022, vol. 31, no. 1, pp. 223-239.
    ZHIQIANG, Liu - MOHI-UD-DIN, Ghulam - JIANGBIN, Zheng - SIFEI, Wang - ASIM, Muhammad. A novel deep learning based security assessment framework for enhanced security in swarm network environment. In INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2022, vol. 38, no., pp. ISSN 1874-5482. Dostupné na: https://doi.org/10.1016/j.ijcip.2022.100540.
    LEON, D. A. - MARTINEZ, J. G. - ARDILA, I. A. - MOSQUERA, D. J. Artificial intelligence for traffic control in data networks: A Review. In ENTRE CIENCIA E INGENIERIA, 2022, vol. 16, no. 31, pp. 17-24. ISSN 1909-8367. Dostupné na: https://doi.org/10.31908/19098367.2655.
    YUSOF, Mohammad Hafiz Mohd - ZIN, Abdullah Mohd - SATAR, Nurhizam Safie Mohd. Behavioral Intrusion Prediction Model on Bayesian Network over Healthcare Infrastructure. In CMC-COMPUTERS MATERIALS & CONTINUA, 2022, vol. 72, no. 2, pp. 2445-2466. ISSN 1546-2218. Dostupné na: https://doi.org/10.32604/cmc.2022.023571.
    KJORVEZIROSKI, Vojdan - VULETIC, Pavle V. - LOPATOWSKI, Lukasz - LOUI, Frederic. On-Demand Network Management with NMaaS: Network Management as a Service. In PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022, vol., no., pp. ISSN 1542-1201. Dostupné na: https://doi.org/10.1109/NOMS54207.2022.9789815.
    DOROUD, Hossein - ALASWAD, Ahmad - DRESSLER, Falko. Encrypted Traffic Detection: Beyond the Port Number Era. In PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022), 2022, vol., no., pp. 198-204. ISSN 0742-1303. Dostupné na: https://doi.org/10.1109/LCN53696.2022.9843432.
    DIAZ-HONRUBIA, Antonio Jesus - HERRANZ, Alberto Blazquez - SANTAMARIA, Lucia Prieto - RUIZ, Ernestina Menasalvas - RODRIGUEZ-GONZALEZ, Alejandro - GONZALEZ-GRANADILLO, Gustavo - DIAZ, Rodrigo - PANAOUSIS, Emmanouil - XENAKIS, Christos. A Trusted Platform Module-based, Pre-emptive and Dynamic Asset Discovery Tool. In JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, vol. 71, no., pp. ISSN 2214-2126. Dostupné na: https://doi.org/10.1016/j.jisa.2022.103350.
    MAO, Xiru - CHENG, Zheng - ZHOU, Yu. Network Security Protection Based on Deep Learning in Power Grid Information Construction. In Proceedings 2022 Asian Conference on Frontiers of Power and Energy, ACFPE 2022, 2022-01-01, pp. 193-197. Dostupné na: https://doi.org/10.1109/ACFPE56003.2022.9952300.
    DAS, Abhijit - PRAMOD. A Novel Deep Learning Model to Enhance Network Traffic Monitoring for Cybersecurity. In International Journal of Intelligent Systems and Applications in Engineering, 2022-10-15, 10, 1s, pp. 335-342.
    KAMBLE, A. - MALEMATH, V.S. Adam improved rider optimization-based deep recurrent neural network for the intrusion detection in cyber physical systems. In International Journal of Swarm Intelligence Research (IJSIR). 2022, vol. 13, no. 3, pp. 1-22. Dostupné na: https://do.org/10.4018/IJSIR.304402.
    SHIKHALIYEV, Ramiz. Proactive Computer Network Monitoring based on Homogeneous LSTM Ensemble. In 16th IEEE International Conference on Application of Information and Communication Technologies, AICT 2022 Proceedings, 2022-01-01, pp. Dostupné na: https://doi.org/10.1109/AICT55583.2022.10013593.
    RAMOS, J. - GARCÍA-DORADO, J.L. - ARACIL, J. Workforce capacity planning for proactive troubleshooting in the network operations center. In Available at SSRN. 2022, pp. 1-22. doi: 10.1016/j.comnet.2022.109523.
    ATASEVER, S. - SORGUCU, U. Yapay Zekâ’nin Siber Güvenlik Uygulamalarindakullaniminin Prisma Metodu İle Analizi. In Mühendislikte Yapay Zeka Uygulamalari. Chapter 4. Iksad Publications. ISBN 978-625-6380-43-1. 2022, pp. 69- 94.
    LEÓN, D.A. - CUENCA, J.G.M. - SÁNCHEZ, I.A.A. - PALACIOS, D.J.M. Inteligencia artificial para el control de tráfico en redes de datos: Una Revisión. In Entre Ciencia e In Ingeniería. 2022, vol. 16, no. 31, pp. 17-24. doi: 10.31908/19098367.2655.
    PANDEY, B.K. - VEERAMANICKAM, M.R.M. - AHMAD, S. - RODRIGUEZ, C. - ESENARRO, D. ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based Deep maxout network for intrusion detection using big data in cloud computing framework. In COMPUTERS & SECURITY. ISSN 0167-4048, JAN 2023, vol. 124. Dostupné na: https://doi.org/10.1016/j.cose.2022.102975.
    RAMOS, J. - GARCíA-DORADO, J.L. - ARACIL, J. Workforce capacity planning for proactive troubleshooting in the Network Center. In COMPUTER NETWORKS. ISSN 1389-1286, FEB 2023, vol. 221. Dostupné na: https://doi.org/10.1016/j.comnet.2022.109523.
    BA'ABBAD, I. - BATARFI, O. Proactive Ransomware Detection Using Extremely Fast Decision Tree (EFDT) Algorithm: A Case Study. In COMPUTERS. ISSN 2073-431X, JUN 2023, vol. 12, no. 6. Dostupné na: https://doi.org/10.3390/computers12060121.
    SARKER, K.U. - YUNUS, F. - DERAMAN, A. Penetration Taxonomy: A Systematic Review on the Penetration Process, Framework, Standards, Tools, and Scoring Methods. In SUSTAINABILITY. JUL 2023, vol. 15, no. 13. Dostupné na: https://doi.org/10.3390/su151310471.
    SOLARTE-PABóN, O. - MONTENEGRO, O. - GARCíA-BARRAGáN, A. - TORRENTE, M. - PROVENCIO, M. - MENASALVAS, E. - ROBLES, V. Transformers for extracting breast cancer information from Spanish clinical narratives. In ARTIFICIAL INTELLIGENCE IN MEDICINE. ISSN 0933-3657, SEP 2023, vol. 143. Dostupné na: https://doi.org/10.1016/j.artmed.2023.102625.
    PYO, Changwoo - SAWADA, Hirokazu - MATSUMURA, Takeshi. A Deep Learning-Based Indoor Radio Estimation Method Driven by 2.4 GHz Ray-Tracing Data. In IEEE ACCESS, 2023, vol. 11, no., pp. 138215-138228. ISSN 2169-3536.
    ALAM, Naushad - AHMED, Muqeem. Zero-day Network Intrusion Detection using Machine Learning Approach. In International Journal on Recent and Innovation Trends in Computing and Communication, 2023-01-01, 11, pp. 194-201. Dostupné na: https://doi.org/10.17762/ijritcc.v11i8s.7190.
    PADDALWAR, Snehal - RAGHA, Leena - MANE, Vanita. Cyber Threat Mitigation Using Machine Learning, Deep Learning, Artificial Intelligence, and Blockchain. In Intelligent Approaches to Cyber Security, 2023-01-01, pp. 163-179. Dostupné na: https://doi.org/10.1201/9781003408307-14.
    PRASAD, Arpana - ASHA, V. - MADHWARAJ, K. G. - MATHEW, Jincy - SHET, Namrata - KUMAR B, Naveen. AI Based Infringement Discernment System for Network Security. In Proceedings 2023 International Conference on Computational Intelligence for Information, Security and Communication Applications, CIISCA 2023, 2023-01-01, pp. 147-153. Dostupné na: https://doi.org/10.1109/CIISCA59740.2023.00038.
    SHIKHALIYEV, Ramiz - SUKHOSTAT, Lyudmila. Proactive computer network monitoring based on homogeneous deep neural ensemble. In Results in Control and Optimization, 2023-06-01, 11, pp. Dostupné na: https://doi.org/10.1016/j.rico.2023.100230.
    BA'ABBAD, I. - BATARFI, O. A short criteria-based review of high-performance proactive ransomware analysis models. In Transactions on Engineering and Computing Sciences. 2023, vol. 11, no. 1, pp. 168-179. doi: 10.14738/tecs.111.13973.
    RAMU, S. - RAMAMOORTHY, R. - RANGANATHAN, R. Hough transform based deep belief network and improved homomorphic encryption for cloud security based intrusion discovery. In Yanbu Journal of Engineering and Science. 2023, vol. 20, no. 2, pp. 71-78. doi: 10.53370/001c.92142.
    KategóriaADCA - Vedecké práce v zahraničných karentovaných časopisoch impaktovaných
    Kategória (od 2022)V3 - Vedecký výstup publikačnej činnosti z časopisu
    Typ výstupučlánok
    Rok vykazovania2020
    Registrované vWOS
    Registrované vSCOPUS
    Registrované vCCC
    DOI 10.1109/ACCESS.2020.2968718
    článok

    článok

    Názov súboruPrístupVeľkosťStiahnutéTypLicence
    Deep Learning for Proactive Network Monitoring and Security Protection.pdfPrístupný3.2 MB2Vydavateľská verzia
    rokCCIFIF Q (best)JCR Av Jour IF PercSJRSJR Q (best)CiteScore
    A
    rok vydaniarok metrikyIFIF Q (best)SJRSJR Q (best)
    202020193.745Q10.775Q1
Počet záznamov: 1  

  Tieto stránky využívajú súbory cookies, ktoré uľahčujú ich prezeranie. Ďalšie informácie o tom ako používame cookies.