2021
DOI: 10.1016/j.comcom.2020.12.007
|View full text |Cite
|
Sign up to set email alerts
|

Optimization scheme for intrusion detection scheme GBDT in edge computing center

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…Therefore, the proposed work is developed using the NSL-KDD dataset, a public dataset from the Canadian Institute for Cybersecurity. Recent works on intrusion detection in edge computing environments are evaluated using this dataset [21 , 33 , 47] .…”
Section: Methods Validationmentioning
confidence: 99%
“…Therefore, the proposed work is developed using the NSL-KDD dataset, a public dataset from the Canadian Institute for Cybersecurity. Recent works on intrusion detection in edge computing environments are evaluated using this dataset [21 , 33 , 47] .…”
Section: Methods Validationmentioning
confidence: 99%
“…It can identify anomalies by mining high-dimensional data collected from a microservice architecture in real-time. Cui et al [22] developed an optimization approach to enhance the detection of abnormal behaviors in the microservice architecture. A margin synthetic minority oversampling strategy is first performed in the imbalanced data to ensure efficient data distribution.…”
Section: Related Workmentioning
confidence: 99%
“…An overview of learning strategies for IOT systems was done by Ejaz et al (2020). Optimization model was developed so as to configure a multi-energy system and to optimize the real-time results (Cui et al, 2020;Li et al, 2020).…”
Section: Related Workmentioning
confidence: 99%