[PDF][PDF] DDoS attack intrusion detection system based on hybridization of CNN and LSTM
ASA Issa, Z Albayrak - Acta Polytechnica Hungarica, 2023 - researchgate.net
A distributed denial-of-service (DDoS) attack is one of the most pernicious threats to network
security. DDoS attacks are considered one of the most common attacks among all network …
security. DDoS attacks are considered one of the most common attacks among all network …
Detecting cyber attacks with high-frequency features using machine learning algorithms
In computer networks, intrusion detection systems are used to detect cyber-attacks and
anomalies. Feature selection is important for intrusion detection systems to scan the network …
anomalies. Feature selection is important for intrusion detection systems to scan the network …
[PDF][PDF] Cybersecurity Attack Detection Model, Using Machine Learning Techniques
Millions of people use the web every day, in this age of technology and the internet.
Protecting the privacy and security of these users is a significant challenge for cybersecurity …
Protecting the privacy and security of these users is a significant challenge for cybersecurity …
Deep learning framework for stock price prediction using long short-term memory
SK Chandar - Soft Computing, 2024 - Springer
Forecasting stock prices is always considered as complicated process due to the dynamic
and noisy characteristics of stock data influenced by external factors. For predicting the stock …
and noisy characteristics of stock data influenced by external factors. For predicting the stock …
A DDoS attack detection method based on deep learning two-level model CNN-LSTM in SDN network
M Li, B Zhang, G Wang, B ZhuGe… - … Conference on Cloud …, 2022 - ieeexplore.ieee.org
This paper mainly explores the detection and defense of DDoS attacks in the SDN
architecture of the 5G environment, and proposes a DDoS attack detection method based on …
architecture of the 5G environment, and proposes a DDoS attack detection method based on …
[PDF][PDF] Intrusion Detection System Based On Machine Learning And Deep Learning Techniques: A Review
SA Sharafali, NH Fallooh, MH Ali - researchgate.net
Because of the rapid development of modern computer networks, many new challenges and
threats to information security have appeared, such as attacks, digital intrusion, data theft …
threats to information security have appeared, such as attacks, digital intrusion, data theft …
[CITAZIONE][C] DDOS ATTACK DETECTION BASED ON MACHINE LEARNING
ASA ISSA - 2022