2022
DOI: 10.3390/electronics11223718
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity in Smart Cities: Detection of Opposing Decisions on Anomalies in the Computer Network Behavior

Abstract: The increased use of urban technologies in smart cities brings new challenges and issues. Cyber security has become increasingly important as many critical components of information and communication systems depend on it, including various applications and civic infrastructures that use data-driven technologies and computer networks. Intrusion detection systems monitor computer networks for malicious activity. Signature-based intrusion detection systems compare the network traffic pattern to a set of known att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 60 publications
(89 reference statements)
0
6
0
1
Order By: Relevance
“…About 60 thousand instances from the Kyoto 2006+ dataset are used as a benchmark for the experiments. The fundamentals of the experiments are fully explained in our previous work [112]. In brief, the characteristics of the classifiers are as follows: (1) the maximum number of splits in DT classification is 20;…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…About 60 thousand instances from the Kyoto 2006+ dataset are used as a benchmark for the experiments. The fundamentals of the experiments are fully explained in our previous work [112]. In brief, the characteristics of the classifiers are as follows: (1) the maximum number of splits in DT classification is 20;…”
Section: Resultsmentioning
confidence: 99%
“…The change between the GD and GN algorithms is called the damping strategy [111]. The LM approximation and the damping strategy are described more detailed in our previous work [105,112]. The damping strategy is used here to speed up processing and prevent problems due to a very large or very small gradients.…”
Section: Proposed Workmentioning
confidence: 99%
“…UNSW-NB 15 is a fairly recent dataset that comprises a vast quantity of internet traffic patterns with 9 types of malicious activities, as opposed to KDD'98, NSL-KDD, KDDCUP' 99, CAIDA, Kyoto 2006 + and ISCX dataset [48]. It includes current minimal imprint assaults as well as contemporary Netflow for both regular and unusual situations.…”
Section: Unsw-nb15mentioning
confidence: 99%
“…Використання даних у реальному часі покращує операційну ефективність, підключення, процес прийняття рішень і загальну продуктивність комп'ютерних мереж і комунікаційних платформ на основі IoT для збору даних, керування пристроями та хмарних рішень (Protic et al, 2022).…”
Section: оглядова статтяunclassified