Redirigiendo al acceso original de articulo en 23 segundos...
Inicio  /  Nauka ta Progres Transportu  /  Núm: 5 Par: 0 (2020)  /  Artículo
ARTÍCULO
TITULO

DETECTION OF ATTACKS ON A COMPUTER NETWORK BASED ON THE USE OF NEURAL NETWORKS COMPLEX

I. V. Zhukovyts'kyy    
V. M. Pakhomova    
D. O. Ostapets    
O. I. Tsyhanok    

Resumen

No disponible

 Artículos similares

       
 
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber    
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, w... ver más
Revista: Future Internet

 
Haedam Kim, Suhyun Park, Hyemin Hong, Jieun Park and Seongmin Kim    
As the size of the IoT solutions and services market proliferates, industrial fields utilizing IoT devices are also diversifying. However, the proliferation of IoT devices, often intertwined with users? personal information and privacy, has led to a cont... ver más
Revista: Future Internet

 
Chinyang Henry Tseng, Woei-Jiunn Tsaur and Yueh-Mao Shen    
In detecting large-scale attacks, deep neural networks (DNNs) are an effective approach based on high-quality training data samples. Feature selection and feature extraction are the primary approaches for data quality enhancement for high-accuracy intrus... ver más
Revista: Future Internet

 
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam    
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e... ver más
Revista: Future Internet

 
Amjad Alraizza and Abdulmohsen Algarni    
Ransomware attacks pose significant security threats to personal and corporate data and information. The owners of computer-based resources suffer from verification and privacy violations, monetary losses, and reputational damage due to successful ransom... ver más