2014
DOI: 10.1007/978-3-319-11071-4_17
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Port Scans against Mobile Devices with Neural Networks and Decision Trees

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…In a cybersecurity study [83], an ANN application used the Cascade Correlation Neural Network (CCNN) [84] which adds new hidden units to the hidden layer, step by step. When new events are detected, new hidden nodes are added to the network and only those are trained with the newly collected data thereby enabling a runtime adaptive and scalable system.…”
Section: E Artificial Neural Networkmentioning
confidence: 99%
“…In a cybersecurity study [83], an ANN application used the Cascade Correlation Neural Network (CCNN) [84] which adds new hidden units to the hidden layer, step by step. When new events are detected, new hidden nodes are added to the network and only those are trained with the newly collected data thereby enabling a runtime adaptive and scalable system.…”
Section: E Artificial Neural Networkmentioning
confidence: 99%
“…In this paper we have highlighted all these AI techniques and described briefly in the following sections. The Cascade Correlation Neural Network (CCNN) was used in a study of cybersecurity (Panchev et al, 2014), which stepwise adds new hidden units to the hidden layer. (Fahlman, & Lebiere 1990).…”
Section: Ai Techniques Used For Cybersecuritymentioning
confidence: 99%