Soft computing for anomaly detection and prediction to mitigate IoT-based real-time abuse
Abstract
References
Recommendations
Modeling host-based detection and active worm containment
CNS '08: Proceedings of the 11th communications and networking simulation symposiumRecent advancements in Internet worms propagation techniques has generated interest in the development of appropriate defense techniques against such worms. Modeling the behaviour of worm defense techniques to better understand and measure their defense ...
A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of things
Internet of things (IoT) is rapidly expanding, and it is having a greater impact on daily life. The internet of things is widely applied in a wide range of industries, from small to large. IoT-based is a collection of distributed smart devices with ...
Intrusion Detection: Tools, Techniques and Strategies
SIGUCCS '14: Proceedings of the 42nd annual ACM SIGUCCS conference on User servicesIntrusion detection is an important aspect of modern cyber-enabled infrastructure in identifying threats to digital assets. Intrusion detection encompasses tools, techniques and strategies to recognize evolving threats thereby contributing to a secure ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in