Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access


    IoT Wireless Intrusion Detection and Network Traffic Analysis

    Vasaki Ponnusamy1, Aun Yichiet1, NZ Jhanjhi2,*, Mamoona humayun3, Maram Fahhad Almufareh3

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 865-879, 2022, DOI:10.32604/csse.2022.018801

    Abstract Enhancement in wireless networks had given users the ability to use the Internet without a physical connection to the router. Almost every Internet of Things (IoT) devices such as smartphones, drones, and cameras use wireless technology (Infrared, Bluetooth, IrDA, IEEE 802.11, etc.) to establish multiple inter-device connections simultaneously. With the flexibility of the wireless network, one can set up numerous ad-hoc networks on-demand, connecting hundreds to thousands of users, increasing productivity and profitability significantly. However, the number of network attacks in wireless networks that exploit such flexibilities in setting and tearing down networks has become very alarming. Perpetrators can launch… More >

  • Open Access


    A Novel Intrusion Detection Algorithm Based on Long Short Term Memory Network

    Xinda Hao1, Jianmin Zhou2,*, Xueqi Shen1, Yu Yang1

    Journal of Quantum Computing, Vol.2, No.2, pp. 97-104, 2020, DOI:10.32604/jqc.2020.010819

    Abstract In recent years, machine learning technology has been widely used for timely network attack detection and classification. However, due to the large number of network traffic and the complex and variable nature of malicious attacks, many challenges have arisen in the field of network intrusion detection. Aiming at the problem that massive and high-dimensional data in cloud computing networks will have a negative impact on anomaly detection, this paper proposes a Bi-LSTM method based on attention mechanism, which learns by transmitting IDS data to multiple hidden layers. Abstract information and high-dimensional feature representation in network data messages are used to… More >

Displaying 1-10 on page 1 of 2. Per Page