2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon) 2019
DOI: 10.1109/fareastcon.2019.8934327
|View full text |Cite
|
Sign up to set email alerts
|

Recognition of Abnormal Traffic Using Deep Neural Networks and Fuzzy Logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Addressing research questions in denial of service (DoS) attacks, the authors in [95] employed dual deep learning neural network architecture based on convolution layers. Their research novelty comes in the form of the reinforcement of the input vector with its cluster evaluation.…”
Section: No Areas Examplesmentioning
confidence: 99%
“…Addressing research questions in denial of service (DoS) attacks, the authors in [95] employed dual deep learning neural network architecture based on convolution layers. Their research novelty comes in the form of the reinforcement of the input vector with its cluster evaluation.…”
Section: No Areas Examplesmentioning
confidence: 99%
“…The most common supervised learning algorithm are decision tree, logistic regression, support vector machine, relevance vector machine, random forest, K-NN, bagging neural networks, linear regression and naïve Bayes [26].…”
Section: Supervised Learningmentioning
confidence: 99%