UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 131
1.
  • Detecting stealthy false da... Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning
    Ashrafuzzaman, Mohammad; Das, Saikat; Chakhchoukh, Yacine ... Computers & security, October 2020, 2020-10-00, 20201001, Letnik: 97
    Journal Article
    Recenzirano

    •Detection of stealthy false data injection attacks in the smart grid.•Supervised and unsupervised machine learning methods.•Ensemble-based machine learning methods. Stealthy false data injection ...
Celotno besedilo
2.
  • Ensemble Classifiers for Ne... Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset
    Mahfouz, Ahmed; Abuhussein, Abdullah; Venugopal, Deepak ... Future internet, 11/2020, Letnik: 12, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Due to the extensive use of computer networks, new risks have arisen, and improving the speed and accuracy of security mechanisms has become a critical need. Although new security tools have been ...
Celotno besedilo

PDF
3.
  • Ontology-Based Security Rec... Ontology-Based Security Recommendation for the Internet of Medical Things
    Alsubaei, Faisal; Abuhussein, Abdullah; Shiva, Sajjan IEEE access, 2019, Letnik: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Security and privacy are among the key barriers to adopting the Internet of Medical Things (IoMT) solutions. IoMT adopters have to adhere to security and privacy policies to ensure that patient data ...
Celotno besedilo

PDF
4.
  • Uncertainty Aware T2SS Base... Uncertainty Aware T2SS Based Dyna-Q-Learning Framework for Task Scheduling in Grid Computing
    Bhargavi, K.; Shiva, Sajjan G. Cybernetics and Information Technologies, 09/2022, Letnik: 22, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Task scheduling is an important activity in parallel and distributed computing environment like grid because the performance depends on it. Task scheduling gets affected by behavioral and primary ...
Celotno besedilo
5.
  • Network Intrusion Detection... Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection
    Das, Saikat; Saha, Sajal; Priyoti, Annita Tahsin ... IEEE eTransactions on network and service management, 2022-Dec., 2022-12-00, 20221201, Letnik: 19, Številka: 4
    Journal Article
    Recenzirano

    Proper security solutions in the cyber world are crucial for enforcing network security by providing real-time network protection against network vulnerabilities and data exploitation. An effective ...
Celotno besedilo
6.
  • Type-2-Soft-Set Based Uncer... Type-2-Soft-Set Based Uncertainty Aware Task Offloading Framework for Fog Computing Using Apprenticeship Learning
    Bhargavi, K.; Sathish Babu, B.; Shiva, Sajjan G. Cybernetics and Information Technologies, 03/2023, Letnik: 23, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Fog computing is one of the emerging forms of cloud computing which aims to satisfy the ever-increasing computation demands of the mobile applications. Effective offloading of tasks leads to ...
Celotno besedilo
7.
  • Fuzzy Neutrosophic Soft Set... Fuzzy Neutrosophic Soft Set Based Transfer-Q-Learning Scheme for Load Balancing in Uncertain Grid Computing Environments
    Bhargavi, K; Shiva, Sajjan G. Cybernetics and Information Technologies, 11/2022, Letnik: 22, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Effective load balancing is tougher in grid computing compared to other conventional distributed computing platforms due to its heterogeneity, autonomy, scalability, and adaptability characteristics, ...
Celotno besedilo
8.
  • Ensembling Supervised and U... Ensembling Supervised and Unsupervised Machine Learning Algorithms for Detecting Distributed Denial of Service Attacks
    Das, Saikat; Ashrafuzzaman, Mohammad; Sheldon, Frederick T. ... Algorithms, 03/2024, Letnik: 17, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly ...
Celotno besedilo
9.
  • A Survey of Game Theory as ... A Survey of Game Theory as Applied to Network Security
    Roy, S.; Ellis, C.; Shiva, S. ... 2010 43rd Hawaii International Conference on System Sciences, 2010-Jan.
    Conference Proceeding

    Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two decades. However, the ...
Celotno besedilo
10.
Celotno besedilo
1 2 3 4 5
zadetkov: 131

Nalaganje filtrov