ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis
Journal of Hardware and Systems Security
◽
10.1007/s41635-018-0061-2
◽
2019
◽
Vol 3
(2)
◽
pp. 164-176
◽
Cited By ~ 4
Author(s):
Hossein Abbasi
◽
Naser Ezzati-Jivan
◽
Martine Bellaiche
◽
Chamseddine Talhi
◽
Michel R. Dagenais
Keyword(s):
Machine Learning
◽
Trace Analysis
◽
Attack Detection
◽
Detection Technique
◽
Execution Trace
Download Full-text
Related Documents
Cited By
References
trcview: Interactive Architecture Agnostic Execution Trace Analysis
17th International Conference on Managed Programming Languages and Runtimes
◽
10.1145/3426182.3426190
◽
2020
◽
Author(s):
Daniel Pekarek
◽
Hanspeter Mössenböck
Keyword(s):
Trace Analysis
◽
Interactive Architecture
◽
Execution Trace
Download Full-text
Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques
Soft Computing
◽
10.1007/s00500-021-05926-8
◽
2021
◽
Author(s):
Ahmad Ali AlZubi
◽
Mohammed Al-Maitah
◽
Abdulaziz Alarifi
Keyword(s):
Machine Learning
◽
Physical System
◽
Attack Detection
◽
Machine Learning Techniques
◽
Cyber Physical System
◽
Cyber Attack
◽
Learning Techniques
Download Full-text
Deceiving Machine Learning-Based Saturation Attack Detection Systems in SDN
2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
◽
10.1109/nfv-sdn50289.2020.9289908
◽
2020
◽
Author(s):
Samer Y Khamaiseh
◽
Izzat Alsmadi
◽
Abdullah Al-Alaj
Keyword(s):
Machine Learning
◽
Attack Detection
◽
Detection Systems
Download Full-text
Web Attack Detection through Network-Traffic-Based Feature Engineering and Machine Learning
Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
◽
10.1145/3444370.3444555
◽
2020
◽
Author(s):
Jian Yang
◽
Hao Wang
◽
Yueming Lu
Keyword(s):
Machine Learning
◽
Network Traffic
◽
Attack Detection
◽
Feature Engineering
Download Full-text
Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms
2021 IEEE International Systems Conference (SysCon)
◽
10.1109/syscon48628.2021.9447092
◽
2021
◽
Author(s):
Admilson de Ribamar Lima Ribeiro
◽
Reneilson Yves Carvalho Santos
◽
Anderson Clayton Alves Nascimento
Keyword(s):
Machine Learning
◽
Intrusion Detection
◽
Anomaly Detection
◽
Data Stream
◽
Learning Algorithms
◽
Machine Learning Algorithms
◽
Detection Technique
◽
Continuous Data
Download Full-text
Active Machine Learning Adversarial Attack Detection in the User Feedback Process
IEEE Access
◽
10.1109/access.2021.3063002
◽
2021
◽
pp. 1-1
Author(s):
Victor R. Kebande
◽
Sadi Alawadi
◽
Feras Awaysheh
◽
Jan A. Persson
Keyword(s):
Machine Learning
◽
User Feedback
◽
Attack Detection
◽
Feedback Process
◽
Adversarial Attack
Download Full-text
Utility classes detection metrics for execution trace analysis
2017 8th International Conference on Information Technology (ICIT)
◽
10.1109/icitech.2017.8080044
◽
2017
◽
Cited By ~ 1
Author(s):
Hasan Abualese
◽
Putra Sumari
◽
Thamer Al-Rousan
◽
Mohammad Rasmi Al-Mousa
Keyword(s):
Trace Analysis
◽
Execution Trace
Download Full-text
A Machine Learning Approach for Backoff Manipulation Attack Detection in Cognitive Radio
IEEE Access
◽
10.1109/access.2020.3046637
◽
2020
◽
Vol 8
◽
pp. 227349-227359
Author(s):
Wassim Fassi Fihri
◽
Hassan El Ghazi
◽
Badr Abou El Majd
◽
Faissal El Bouanani
Keyword(s):
Machine Learning
◽
Cognitive Radio
◽
Attack Detection
◽
Learning Approach
◽
Machine Learning Approach
Download Full-text
Ward_p_HMM: A Shilling Attack Detection Technique Using Ward_p Method and Hidden Markov Model
Computación y Sistemas
◽
10.13053/cys-25-3-3907
◽
2021
◽
Vol 25
(3)
◽
Author(s):
Keya Chowdhury
◽
Abhishek Majumder
◽
Joy Lal Sarkar
◽
Sukanta Chakraborty
◽
Sudipta Roy
Keyword(s):
Markov Model
◽
Hidden Markov Model
◽
Hidden Markov
◽
Attack Detection
◽
Detection Technique
◽
Shilling Attack
◽
Shilling Attack Detection
Download Full-text
Botnet attack detection in Internet of Things devices over cloud environment via machine learning
Concurrency and Computation Practice and Experience
◽
10.1002/cpe.6662
◽
2021
◽
Author(s):
Muhammad Waqas
◽
Kamlesh Kumar
◽
Asif Ali Laghari
◽
Umair Saeed
◽
Muhammad Malook Rind
◽
...
Keyword(s):
Machine Learning
◽
Internet Of Things
◽
Attack Detection
◽
Cloud Environment
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close