Uneingeschränkter Zugang

Knowledge Graph Based Large Scale Network Security Threat Detection Techniques

  
31. Jan. 2024

Zitieren
COVER HERUNTERLADEN

Gao, J. (2017). A support vector machine model for computer network security technology. Boletin Tecnico/Technical Bulletin, 55(12), 564-568. Search in Google Scholar

Sun, N., Li, T., Song, G., & Xia, H. (2021). Network security technology of intelligent information terminal based on mobile internet of things. Mobile Information Systems. Search in Google Scholar

Xie, L., Hang, F., Guo, W., Lv, Y., Ou, W., & Shibly, F. H. A. (2021). Network security defence system based on artificial intelligence and big data technology. International journal of high performance systems architecture(3/4), 10. Search in Google Scholar

Al Tabash, K., & Happa, J. (2018). Insider-threat detection using gaussian mixture models and sensitivity profiles. Computers & Security, 77(AUG.), 838-859. Search in Google Scholar

Kayhan, V. O., Agrawal, M., & Shivendu, S. (2023). Cyber threat detection: unsupervised hunting of anomalous commands (uhac). Decision Support Systems. Search in Google Scholar

Al-Mhiqani, M. N., Ahmad, R., Abidin, Z. Z., Abdulkareem, K. H., Mohammed, M. A., & Gupta, D., et al. (2022). A new intelligent multilayer framework for insider threat detection. Computers & Electrical Engineering, 97, 107597-. Search in Google Scholar

Charan, P., Anand, P., & Shukla, S. (2021). Dmapt: study of data mining and machine learning techniques in advanced persistent threat attribution and detection. Artificial Intelligence. Search in Google Scholar

Szynkiewicz, P., & Kozakiewicz, A. (2017). Design and evaluation of a system for network threat signatures generation. Journal of Computational Science, 22(sep.), 187-197. Search in Google Scholar

Beechey, M., Kyriakopoulos, K. G., & Lambotharan, S. (2021). Evidential classification and feature selection for cyber-threat hunting. Knowledge-Based Systems, 226, 107120-. Search in Google Scholar

Poudel, B. P., Mustafa, A., Bidram, A., & Modares, H. (2020). Detection and mitigation of cyber-threats in the dc microgrid distributed control system. International Journal of Electrical Power & Energy Systems, 120(7), 105968. Search in Google Scholar

Xie, J., Li, S., Zhang, Y., Sun, P., & Xu, H. (2022). Analysis and detection against network attacks in the overlapping phenomenon of behavior attribute. Computers & Security. Search in Google Scholar

Sun, W., Guan, S., Wang, P., & Wu, Q. (2022). A hybrid deep learning model based low‐rate dos attack detection method for software defined network. Transactions on Emerging Telecommunications Technologies(5), 33. Search in Google Scholar

Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P. L., Iorkyase, E., & Tachtatzis, C., et al. (2017). Threat analysis of iot networks using artificial neural network intrusion detection system. Tetrahedron letters, 42(39), 6865-6867. Search in Google Scholar

Xu, Y., Zhang, X., Lu, C., Qiu, Z., Bi, C., & Lai, Y., et al. (2021). Network threat detection based on group cnn for privacy protection. Wireless Communications and Mobile Computing. Search in Google Scholar

Zhou, J., Wu, Z., Xue, Y., Li, M., & Zhou, D. (2021). Network unknown-threat detection based on a generative adversarial network and evolutionary algorithm. International Journal of Intelligent Systems. Search in Google Scholar

Wozniak, M., Silka, J., Wieczorek, M., & Alrashoud, M. (2021). Recurrent neural network model for iot and networking malware threat detection. IEEE transactions on industrial informatics(8), 17. Search in Google Scholar

Gao, P., Yang, W., Zhang, H., Wei, X., Huang, H., & Luo, W., et al. (2022). Detecting unknown threat based on continuous-time dynamic heterogeneous graph network. Wireless Communications and Mobile Computing. Search in Google Scholar

Mahdavifar, S. G. A. A. (2020). Dennes: deep embedded neural network expert system for detecting cyber attacks. Neural computing & applications, 32(18). Search in Google Scholar

N.-E., P., Y.-R., L., Joo, S., S.-H., K., J.-Y., P., & S.-Y., K., et al. (2023). Performance evaluation of a fast and efficient intrusion detection framework for advanced persistent threat-based cyberattacks. Computers and Electrical Engineering. Search in Google Scholar

Steno, P., Alsadoon, A., Prasad, P. W. C., Al-Dala’In, T., & Alsadoon, O. H. (2021). A novel enhanced region proposal network and modified loss function: threat object detection in secure screening using deep learning. Journal of supercomputing(4), 77. Search in Google Scholar

Li, X. G., & Wang, J. F. (2018). Traffic detection of transmission of botnet threat using bp neural network. Neural Network World, 28(6), 511-521. Search in Google Scholar

Zhang, Y., Wei, J., & Wang, K. (2020). An edge ids based on biological immune principles for dynamic threat detection. Wireless Communications and Mobile Computing. Search in Google Scholar

Zhou, Y., & Wang, P. (2019). An ensemble learning approach for xss attack detection with domain knowledge and threat intelligence. Computers & Security, 82(MAY), 261-269. Search in Google Scholar

Yuan, S., & Wu, X. (2021). Deep learning for insider threat detection: review, challenges and opportunities. Computers & Security, 104(C), 102221. Search in Google Scholar

Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
1 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Biologie, Biologie, andere, Mathematik, Angewandte Mathematik, Mathematik, Allgemeines, Physik, Physik, andere