Unsupervised machine learning for networking: Techniques, applications and research challenges

M Usama, J Qadir, A Raza, H Arif, KLA Yau… - IEEE …, 2019 - ieeexplore.ieee.org
While machine learning and artificial intelligence have long been applied in networking
research, the bulk of such works has focused on supervised learning. Recently, there has …

Surveying port scans and their detection methodologies

MH Bhuyan, DK Bhattacharyya… - The Computer …, 2011 - academic.oup.com
Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port
scans of Internet protocol addresses to find vulnerable hosts to compromise. However, it is …

Adversarial Reconnaissance Mitigation and Modeling

S Roy, N Sharmin, MS Miah, JC Acosta… - arxiv preprint arxiv …, 2023 - arxiv.org
Adversarial reconnaissance is a crucial step in sophisticated cyber-attacks as it enables
threat actors to find the weakest points of otherwise well-defended systems. To thwart …

On the use of naive bayesian classifiers for detecting elementary and coordinated attacks

T Kenaza, K Tabia, S Benferhat - Fundamenta Informaticae, 2010 - content.iospress.com
Bayesian networks are very powerful tools for knowledge representation and reasoning
under uncertainty. This paper shows the applicability of naive Bayesian classifiers to two …

Effectively mining network traffic intelligence to detect malicious stealthy port scanning to cloud servers

YZ Qu, QK Lu - 網際網路技術學刊, 2014 - airitilibrary.com
Cloud computing provides a paradigm to enable convenient and on-demand network
access to a shared pool of configurable computing resources. The security challenges …

Ensemble machine learning approach for network intrusion detection

MR Al-Masud - 2019 - lib.buet.ac.bd
Due to increasing amount of cyber attack, there is a growing demand for Network intrusion
detection systems (NIDSs) which are necessary for defending from potential attacks. Cyber …

[PDF][PDF] Modeling and recognizing network scanning activities with finite mixture models and hidden Markov models

G De Santis - Universite de Lorraine, 2018 - docnum.univ-lorraine.fr
The objective of this chapter is to provide a general overview of Network Scanning Activities
(NSAs). It describes who are their performers and targets, distinguishes them between …

Учредители: Научно-исследовательский клуб «Парадигма», Жеребило Татьяна Васильевна

АВ ТИХОНОВ, КС ШЕВЧЕНКО, ДМ АСТАНИН - РЕФЛЕКСИЯ Учредители … - elibrary.ru
Культурно-историческое наследие России нуждается в комплексной поддержке со
стороны государства и бизнеса. Множество значительных архитектурных комплексов …

Naïve Bayesian based Temperature and Energy Aware Scheduling of Heterogeneous Processors

R Kabir, B Izadi - 2019 Tenth International Green and …, 2019 - ieeexplore.ieee.org
Directed acyclic graph (DAG) is a popular representation of an application, which includes
application characteristics such as task dependencies, task execution time and inter …