Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 351
1.
  • Dimensionality reduction fo... Dimensionality reduction for detection of anomalies in the IoT traffic data
    Olszewski, Dominik; Iwanowski, Marcin; Graniszewski, Waldemar Future generation computer systems, February 2024, 2024-02-00, Volume: 151
    Journal Article
    Peer reviewed

    This paper concerns cybersecurity issues in one of the fastest growing fields of modern computer systems the Internet-of-Things (IoT). In this field, intrusion detection plays a significant role in ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
2.
  • Machine Learning for Detect... Machine Learning for Detecting Anomalies and Intrusions in Communication Networks
    Li, Zhida; Rios, Ana Laura Gonzalez; Trajkovic, Ljiljana IEEE journal on selected areas in communications, 07/2021, Volume: 39, Issue: 7
    Journal Article
    Peer reviewed

    Cyber attacks are becoming more sophisticated and, hence, more difficult to detect. Using efficient and effective machine learning techniques to detect network anomalies and intrusions is an ...
Full text
Available for: IJS, NUK, UL
3.
  • Analysis Of Mobile Users’ A... Analysis Of Mobile Users’ Activities Using 2 Mean-Normalization Method
    Sandhya B S; Rohini Deshpande Journal of Applied Science and Engineering, 08/2023, Volume: 27, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    In recent decades, with the attracting features of mobiles including 4G and 5G, world is getting more connected to mobile communications. This results in the accumulation of large amount of data in ...
Full text
Available for: NUK, UL, UM, UPUK
4.
  • Benchmark of machine learni... Benchmark of machine learning algorithms on capturing future distribution network anomalies
    Mohammadpourfard, Mostafa; Weng, Yang; Tajdinian, Mohsen IET generation, transmission & distribution, 04/2019, Volume: 13, Issue: 8
    Journal Article
    Peer reviewed

    The conventional distribution network is undergoing structural changes and becoming an active grid due to the advent of smart grid technologies encompassing distributed energy resources (DERs), ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
5.
  • Analysis Of Mobile Users' A... Analysis Of Mobile Users' Activities Using Mean-Normalization Method
    Sandhya B S; Rohini Deshpande 淡江理工學刊, 02/2024, Volume: 27, Issue: 2
    Journal Article
    Peer reviewed

    In recent decades, with the attracting features of mobiles including 4G and 5G, world is getting more connected to mobile communications. This results in the accumulation of large amount of data in ...
Full text
Available for: NUK, UL, UM, UPUK
6.
  • Feature Selection and Model... Feature Selection and Model Evaluation for Threat Detection in Smart Grids
    Gwiazdowicz, Mikołaj; Natkaniec, Marek Energies (Basel), 06/2023, Volume: 16, Issue: 12
    Journal Article
    Peer reviewed
    Open access

    The rising interest in the security of network infrastructure, including edge devices, the Internet of Things, and smart grids, has led to the development of numerous machine learning-based ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
7.
  • Security Analysis of Networ... Security Analysis of Network Anomalies Mitigation Schemes in IoT Networks
    Lawal, Muhammad Aminu; Shaikh, Riaz Ahmed; Hassan, Syed Raheel IEEE access, 01/2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    The Internet of Things (IoT) is on the rise and it is giving a new shape to several fields such as smart cities, smart homes, smart health, etc. as it facilitates the connection of physical objects ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
8.
  • NETWORK INTRUSION DETECTION... NETWORK INTRUSION DETECTION USING HYBRID MACHINE LEARNING METHODS
    Čiurlienė, Karina; Stankevičius, Denisas Science future of Lithuania, 09/2023, Volume: 15
    Journal Article
    Peer reviewed
    Open access

    Network intrusion detection is a relevant cybersecurity research field. The growing number of intrusions requires more sophisticated methods to protect computer networks. Various machine learning ...
Full text
Available for: IZUM, KILJ, NUK, ODKLJ, PILJ, PNG, SAZU, UL, UM, UPUK
9.
  • Designing online network in... Designing online network intrusion detection using deep auto-encoder Q-learning
    Kim, Chayoung; Park, JiSu Computers & electrical engineering, October 2019, 2019-10-00, 20191001, Volume: 79
    Journal Article
    Peer reviewed

    Because of the increasing application of reinforcement learning (RL), particularly deep Q-learning algorithm, research organizations utilize it with increasing frequency. The prediction of cyber ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
10.
  • Evaluation of Pre-Earthquak... Evaluation of Pre-Earthquake Anomalies of Borehole Strain Network by Using Receiver Operating Characteristic Curve
    Yu, Zining; Hattori, Katsumi; Zhu, Kaiguang ... Remote sensing (Basel, Switzerland), 02/2021, Volume: 13, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    In order to monitor temporal and spatial crustal activities associated with earthquakes, ground- and satellite-based monitoring systems have been installed in China since the 1990s. In recent years, ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK

PDF
1 2 3 4 5
hits: 351

Load filters