DIADL: An Energy Efficient Framework for Detecting Intrusion Attack Using Deep LearnIing
Abstract
References
Index Terms
- DIADL: An Energy Efficient Framework for Detecting Intrusion Attack Using Deep LearnIing
Recommendations
Research: Model for network behaviour under viral attack
Computer viruses, worms and Trojan horses pose the most severe intrusion threat against an automated environment, especially if this environment is distributed and the ability to enforce physical access control is very limited. These structures are also ...
Automated containment of rootkits attacks
Rootkit attacks are a serious threat to computer systems. Packaged with other malwares such as worms, viruses and spyware, rootkits pose a more potent threat than ever before by allowing malware to evade detection. In the absence of appropriate tools to ...
Modeling host-based detection and active worm containment
CNS '08: Proceedings of the 11th communications and networking simulation symposiumRecent advancements in Internet worms propagation techniques has generated interest in the development of appropriate defense techniques against such worms. Modeling the behaviour of worm defense techniques to better understand and measure their defense ...
Comments
Information & Contributors
Information
Published In
In-Cooperation
- Central Queensland University
- DUT: Dalian University of Technology
- University of Wollongong, Australia
- Swinburne University of Technology
- University of Technology Sydney
- National Tsing Hua University: National Tsing Hua University
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 45Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in