[PDF][PDF] Attack Intention Recognition: A Review.
AA Ahmed, NAK Zaman - Int. J. Netw. Secur., 2017 - academia.edu
Sensitive information faces critical risks when it is transmitted through computer networks.
Existing protection systems are still limited in their capacities to ensure network information …
Existing protection systems are still limited in their capacities to ensure network information …
Deep learning-based classification model for botnet attack detection
Botnets are vectors through which hackers can seize control of multiple systems and
conduct malicious activities. Researchers have proposed multiple solutions to detect and …
conduct malicious activities. Researchers have proposed multiple solutions to detect and …
Twitter sentiment analysis, 3-way classification: positive, negative or neutral?
MF Çeliktuğ - 2018 IEEE International Conference on Big Data …, 2018 - ieeexplore.ieee.org
People face with the huge amount of information on each day with the advent of big data
era. The data amount stored and processed by Facebook, Twitter and other big social …
era. The data amount stored and processed by Facebook, Twitter and other big social …
Four decades of data mining in network and systems management
How has the interdisciplinary data mining field been practiced in Network and Systems
Management (NSM)? In Science and Technology, there is a wide use of data mining in …
Management (NSM)? In Science and Technology, there is a wide use of data mining in …
Filtration model for the detection of malicious traffic in large-scale networks
This study proposes a capable, scalable, and reliable edge-to-edge model for filtering
malicious traffic through real-time monitoring of the impact of user behavior on quality of …
malicious traffic through real-time monitoring of the impact of user behavior on quality of …
Traceback model for identifying sources of distributed attacks in real time
Locating sources of distributed attack is time‐consuming; attackers are identified long after
the attack is completed. This paper proposes a trackback model for identifying attackers and …
the attack is completed. This paper proposes a trackback model for identifying attackers and …
Securing user credentials in web browser: review and suggestion
AA Ahmed, LM Khay - 2017 ieee conference on big data and …, 2017 - ieeexplore.ieee.org
Web browsers that run on a computer often keep sensitive information such as user
credentials and saving account numbers. With modern technology, all Web applications …
credentials and saving account numbers. With modern technology, all Web applications …
Mutual authentication for mobile cloud computing: Review and suggestion
AA Ahmed, K Wendy - 2017 IEEE Conference on Application …, 2017 - ieeexplore.ieee.org
With the combination of mobile computing technology and cloud computing, mobile users
have the advantage of mobility, resources, and access availability to the Internet to …
have the advantage of mobility, resources, and access availability to the Internet to …
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
AA Ahmed - … Intelligence in Information Systems: Proceedings of the …, 2019 - Springer
Botnet represent a critical threat to computer networks because their behavior allows
hackers to take control of many computers simultaneously. Botnets take over the device of …
hackers to take control of many computers simultaneously. Botnets take over the device of …
A delay-oriented prioritization policy based on cooperative lossless buffering in PTN domains
FJ Rodríguez-Pérez, JL González-Sánchez… - Journal of Network and …, 2015 - Springer
New kinds of services and data flows, such as cloud computing, server virtualization, or
quality of service (QoS)-aware Internet services, have led to higher demands on network …
quality of service (QoS)-aware Internet services, have led to higher demands on network …