Počet záznamov: 1
Deep learning for proactive network monitoring and security protection
Názov Deep learning for proactive network monitoring and security protection Autor Nguyen Giang 1972- SAVINFO - Ústav informatiky SAV SCOPUS RID ORCID Spoluautori Dlugolinský Štefan 1983- SAVINFO - Ústav informatiky SAV SCOPUS RID ORCID Tran Viet 1972- SAVINFO - Ústav informatiky SAV SCOPUS RID ORCID López García Álvaro Zdroj.dok. IEEE Access. Vol. 8, no. 1 (2020), art. no. 8966259, p. 19696-19716 Jazyk dok. eng - angličtina URL URL link Druh dok. rozpis článkov z periodík (rzb) Ohlasy THASEEN, I. Sumaiya - CHITTURI, Arun Krishna - AL-TURJMAN, Fadi - SHANKAR, Achyut - GHALIB, Muhammad Rukunuddin - ABHISHEK, Kumar. An intelligent ensemble of long-short-term memory with genetic algorithm for network anomaly identification. In TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES. ISSN 2161-3915, 2020, vol., no., pp. CRIVELLARI, Alessandro - BEINAT, Euro. Forecasting Spatially-Distributed Urban Traffic Volumes via Multi-Target LSTM-Based Neural Network Regressor. In MATHEMATICS, 2020, vol. 8, no. 12, pp. ZHONG, Wei - YU, Ning - AI, Chunyu. Applying big data based deep learning system to intrusion detection. In Big Data Mining and Analytics. ISSN 20960654, 2020-09-01, 3, 3, pp. 181-195. INJADAT, MohammadNoor - MOUBAYED, Abdallah - NASSIF, Ali Bou - SHAMI, Abdallah. Machine learning towards intelligent systems: applications, challenges, and opportunities. In ARTIFICIAL INTELLIGENCE REVIEW. ISSN 0269-2821, 2021, vol., no., pp. SOLARTE PABON, Oswaldo - TORRENTE, Maria - PROVENCIO, Mariano - RODRIGUEZ-GONZALEZ, Alejandro - MENASALVAS, Ernestina. Integrating Speculation Detection and Deep Learning to Extract Lung Cancer Diagnosis from Clinical Notes. In APPLIED SCIENCES-BASEL, 2021, vol. 11, no. 2, pp. PERDICES, Daniel - GARCIA-DORADO, Jose Luis - RAMOS, Javier - DE POOL, Rodrigo - ARACIL, Javier. Towards the Automatic and Schedule-Aware Alerting of Internetwork Time Series. In IEEE ACCESS. ISSN 2169-3536, 2021, vol. 9, no., pp. 61346-61358. WEI, Yunkai - ZHOU, Sipei - LENG, Supeng - MAHARJAN, Sabita - ZHANG, Yan. Federated Learning Empowered End-Edge-Cloud Cooperation for 5G HetNet Security. In IEEE NETWORK. ISSN 0890-8044, 2021, vol. 35, no. 2, pp. 88-94. WU, Shiwen - ZHANG, Yuanxing - ZHANG, Wentao - BIAN, Kaigui - CUI, Bin. Enhanced review-based rating prediction by exploiting aside information and user influence. In KNOWLEDGE-BASED SYSTEMS. ISSN 0950-7051, 2021, vol. 222, no., pp. LIN, Yu-Yi - ZHENG, Wei-Zhong - CHU, Wei Chung - HAN, Ji-Yan - HUNG, Ying-Hsiu - HO, Guan-Min - CHANG, Chia-Yuan - LAI, Ying-Hui. A Speech Command Control-Based Recognition System for Dysarthric Patients Based on Deep Learning Technology. In APPLIED SCIENCES-BASEL, 2021, vol. 11, no. 6, pp. SZOSTAK, Daniel - WLODARCZYK, Adam - WALKOWIAK, Krzysztof. Machine Learning Classification and Regression Approaches for Optical Network Traffic Prediction. In ELECTRONICS, 2021, vol. 10, no. 13, pp. NARAYANANKUTTY, Hrishikesh. Self-Adapting Model-Based SDSec For IoT Networks Using Machine Learning. In 2021 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C), 2021, vol., no., pp. 92-93. TAYYAB, Muhammad - MARJANI, Mohsen - JHANJHI, N. Z. - HASHIM, Ibrahim Abaker Targio - ALMAZROI, Abdulwahab Ali - ALMAZROI, Abdulaleem Ali. Cryptographic Based Secure Model on Dataset for Deep Learning Algorithms. In CMC-COMPUTERS MATERIALS & CONTINUA. ISSN 1546-2218, 2021, vol. 69, no. 1, pp. 1183-1200. ALSOUFI, Muaadh A. - RAZAK, Shukor - SIRAJ, Maheyzah Md - NAFEA, Ibtehal - GHALEB, Fuad A. - SAEED, Faisal - NASSER, Maged. Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review. In APPLIED SCIENCES-BASEL, 2021, vol. 11, no. 18, pp. Dostupné na: https://doi.org/10.3390/app11188383. QI, Guohong - ZHOU, Jie - JIA, Wenxian - LIU, Menghan - ZHANG, Shengnan - XU, Mengying. Intrusion Detection for Network Based on Elite Clone Artificial Bee Colony and Back Propagation Neural Network. In WIRELESS COMMUNICATIONS & MOBILE COMPUTING. ISSN 1530-8669, 2021, vol. 2021, no., pp. Dostupné na: https://doi.org/10.1155/2021/9956371. IKRAM, Sumaiya Thaseen - CHERUKURI, Aswani Kumar - POORVA, Babu - USHASREE, Pamidi Sai - ZHANG, Yishuo - LIU, Xiao - LI, Gang. Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models. In CYBERNETICS AND INFORMATION TECHNOLOGIES. ISSN 1311-9702, 2021, vol. 21, no. 3, pp. 175-188. Dostupné na: https://doi.org/10.2478/cait-2020-0037. ARCHANA, C. - CHAITRA, H. P. - KHUSHI, M. - PRADHIKSHA NANDINI, T. - SIVARAMAN, E. - HONNAVALLI, Prasad. Cloud-based network Intrusion detection system using deep learning. In ACM International Conference Proceeding Series, 2021-08-25, pp. Dostupné na: https://doi.org/10.1145/3485557.3485562. LYSENKO, Sergii - BOBROVNIKOVA, Kira - GAJ, Piotr - SOCHOR, Tomas - FORKUN, Iryna. Resilient computer systems development for cyberattacks resistance. In CEUR Workshop Proceedings. ISSN 16130073, 2021-01-01, 2853, pp. 353-361. SHIKHALIYEV, R.H. One method for intellectual proactive monitoring of computer networks. In Problems of Information Technology. ISSN 2077-4001, 2021, no. 2, pp. 41-52. DONDO, M. - SULTANA, M. - VANDENBERGHE, G. Malicious activity detection. An analysis of current tools and methodologies for network defence in operational networks. Defence Research and Development Canada. Reference Document DRDC-RDDC-2021-D078. 2021, 60 p. https://cradpdf.drdc-rddc.gc.ca/PDFS/unc361/p813212_A1b.pdf. BIN ARFAJ, Bandar Abdulrhman - MISHRA, Shailendra - ALSHEHRI, Mohammed. Efficacy of Unconventional Penetration Testing Practices. In INTELLIGENT AUTOMATION AND SOFT COMPUTING. ISSN 1079-8587, 2022, vol. 31, no. 1, pp. 223-239. ZHIQIANG, Liu - MOHI-UD-DIN, Ghulam - JIANGBIN, Zheng - SIFEI, Wang - ASIM, Muhammad. A novel deep learning based security assessment framework for enhanced security in swarm network environment. In INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2022, vol. 38, no., pp. ISSN 1874-5482. Dostupné na: https://doi.org/10.1016/j.ijcip.2022.100540. LEON, D. A. - MARTINEZ, J. G. - ARDILA, I. A. - MOSQUERA, D. J. Artificial intelligence for traffic control in data networks: A Review. In ENTRE CIENCIA E INGENIERIA, 2022, vol. 16, no. 31, pp. 17-24. ISSN 1909-8367. Dostupné na: https://doi.org/10.31908/19098367.2655. YUSOF, Mohammad Hafiz Mohd - ZIN, Abdullah Mohd - SATAR, Nurhizam Safie Mohd. Behavioral Intrusion Prediction Model on Bayesian Network over Healthcare Infrastructure. In CMC-COMPUTERS MATERIALS & CONTINUA, 2022, vol. 72, no. 2, pp. 2445-2466. ISSN 1546-2218. Dostupné na: https://doi.org/10.32604/cmc.2022.023571. KJORVEZIROSKI, Vojdan - VULETIC, Pavle V. - LOPATOWSKI, Lukasz - LOUI, Frederic. On-Demand Network Management with NMaaS: Network Management as a Service. In PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022, vol., no., pp. ISSN 1542-1201. Dostupné na: https://doi.org/10.1109/NOMS54207.2022.9789815. DOROUD, Hossein - ALASWAD, Ahmad - DRESSLER, Falko. Encrypted Traffic Detection: Beyond the Port Number Era. In PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022), 2022, vol., no., pp. 198-204. ISSN 0742-1303. Dostupné na: https://doi.org/10.1109/LCN53696.2022.9843432. DIAZ-HONRUBIA, Antonio Jesus - HERRANZ, Alberto Blazquez - SANTAMARIA, Lucia Prieto - RUIZ, Ernestina Menasalvas - RODRIGUEZ-GONZALEZ, Alejandro - GONZALEZ-GRANADILLO, Gustavo - DIAZ, Rodrigo - PANAOUSIS, Emmanouil - XENAKIS, Christos. A Trusted Platform Module-based, Pre-emptive and Dynamic Asset Discovery Tool. In JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, vol. 71, no., pp. ISSN 2214-2126. Dostupné na: https://doi.org/10.1016/j.jisa.2022.103350. MAO, Xiru - CHENG, Zheng - ZHOU, Yu. Network Security Protection Based on Deep Learning in Power Grid Information Construction. In Proceedings 2022 Asian Conference on Frontiers of Power and Energy, ACFPE 2022, 2022-01-01, pp. 193-197. Dostupné na: https://doi.org/10.1109/ACFPE56003.2022.9952300. DAS, Abhijit - PRAMOD. A Novel Deep Learning Model to Enhance Network Traffic Monitoring for Cybersecurity. In International Journal of Intelligent Systems and Applications in Engineering, 2022-10-15, 10, 1s, pp. 335-342. KAMBLE, A. - MALEMATH, V.S. Adam improved rider optimization-based deep recurrent neural network for the intrusion detection in cyber physical systems. In International Journal of Swarm Intelligence Research (IJSIR). 2022, vol. 13, no. 3, pp. 1-22. Dostupné na: https://do.org/10.4018/IJSIR.304402. SHIKHALIYEV, Ramiz. Proactive Computer Network Monitoring based on Homogeneous LSTM Ensemble. In 16th IEEE International Conference on Application of Information and Communication Technologies, AICT 2022 Proceedings, 2022-01-01, pp. Dostupné na: https://doi.org/10.1109/AICT55583.2022.10013593. RAMOS, J. - GARCÍA-DORADO, J.L. - ARACIL, J. Workforce capacity planning for proactive troubleshooting in the network operations center. In Available at SSRN. 2022, pp. 1-22. doi: 10.1016/j.comnet.2022.109523. ATASEVER, S. - SORGUCU, U. Yapay Zekâ’nin Siber Güvenlik Uygulamalarindakullaniminin Prisma Metodu İle Analizi. In Mühendislikte Yapay Zeka Uygulamalari. Chapter 4. Iksad Publications. ISBN 978-625-6380-43-1. 2022, pp. 69- 94. LEÓN, D.A. - CUENCA, J.G.M. - SÁNCHEZ, I.A.A. - PALACIOS, D.J.M. Inteligencia artificial para el control de tráfico en redes de datos: Una Revisión. In Entre Ciencia e In Ingeniería. 2022, vol. 16, no. 31, pp. 17-24. doi: 10.31908/19098367.2655. PANDEY, B.K. - VEERAMANICKAM, M.R.M. - AHMAD, S. - RODRIGUEZ, C. - ESENARRO, D. ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based Deep maxout network for intrusion detection using big data in cloud computing framework. In COMPUTERS & SECURITY. ISSN 0167-4048, JAN 2023, vol. 124. Dostupné na: https://doi.org/10.1016/j.cose.2022.102975. RAMOS, J. - GARCíA-DORADO, J.L. - ARACIL, J. Workforce capacity planning for proactive troubleshooting in the Network Center. In COMPUTER NETWORKS. ISSN 1389-1286, FEB 2023, vol. 221. Dostupné na: https://doi.org/10.1016/j.comnet.2022.109523. BA'ABBAD, I. - BATARFI, O. Proactive Ransomware Detection Using Extremely Fast Decision Tree (EFDT) Algorithm: A Case Study. In COMPUTERS. ISSN 2073-431X, JUN 2023, vol. 12, no. 6. Dostupné na: https://doi.org/10.3390/computers12060121. SARKER, K.U. - YUNUS, F. - DERAMAN, A. Penetration Taxonomy: A Systematic Review on the Penetration Process, Framework, Standards, Tools, and Scoring Methods. In SUSTAINABILITY. JUL 2023, vol. 15, no. 13. Dostupné na: https://doi.org/10.3390/su151310471. SOLARTE-PABóN, O. - MONTENEGRO, O. - GARCíA-BARRAGáN, A. - TORRENTE, M. - PROVENCIO, M. - MENASALVAS, E. - ROBLES, V. Transformers for extracting breast cancer information from Spanish clinical narratives. In ARTIFICIAL INTELLIGENCE IN MEDICINE. ISSN 0933-3657, SEP 2023, vol. 143. Dostupné na: https://doi.org/10.1016/j.artmed.2023.102625. PYO, Changwoo - SAWADA, Hirokazu - MATSUMURA, Takeshi. A Deep Learning-Based Indoor Radio Estimation Method Driven by 2.4 GHz Ray-Tracing Data. In IEEE ACCESS, 2023, vol. 11, no., pp. 138215-138228. ISSN 2169-3536. ALAM, Naushad - AHMED, Muqeem. Zero-day Network Intrusion Detection using Machine Learning Approach. In International Journal on Recent and Innovation Trends in Computing and Communication, 2023-01-01, 11, pp. 194-201. Dostupné na: https://doi.org/10.17762/ijritcc.v11i8s.7190. PADDALWAR, Snehal - RAGHA, Leena - MANE, Vanita. Cyber Threat Mitigation Using Machine Learning, Deep Learning, Artificial Intelligence, and Blockchain. In Intelligent Approaches to Cyber Security, 2023-01-01, pp. 163-179. Dostupné na: https://doi.org/10.1201/9781003408307-14. PRASAD, Arpana - ASHA, V. - MADHWARAJ, K. G. - MATHEW, Jincy - SHET, Namrata - KUMAR B, Naveen. AI Based Infringement Discernment System for Network Security. In Proceedings 2023 International Conference on Computational Intelligence for Information, Security and Communication Applications, CIISCA 2023, 2023-01-01, pp. 147-153. Dostupné na: https://doi.org/10.1109/CIISCA59740.2023.00038. SHIKHALIYEV, Ramiz - SUKHOSTAT, Lyudmila. Proactive computer network monitoring based on homogeneous deep neural ensemble. In Results in Control and Optimization, 2023-06-01, 11, pp. Dostupné na: https://doi.org/10.1016/j.rico.2023.100230. BA'ABBAD, I. - BATARFI, O. A short criteria-based review of high-performance proactive ransomware analysis models. In Transactions on Engineering and Computing Sciences. 2023, vol. 11, no. 1, pp. 168-179. doi: 10.14738/tecs.111.13973. RAMU, S. - RAMAMOORTHY, R. - RANGANATHAN, R. Hough transform based deep belief network and improved homomorphic encryption for cloud security based intrusion discovery. In Yanbu Journal of Engineering and Science. 2023, vol. 20, no. 2, pp. 71-78. doi: 10.53370/001c.92142. Kategória ADCA - Vedecké práce v zahraničných karentovaných časopisoch impaktovaných Kategória (od 2022) V3 - Vedecký výstup publikačnej činnosti z časopisu Typ výstupu článok Rok vykazovania 2020 Registrované v WOS Registrované v SCOPUS Registrované v CCC DOI 10.1109/ACCESS.2020.2968718 článok
Názov súboru Prístup Veľkosť Stiahnuté Typ Licence Deep Learning for Proactive Network Monitoring and Security Protection.pdf Prístupný 3.2 MB 2 Vydavateľská verzia rok CC IF IF Q (best) JCR Av Jour IF Perc SJR SJR Q (best) CiteScore A rok vydania rok metriky IF IF Q (best) SJR SJR Q (best) 2020 2019 3.745 Q1 0.775 Q1
Počet záznamov: 1