Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Vikramajeet Khatri"'
Publikováno v:
EURASIP Journal on Information Security, Vol 2024, Iss 1, Pp 1-15 (2024)
Abstract In the envisioned 6G landscape, data sharing is expected to become increasingly prevalent, giving rise to digital marketplaces that foster cooperation among organizations for collecting, sharing, and processing data for analysis. These marke
Externí odkaz:
https://doaj.org/article/2b2a0fbddc67499b91c3d8322cbce46e
Publikováno v:
IEEE Access, Vol 9, Pp 56893-56907 (2021)
Deep generative models have increasingly become popular in different domains such as image processing, though, they hardly appear in the cybersecurity arena. While the main application of these models is dimensionality reduction, marginally they have
Externí odkaz:
https://doaj.org/article/9727ecd2acd04bcda9e9a2a8879d0c79
Publikováno v:
IEEE Access, Vol 7, Pp 100964-100978 (2019)
Hybrid Anomaly Detection Model (HADM) is a platform that filters network traffic and identifies malicious activities on the network. The platform applies data mining techniques to tackle effectively the security issues in high load communication netw
Externí odkaz:
https://doaj.org/article/9da82903652a4c28bae6aea19c1c35d9
Publisher Copyright: © 2022 The Author(s) Analyzing non-labeled data is a major concern in the field of intrusion detection as the attack clusters are continuously evolving which are unknown for the system. Many studies have been conducted on differ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aaffe257f65d2c947f3a4aacaec907ba
https://aaltodoc.aalto.fi/handle/123456789/117193
https://aaltodoc.aalto.fi/handle/123456789/117193
Publikováno v:
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM).
Publikováno v:
IEEE Access, Vol 9, Pp 56893-56907 (2021)
Publisher Copyright: CCBY Copyright: Copyright 2021 Elsevier B.V., All rights reserved. Deep generative models have increasingly become popular in different domains such as image processing, though, they hardly appear in the cybersecurity arena. Whil
Publikováno v:
IoT Security
Publikováno v:
IEEE Access, Vol 7, Pp 100964-100978 (2019)
Hybrid Anomaly Detection Model (HADM) is a platform that filters network traffic and identifies malicious activities on the network. The platform applies data mining techniques to tackle effectively the security issues in high load communication netw
Publikováno v:
A Comprehensive Guide to 5G Security
This chapter introduces the concept of cloudification of mobile operators and presents a new platform called TaaS in a cloud environment. In addition, new threats introduced by TaaS and the prevention mechanisms to resist them are discussed. We propo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::01171e5ce629a890ea71fa887502956e
https://doi.org/10.1002/9781119293071.ch14
https://doi.org/10.1002/9781119293071.ch14