Open Access
Issue
MATEC Web Conf.
Volume 392, 2024
International Conference on Multidisciplinary Research and Sustainable Development (ICMED 2024)
Article Number 01143
Number of page(s) 10
DOI https://doi.org/10.1051/matecconf/202439201143
Published online 18 March 2024
  1. A. Katal, S. Dahiya, T. Choudhury. Energy efficiency in cloud computing data centers: a survey on software technologies. Clust. Comput., 26, 3, 1845-1875, (2023) [CrossRef] [Google Scholar]
  2. S. Mandal, D.A. Khan. Cloud-CoCoSo: Cloud model-based combined compromised solution model for trusted cloud service provider selection. Arab J Sci Eng., 47, 8, 10307-10332, (2022) [CrossRef] [Google Scholar]
  3. S. Kim, K.J. Park, C. Lu. A survey on network security for cyber–physical systems: From threats to resilient design. IEEE Commun. Surv. Tutor., 24, 3, 1534-1573, (2022) [CrossRef] [Google Scholar]
  4. Q. Zhang, J. Xiao, C. Tian, J. Chun‐Wei Lin, S. Zhang. A robust deformed convolutional neural network (CNN) for image denoising. CAAI Trans. Intell. Technol., 8, 2, 331-342, (2023) [CrossRef] [Google Scholar]
  5. T.M. Shami, A.A. El-Saleh, M. Alswaitti, Q. Al-Tashi, M.A. Summakieh, S. Mirjalili. Particle swarm optimization: A comprehensive survey. IEEE Access, 10, 10031-10061, (2022) [CrossRef] [Google Scholar]
  6. S.P. Thirimanne, L. Jayawardana, L. Yasakethu, P. Liyanaarachchi, C. Hewage. Deep neural network-based real-time intrusion detection system. SN Comput. Sci., 3, 2, (2022) [CrossRef] [Google Scholar]
  7. N. Kunhare, R. Tiwari, J. Dhar. Intrusion detection system using hybrid classifiers with meta-heuristic algorithms for the optimization and feature selection by genetic algorithm. Comput. Electr. Eng., 103, (2022) [Google Scholar]
  8. S. Lata, D. Singh. Intrusion detection system in cloud environment: Literature survey & future research directions. Int. J. Inf. Manag. Dat Insig, 2, 2, (2022) [Google Scholar]
  9. S. Dai, Y. Zhao, J. Huang, X. Wang, G. Zhao, L. Zhang, Z. Guo. Online Network traffic anomaly detection method combining OS-ELM and SADE. IEEE Access, (2023). https://doi.org/10.1109/ACCESS.2023.3306243 [Google Scholar]
  10. M. Otair, O.T. Ibrahim, L. Abualigah, M. Altalhi, P. Sumari. An enhanced grey wolf optimizer based particle swarm optimizer for intrusion detection system in wireless sensor networks. Wireless Networks, 28, 2, 721-744, (2022) [CrossRef] [Google Scholar]
  11. J. Lian, X. Wang, D. Wang, P. Jia. Multiobjective Optimization of Networked Switched Systems Subject to DoS Attack Using Artificial Bee Colony Algorithm. IEEE Trans. Control Netw. Syst., 10, 1, 100-111, (2022) [Google Scholar]
  12. C. Zong, H. Wang. An improved 3D point cloud instance segmentation method for overhead catenary height detection. Comput. Electr. Eng., 98, (2022) [Google Scholar]
  13. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html [Google Scholar]
  14. https://www.unb.ca/cic/datasets/nsl.html [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.