Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, i...
| Main Authors: | Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Khalaf, Bashar Ahmad, Mostafa, Salama A. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
De Gruyter
2023
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/8775/ http://eprints.uthm.edu.my/8775/1/J15750_9d9880322873c2021c6ffa0622006ab4.pdf |
Similar Items
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023)
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Trust Evaluation Model in IoT Environment: A Comprehensive Survey
by: ABDULKARIM ALHANDI, SOMYA, et al.
Published: (2023)
by: ABDULKARIM ALHANDI, SOMYA, et al.
Published: (2023)
Development of new all-optical signal regeneration technique
by: Das, Bhagwan, et al.
Published: (2017)
by: Das, Bhagwan, et al.
Published: (2017)
Control and prediction of traffic crashes in the residential streets in Iraq using the expert system
by: Mohammed, Ali Ahmed
Published: (2022)
by: Mohammed, Ali Ahmed
Published: (2022)
Innovator-firm collaboration: the moderating role of transactional capacity (TC)
by: Abdul Hamid, Norhadilah, et al.
Published: (2018)
by: Abdul Hamid, Norhadilah, et al.
Published: (2018)
A study on the effect of stroop test on the formation of students discipline by using the Heart Rate Variability (HRV) technique
by: Hamzah, Shahidah, et al.
Published: (2018)
by: Hamzah, Shahidah, et al.
Published: (2018)
Reduction Of Sulphate In Waste
Recycle Aggregate Using Bacillus Subtilis
by: Abdul Aziz, Nurhanim
Published: (2018)
by: Abdul Aziz, Nurhanim
Published: (2018)
LCL filter design based on ripple current minimization approach for grid-connected inverter application
by: Yaakub, Muhamad Faizal, et al.
Published: (2021)
by: Yaakub, Muhamad Faizal, et al.
Published: (2021)
The Design and Development of Smart Agriculture Data
Analytics
by: Marjudi, Suziyanti, et al.
Published: (2023)
by: Marjudi, Suziyanti, et al.
Published: (2023)
Fabrication of graphene-based resistive sensor for eschericia coli bacteria sensing
by: Wibowo, Kusnanto Mukti
Published: (2018)
by: Wibowo, Kusnanto Mukti
Published: (2018)
The optimization of graphene sensing layer against Escherichia coli
by: Muslihati, Atqiya
Published: (2021)
by: Muslihati, Atqiya
Published: (2021)
A smart vision inspection system on step-NC machine with IOT Environment
by: Mohammed Saif, Yazid Abdullsameea
Published: (2022)
by: Mohammed Saif, Yazid Abdullsameea
Published: (2022)
Rekabentuk model sistem guna semula air wudhuk
by: Abd Rahman, Misbahul Muneer, et al.
Published: (2014)
by: Abd Rahman, Misbahul Muneer, et al.
Published: (2014)
Biopattern: a biomimetic design framework for generating bio-inspired design (biomimicry)
by: Foo, Chin Thoong
Published: (2020)
by: Foo, Chin Thoong
Published: (2020)
Informative top-k class associative rule for cancer biomarker discovery on microarray data
by: Ong, Huey Fang, et al.
Published: (2020)
by: Ong, Huey Fang, et al.
Published: (2020)
An Application of Biometric Security Identification for Automated Teller Machine
by: Zulkifli, Izyan Fatin Dalila, et al.
Published: (2020)
by: Zulkifli, Izyan Fatin Dalila, et al.
Published: (2020)
Pengesan pH air automatik
by: Abd. Jabar, Nur Shahira, et al.
Published: (2021)
by: Abd. Jabar, Nur Shahira, et al.
Published: (2021)
Sistem pengurusan syukor batik menggunakan aplikasi mudah alih
by: Che Mohd Zainudin, Wan Azra Balqis, et al.
Published: (2021)
by: Che Mohd Zainudin, Wan Azra Balqis, et al.
Published: (2021)
Alat pengesan paras dan kualiti air sistem menara pendingin berbantukan IoT
by: Diris, Siti Nur Fazirah, et al.
Published: (2021)
by: Diris, Siti Nur Fazirah, et al.
Published: (2021)
New methods of windowing for reducing the out of band emission with low complexity in the 5G waveform
by: Hammoodi, Ahmed Talaat
Published: (2022)
by: Hammoodi, Ahmed Talaat
Published: (2022)
Development of welding fumes health index (WFHI) for welding workplace’s safety and health assessment
by: Hariri, Azian, et al.
Published: (2014)
by: Hariri, Azian, et al.
Published: (2014)
Determination of customer requirement for welding fumes index development in automotive industries by using quality function deployment approach
by: Hariri, Azian, et al.
Published: (2014)
by: Hariri, Azian, et al.
Published: (2014)
Validation of requirements for transformation of an urban district to a smart city
by: Ibrahim, Rosziati, et al.
Published: (2021)
by: Ibrahim, Rosziati, et al.
Published: (2021)
IoT based smart irrigation control and monitoring system
by: Abu Hassan, Omar, et al.
Published: (2020)
by: Abu Hassan, Omar, et al.
Published: (2020)
Perceived captology strategies in mobile applications: do they differ?
by: Abdullah, N.A., et al.
Published: (2018)
by: Abdullah, N.A., et al.
Published: (2018)
A mobile forensic visualization tool for android data partition
by: Chow, Xiang Quan, et al.
Published: (2021)
by: Chow, Xiang Quan, et al.
Published: (2021)
Cloud denial of service detection by dendritic cell mechanism
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic
by: Ahmed Khalaf, Bashar
Published: (2019)
by: Ahmed Khalaf, Bashar
Published: (2019)
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Lattice structural analysis on sniffing to denial of service attacks
by: B., Prabadevi, et al.
Published: (2019)
by: B., Prabadevi, et al.
Published: (2019)
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
Flooding Distributed Denial of Service Attacks-A Review
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdulhafiz, et al.
Published: (2024)
Distributed denial of service attack Detection in IoT networks using deep learning and feature fusion : A review
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
by: Nuhu Ahmad, Abdul hafiz, et al.
Published: (2024)
Similar Items
-
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Firas Mohammed Aswad, Firas Mohammed Aswad, et al.
Published: (2023) -
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023) -
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023) -
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023) -
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)