Zobrazeno 1 - 10
of 84
pro vyhledávání: '"Ioana Banicescu"'
Autor:
Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale
Publikováno v:
IEEE Access, Vol 10, Pp 112392-112415 (2022)
The application of Artificial Intelligence (AI) and Machine Learning (ML) to cybersecurity challenges has gained traction in industry and academia, partially as a result of widespread malware attacks on critical systems such as cloud infrastructures
Externí odkaz:
https://doaj.org/article/a078bddcabed4eee81d1290dfad1622c
Publikováno v:
2022 21st International Symposium on Parallel and Distributed Computing (ISPDC).
A Performance-Oriented Comparison of Neural Network Approaches for Anomaly-based Intrusion Detection
Autor:
Stefano Iannucci, Jesse Ables, William Anderson, Bhuvanesh Abburi, Valeria Cardellini, Ioana Banicescu
Intrusion Detection Systems employ anomaly detection algorithms to detect malicious or unauthorized activities in real time. Anomaly detection algorithms that exploit artificial neural networks (ANN) have recently gained particular interest. These al
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a978eea20a146be3714f26badb3ac2ee
http://hdl.handle.net/2108/286819
http://hdl.handle.net/2108/286819
Publikováno v:
Future Generation Computer Systems. 111:617-633
Scientific applications often contain large, computationally-intensive, and irregular parallel loops or tasks that exhibit stochastic behavior leading to load imbalance. Load imbalance often manifests during the execution of parallel scientific appli
Autor:
Jesse Ables, Thomas Kirby, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale
Modern Artificial Intelligence (AI) enabled Intrusion Detection Systems (IDS) are complex black boxes. This means that a security analyst will have little to no explanation or clarification on why an IDS model made a particular prediction. A potentia
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4fd704af05cc68031697e418eae09119
Publikováno v:
FAS*W@SASO/ICAC
Given the always increasing size of computer systems, manually protecting them in case of attacks is infeasible and error-prone. For this reason, several Intrusion Response Systems (IRSs) have been proposed so far, with the purpose of limiting the am
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::15649ef0df8505eb80eb01fa47697611
https://hdl.handle.net/11590/404584
https://hdl.handle.net/11590/404584
Given the always increasing size of computer systems, manually protecting them in case of attacks is unfeasible and error-prone. For this reason, until now, several model-based Intrusion Response Systems (IRSs) have been proposed with the purpose of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::07d49952cbed493ec155833808e3b47e
http://hdl.handle.net/2108/249343
http://hdl.handle.net/2108/249343
Publikováno v:
ISPDC
The increase in scale provided by distributed computing systems has expanded scientific discovery and engineering solutions. Stochastic modeling with Performance Evaluation Process Algebra (PEPA) has been used to evaluate the robustness of static res
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030504168
ICCS (2)
ICCS (2)
Applications executing in heterogeneous parallel and/or distributed computing (PDC) environments are often prone to unpredictable runtime due to variations in problem, algorithm, and system characteristics. This serves as a key motivation towards a s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b68316846b11ff37e52a19c282e89c3b
https://doi.org/10.1007/978-3-030-50417-5_44
https://doi.org/10.1007/978-3-030-50417-5_44