The role of machine learning in cybersecurity
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …
systems, and many domains already leverage the capabilities of ML. However, deployment …
Sok: Pragmatic assessment of machine learning for network intrusion detection
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …
Face detection in security monitoring based on artificial intelligence video retrieval technology
Z Dong, J Wei, X Chen, P Zheng - IEEE access, 2020 - ieeexplore.ieee.org
With the rapid development of video monitoring, the massive information of the monitoring
image has far exceeded the effective processing range of human resources. Intelligent video …
image has far exceeded the effective processing range of human resources. Intelligent video …
A survey of interest flooding attack in named-data networking: Taxonomy, performance and future research challenges
ABSTRACT Internet of Things (IoT) allows all entities such as computing devices, machines,
objects, people, etc., to interact with each other through their Internet Protocol (IP) addresses …
objects, people, etc., to interact with each other through their Internet Protocol (IP) addresses …
Security and integrity attacks in named data networking: a survey
The notion of Information-Centric Networking (ICN) specifies a new communication model
that emphasis on the content exchanged rather than the devices connected. ICN …
that emphasis on the content exchanged rather than the devices connected. ICN …
Blockchain-based cache poisoning security protection and privacy-aware access control in NDN vehicular edge computing networks
Recent advances in artificial intelligence, big data, mobile edge computing and embedded
systems have successfully driven the emergence and adoption of smart vehicles and vehicle …
systems have successfully driven the emergence and adoption of smart vehicles and vehicle …
Reliable detection of interest flooding attack in real deployment of named data networking
Named data networking (NDN) is a disruptive yet promising architecture for the future
Internet, in which the content diffusion mechanisms are shifted from the conventional host …
Internet, in which the content diffusion mechanisms are shifted from the conventional host …
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN
Several ongoing research efforts aim to design potential Future Internet Architectures,
among which Named-Data Networking (NDN) introduces a shift from the existing host …
among which Named-Data Networking (NDN) introduces a shift from the existing host …
A security certification scheme for information-centric networks
Information-Centric Networking is an emerging alternative to host-centric networking
designed for large-scale content distribution and stricter privacy requirements. Recent …
designed for large-scale content distribution and stricter privacy requirements. Recent …
Mitigating content poisoning attacks in named data networking: a survey of recent solutions, limitations, challenges and future research directions
Abstract Named Data Networking (NDN) is one of the capable applicants for the future
Internet architecture, where communications focus on content rather than providing content …
Internet architecture, where communications focus on content rather than providing content …