A scalable distributed machine learning approach for attack detection in edge computing environments
暂无分享,去创建一个
Michal Choras | Francesco Palmieri | Rafal Kozik | Massimo Ficco | M. Choraś | F. Palmieri | M. Ficco | R. Kozik
[1] Francesco Palmieri,et al. An uncertainty-managing batch relevance-based approach to network anomaly detection , 2015, Appl. Soft Comput..
[2] Jun Zhang,et al. The verifiable secure schemes for resisting attacks in cloud deduplication services , 2016 .
[3] Tianbo Lu,et al. Analysis of security threats and vulnerability for cyber-physical systems , 2013, Proceedings of 2013 3rd International Conference on Computer Science and Network Technology.
[4] Daisuke Mashima,et al. Towards Secure Demand-Response Systems on the Cloud , 2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems.
[5] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[6] Xiaoqing Frank Liu,et al. Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems , 2011, 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion.
[7] José L. Martínez Lastra,et al. Orchestration of service-oriented manufacturing processes , 2005, 2005 IEEE Conference on Emerging Technologies and Factory Automation.
[8] Wojciech Czarnecki,et al. Weighted Tanimoto Extreme Learning Machine with Case Study in Drug Discovery , 2015, IEEE Computational Intelligence Magazine.
[9] Madoka Yuriyama,et al. Integrated cloud computing environment with IT resources and sensor devices , 2011, Int. J. Space Based Situated Comput..
[10] Yenumula B. Reddy,et al. Cloud-Based Cyber Physical Systems: Design Challenges and Security Needs , 2014, 2014 10th International Conference on Mobile Ad-hoc and Sensor Networks.
[11] Swapnaja Hiray,et al. Context-Aware Middleware in Cyber Physical Cloud (CAMCPC) , 2013, 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies.
[12] Francesco Palmieri,et al. Network anomaly detection through nonlinear analysis , 2010, Comput. Secur..
[13] Jemal H. Abawajy,et al. Detecting and Mitigating HX-DoS Attacks against Cloud Web Services , 2012, 2012 15th International Conference on Network-Based Information Systems.
[14] Alfredo De Santis,et al. Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.
[15] Ehab Al-Shaer,et al. A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Transactions on Smart Grid.
[16] Alejandro Zunino,et al. An empirical comparison of botnet detection methods , 2014, Comput. Secur..
[17] Meikang Qiu,et al. Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data , 2017, IEEE Systems Journal.
[18] Nobuo Funabiki,et al. Classification extension based on IoT-big data analytic for smart environment monitoring and analytic in real-time system , 2017, Int. J. Space Based Situated Comput..
[19] Ing-Ray Chen,et al. A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..
[20] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[21] Luis E. Gonzalez Moctezuma,et al. Security in Cloud-Based Cyber-Physical Systems , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
[22] Ana R. Cavalli,et al. An Effective Attack Detection Approach in Wireless Mesh Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.