Picture for Julian Jang-Jaccard

Julian Jang-Jaccard

Measuring Technological Convergence in Encryption Technologies with Proximity Indices: A Text Mining and Bibliometric Analysis using OpenAlex

Add code
Mar 03, 2024
Viaarxiv icon

Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods

Add code
Jun 27, 2023
Figure 1 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Figure 2 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Figure 3 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Figure 4 for Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods
Viaarxiv icon

Generative Adversarial Networks for Malware Detection: a Survey

Add code
Feb 24, 2023
Viaarxiv icon

Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset

Add code
Aug 20, 2022
Figure 1 for Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset
Figure 2 for Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset
Figure 3 for Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset
Figure 4 for Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset
Viaarxiv icon

LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data

Add code
Apr 14, 2022
Figure 1 for LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data
Figure 2 for LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data
Figure 3 for LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data
Figure 4 for LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data
Viaarxiv icon

IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset

Add code
Mar 30, 2022
Figure 1 for IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset
Figure 2 for IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset
Figure 3 for IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset
Figure 4 for IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset
Viaarxiv icon

Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection

Add code
Feb 02, 2022
Figure 1 for Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection
Figure 2 for Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection
Figure 3 for Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection
Figure 4 for Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection
Viaarxiv icon

A Game-Theoretic Approach for AI-based Botnet Attack Defence

Add code
Dec 04, 2021
Figure 1 for A Game-Theoretic Approach for AI-based Botnet Attack Defence
Figure 2 for A Game-Theoretic Approach for AI-based Botnet Attack Defence
Figure 3 for A Game-Theoretic Approach for AI-based Botnet Attack Defence
Figure 4 for A Game-Theoretic Approach for AI-based Botnet Attack Defence
Viaarxiv icon

Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection

Add code
Nov 27, 2021
Figure 1 for Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection
Figure 2 for Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection
Figure 3 for Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection
Figure 4 for Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection
Viaarxiv icon

Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold

Add code
Oct 31, 2021
Figure 1 for Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold
Figure 2 for Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold
Figure 3 for Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold
Figure 4 for Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold
Viaarxiv icon