1 | Á¦¸ñ(Title) | A New Distributed Log Anomaly Detection Method based on Message Middleware and ATT-GRU | |
---|---|---|---|
ÀúÀÚ(Author) | Yixiang Fang Kai Tu Kai Wu Yi Peng Yunqing Shi Wei Fang Xuelei Jia Wen Zhang Victor S. Sheng | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 17 NO. 02 PP. 0486 ~ 0503 2023. 02 | ||
2 | Á¦¸ñ(Title) | CutPaste-Based Anomaly Detection Model using Multi Scale Feature Extraction in Time Series Streaming Data | |
ÀúÀÚ(Author) | Byeong-Uk Jeon Kyungyong Chung | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 8 PP. 2787 ~ 2800 2022. 8 | ||
3 | Á¦¸ñ(Title) | Two Stage Deep Learning Based Stacked Ensemble Model for Web Application Security | |
ÀúÀÚ(Author) | Waheeb Ahmed Di Wu Daniel Mukathie Mehmet Sevri Hacer Karacan | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 02 PP. 0632 ~ 0657 2022. 02 | ||
4 | Á¦¸ñ(Title) | Data anomaly detection and Data fusion based on Incremental Principal Component Analysis in Fog Computing | |
ÀúÀÚ(Author) | Xue-Yong Yu Xin-Hui Guo | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 14 NO. 10 PP. 3989 ~ 4006 2020. 10 | ||
5 | Á¦¸ñ(Title) | A Novel Network Anomaly Detection Method based on Data Balancing and Recursive Feature Addition | |
ÀúÀÚ(Author) | Xinqian Liu Jiadong Ren Haitao He Qian Wang Shengting Sun | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 14 NO. 07 PP. 3093 ~ 3115 2020. 07 | ||
6 | Á¦¸ñ(Title) | Anomaly Detection in Smart Homes Using Bayesian Networks | |
ÀúÀÚ(Author) | Sasan Saqaeeyan Hamid Haj Seyyed javadi Hossein Amirkhani | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 14 NO. 04 PP. 1769 ~ 1816 2020. 04 | ||
7 | Á¦¸ñ(Title) | A Robust Bayesian Probabilistic Matrix Factorization Model for Collaborative Filtering Recommender Systems Based on User Anomaly Rating Behavior Detection | |
ÀúÀÚ(Author) | Hongtao Yu Lijun Sun Fuzhi Zhang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 09 PP. 4684 ~ 4705 2019. 09 | ||
8 | Á¦¸ñ(Title) | A Multi-level Perception Security Model Using Virtualization | |
ÀúÀÚ(Author) | Rui Lou Liehui Jiang Rui Chang Yisen Wang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 11 PP. 5588 ~ 5613 2018. 11 | ||
9 | Á¦¸ñ(Title) | Developing an Intrusion Detection Framework for High-Speed Big Data Networks: A Comprehensive Approach | |
ÀúÀÚ(Author) | Kamran Siddique Zahid Akhtar Muhammad Ashfaq Khan Yong-Hwan Jung Yangwoo Kim | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 08 PP. 4021 ~ 4037 2018. 08 | ||
10 | Á¦¸ñ(Title) | A Moving Window Principal Components Analysis Based Anomaly Detection and Mitigation Approach in SDN Network | |
ÀúÀÚ(Author) | Mingxin Wang Huachun Zhou Jia Chen | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 08 PP. 3946 ~ 3965 2018. 08 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.