6
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Design of network security monitoring system based on CNN and exponential weighted D-S evidence theory

ORCID Icon, &
Received 05 Mar 2024, Accepted 10 Jun 2024, Published online: 17 Jun 2024

References

  • Hebbi C, Mamatha H. Comprehensive dataset building and recognition of isolated handwritten kannada characters using machine learning models. Artif Intell Appl. 2023;1(3):179–190. doi: 10.47852/bonviewAIA3202624
  • Philip NY, Rodrigues JJ, Wang H, et al. Internet of Things for in-home health monitoring systems: current advances, challenges and future directions. IEEE J Sel Areas Commun. 2021;39(2):300–310. doi: 10.1109/JSAC.2020.3042421
  • Ling Z, Hao ZJ. An intrusion detection system based on normalized mutual information antibodies feature selection and adaptive quantum artificial immune system. Int J Semantic Web Inform Systems (IJSWIS). 2022;18(1):1–25. doi: 10.4018/IJSWIS.308469
  • Tang F, Mao B, Kato N, et al. Comprehensive survey on machine learning in vehicular network: technology, applications and challenges. IEEE Commun Surv Tutorials. 2021;23(3):2027–2057. doi: 10.1109/COMST.2021.3089688
  • Gao P, Li J, Liu S. An introduction to key technology in artificial intelligence and big data driven e-learning and e-education. Mobile Networks Appl. 2021;26(5):2123–2126. doi: 10.1007/s11036-021-01777-7
  • Heidari A, Jabraeil Jamali MA. Internet of things intrusion detection systems: a comprehensive review and future directions. Cluster Comput. 2023;26(6):3753–3780. doi: 10.1007/s10586-022-03776-z
  • Sarker IH, Khan AI, Abushark YB, et al. Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mobile Netw Appl. 2023;28(1):296–312. doi: 10.1007/s11036-022-01937-3
  • Zhan T, Chen S. An improved hash algorithm for monitoring network traffic in the internet of things. Cluster Comput. 2023;26(2):961–976. doi: 10.1007/s10586-022-03623-1
  • Zakroum M, Francois J, Chrisment I, et al. Monitoring network telescopes and inferring anomalous traffic through the prediction of probing rates. IEEE Trans Network Serv Manage. 2022;19(4):5170–5182. doi: 10.1109/TNSM.2022.3183497
  • Qi W, Su H. A cybertwin based multimodal network for ecg patterns monitoring using deep learning. IEEE Trans Ind Inform. 2022;18(10):6663–6670. doi: 10.1109/TII.2022.3159583
  • Krishnan P, Jain K, Buyya R, et al. MUD-based behavioral profiling security framework for software-defined IoT networks. IEEE Int Things J. 2021;9(9):6611–6622. doi: 10.1109/JIOT.2021.3113577
  • Ling Z, Hao ZJ. Intrusion detection using normalized mutual information feature selection and parallel quantum genetic algorithm. Int J Semantic Web Inform Systems (IJSWIS). 2022;18(1):1–24. doi: 10.4018/IJSWIS.307324
  • Zhao J, Zhou Y, Shi B, et al. Multi-stage fusion and multi-source attention network for multi-modal remote sensing image segmentation. ACM Trans Intell Syst Technol. 2021;12(6):1–20. doi: 10.1145/3484440
  • Wu J, Fang L, Meng J, et al. Optimized multi-source fusion based state of health estimation for lithium-ion battery in fast charge applications. IEEE Trans Energy Convers. 2021;37(2):1489–1498. doi: 10.1109/TEC.2021.3137423
  • Nishanth N, Mujeeb A. Modeling and detection of flooding-based denial of service attacks in wireless ad hoc networks using uncertain reasoning. IEEE Trans Cogn Commun Netw. 2021;7(3):893–904. doi: 10.1109/TCCN.2021.3055503
  • Young SI, Zhe W, Taubman D, et al. Transform quantization for CNN compression. IEEE Trans Pattern Anal Mach Intell. 2021;44(9):5700–5714. doi: 10.1109/TPAMI.2021.3084839
  • Zhang Q, Xiao J, Tian C, et al. A robust deformed convolutional neural network (CNN) for image denoising. CAAI Trans Intel Tech. 2023;8(2):331–342. doi: 10.1049/cit2.12110
  • Ebrahimi M, Haghighi MS, Jolfaei A, et al. A secure and decentralized trust management scheme for smart health systems. IEEE J Biomed Health Inform. 2021;26(5):1961–1968. doi: 10.1109/JBHI.2021.3107339
  • Goda T, L’ecuyer P. Construction-free median quasi-Monte Carlo rules for function spaces with unspecified smoothness and general weights. SIAM J Sci Comput. 2022;44(4):2765–2788. doi: 10.1137/22M1473625
  • Li Y, Sha J, Geng R. Research on internal network data security monitoring method based on NB-IOT. Web Intelligence. 2021;19(3):191–202. doi: 10.3233/WEB-210466
  • Tan L, Yu K, Ming F, et al. Secure and resilient artificial intelligence of things: a HoneyNet approach for threat detection and situational awareness. IEEE Consumer Electron Mag. 2021;11(3):69–78. doi: 10.1109/MCE.2021.3081874
  • Nguyen D, Vadaine R, Hajduch G, et al. GeoTrackNet—A maritime anomaly detector using probabilistic neural network representation of AIS tracks and a contrario detection. IEEE Trans Intell Transp Syst. 2021;23(6):5655–5667. doi: 10.1109/TITS.2021.3055614

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.