Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Abigail Koay"'
Publikováno v:
IEEE Access, Vol 6, Pp 73713-73723 (2018)
Extensive adoption of intelligent devices with ubiquitous connectivity has increased Internet of Things (IoT) traffic tremendously. The smart devices promise to improve human life through improved safety and security through the implementation of int
Externí odkaz:
https://doaj.org/article/33562cb893d144458da04f9b7d0dca18
Publikováno v:
Software: Practice and Experience. 52:172-193
Publikováno v:
Intelligent Information and Database Systems ISBN: 9783031219665
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::09a5790ecf4fd85a42dac41171eb78f9
https://doi.org/10.1007/978-3-031-21967-2_34
https://doi.org/10.1007/978-3-031-21967-2_34
Publikováno v:
ISBI
Glaucoma identification is often performed manually by medical professionals, which is time consuming. Automated image analysis (e.g. of retinal fundus images) can speed up the detection and treatment of this disease. In this study, twentysix deep le
Publikováno v:
MSR
Automatic source code analysis in key areas of software engineering, such as code security, can benefit from Machine Learning (ML). However, many standard ML approaches require a numeric representation of data and cannot be applied directly to source
Publikováno v:
IEEE Access, Vol 6, Pp 73713-73723 (2018)
Extensive adoption of intelligent devices with ubiquitous connectivity has increased Internet of Things (IoT) traffic tremendously. The smart devices promise to improve human life through improved safety and security through the implementation of int
Publikováno v:
Advances in Information and Computer Security ISBN: 9783030268336
IWSEC
IWSEC
DDoS attack detection using entropy-based features in network traffic has become a popular approach among researchers in the last five years. The use of traffic distribution features constructed using entropy measures has been proposed as a better ap
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::705287ae50f3983ddc9aef6e206d51f4
https://doi.org/10.1007/978-3-030-26834-3_12
https://doi.org/10.1007/978-3-030-26834-3_12
Publikováno v:
ICOIN
Entropy-based features have been widely utilized for detecting DDoS attacks in recent years. However, existing approaches mainly focus on using a small number of entropy-based features to distinguish attack traffic from normal traffic. The drawback o