Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, i...
| Main Authors: | Mohammed Aswad, Firas, Mohammed Saleh Ahmed, Ali, Ali Majeed Alhammadi,, Nafea, Ahmad Khalaf, Bashar, Mostafa, Salama A. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
De Gruyter
2023
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/8567/ http://eprints.uthm.edu.my/8567/1/J15750_9d9880322873c2021c6ffa0622006ab4.pdf |
Similar Items
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023)
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Solving economic dispatch problem using particle swarm optimization
by: Syed Jamalil, Syed Akhmal
Published: (2013)
by: Syed Jamalil, Syed Akhmal
Published: (2013)
Model-building with multiply imputed data
by: Pillay, Khuneswari Gopal, et al.
Published: (2018)
by: Pillay, Khuneswari Gopal, et al.
Published: (2018)
Use of ontology approach to standardized scientific experimental data representation
by: Azram, Nur Adila, et al.
Published: (2018)
by: Azram, Nur Adila, et al.
Published: (2018)
A Foresight Study of Artificial Intelligence in the Agriculture Sector in Malaysia
by: Rodzalan, Shazaitul Azreen, et al.
Published: (2020)
by: Rodzalan, Shazaitul Azreen, et al.
Published: (2020)
Deep learning for face detection using matlab
by: Slim, Salim Adnan
Published: (2020)
by: Slim, Salim Adnan
Published: (2020)
Environmental monitoring and disease detection of plants in smart greenhouse using Internet of Things
by: Khan, Fazeel Ahmed, et al.
Published: (2020)
by: Khan, Fazeel Ahmed, et al.
Published: (2020)
An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic
by: Ahmed Khalaf, Bashar
Published: (2019)
by: Ahmed Khalaf, Bashar
Published: (2019)
Nature inspired meta-heuristic algorithms for deep learning: recent progress and novel perspective
by: Abubakar, Adamu, et al.
Published: (2019)
by: Abubakar, Adamu, et al.
Published: (2019)
Glass break detection system using deep auto encoders with fuzzy rules induction algorithm
by: Nyein Naing, Wai Yan, et al.
Published: (2019)
by: Nyein Naing, Wai Yan, et al.
Published: (2019)
Hybrid Computational Intelligence Models With Symbolic Rule Extraction For Pattern Classification
by: Quteishat, Anas Mohammad Ali
Published: (2008)
by: Quteishat, Anas Mohammad Ali
Published: (2008)
Feature map size selection for fMRI classification on end-to-end deep convolutional neural networks
by: Suhaimi, Farahana, et al.
Published: (2018)
by: Suhaimi, Farahana, et al.
Published: (2018)
Real time end-to-end glass break detection system using LSTM deep recurrent neural network
by: Nyein Naing, Wai Yan, et al.
Published: (2019)
by: Nyein Naing, Wai Yan, et al.
Published: (2019)
The process of design thesis in landscape architecture
Published: (2014)
Published: (2014)
Praxis Of Cognitive Onto-Hermeneutical Logic On Learning Machines [Q325.5. S624 2008 f rb].
by: Ramakrishnan, Sivakumar
Published: (2008)
by: Ramakrishnan, Sivakumar
Published: (2008)
The New Bayesian Surprise Rareness (BSR) Measure For Cognitive Agents' Reasoning And Decision Making
by: Davinna Jeremiah, Davinna Jeremiah
Published: (2008)
by: Davinna Jeremiah, Davinna Jeremiah
Published: (2008)
The Gamification Effect On Student Achievement, Intrinsic Motivation, Engagement, And Their Relations With Computational Thinking In A Scratch Programming Environment
by: Rakyan H., Alharbi Khalid
Published: (2023)
by: Rakyan H., Alharbi Khalid
Published: (2023)
Facial expressions emotional recognition with NAO robot
by: Mohamed, Ahmed Mahmoud
Published: (2018)
by: Mohamed, Ahmed Mahmoud
Published: (2018)
An improved algorithm for iris classification by using support vector machine and binary random machine learning
by: Kamarulzalis, Ahmad Haadzal
Published: (2018)
by: Kamarulzalis, Ahmad Haadzal
Published: (2018)
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
Modified low energy adaptive clustering hierarchy protocol for efficient energy consumption in wireless sensor networks
by: Usman, Mohammed Joda, et al.
Published: (2014)
by: Usman, Mohammed Joda, et al.
Published: (2014)
Computational intelligence techniques with application to crude oil price projection: a literature survey from 2001–2012
by: Haruna, Chiroma, et al.
Published: (2013)
by: Haruna, Chiroma, et al.
Published: (2013)
Recent advances in mobile touch screen security authentication methods: a systematic literature review
by: Ibrahim, Tahir Musa, et al.
Published: (2019)
by: Ibrahim, Tahir Musa, et al.
Published: (2019)
A novel algorithm to detect a QPSK signal with the minimum number of samples
by: Mohammed, Saleh, et al.
Published: (2015)
by: Mohammed, Saleh, et al.
Published: (2015)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Lattice structural analysis on sniffing to denial of service attacks
by: B., Prabadevi, et al.
Published: (2019)
by: B., Prabadevi, et al.
Published: (2019)
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
Flooding Distributed Denial of Service Attacks-A Review
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020)
by: Imdad, Maria, et al.
Published: (2020)
HGG351 - PERANCANGAN PEMBANGUNAN WILAYAH - SEPT 1999.
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (1999)
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (1999)
HGG451 - PERANCANGAN PEMBANGUNAN WILAYAH - APRIL 1994.
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (1994)
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (1994)
HGG451 - PERANCANGAN PEMBANGUNAN WILAYAH - OKT-NOV 1996.
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (1996)
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (1996)
HGG 433 - PERANCANGAN PEMBANGUNAN WILAYAH SEPT 1997.
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (1997)
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (1997)
HGG 451 - PERANCANGAN PEMBANGUNAN WILAYAH - APRIL 1986.
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (1986)
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (1986)
CCS 514 - ENVISIONING INFORMATION NOV 2008
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
Similar Items
-
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023) -
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023) -
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023) -
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023) -
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)