A comprehensive survey on network anomaly detection G Fernandes, JJPC Rodrigues, LF Carvalho, JF Al-Muhtadi, ML Proença Telecommunication Systems 70, 447-489, 2019 | 409 | 2019 |
Network anomaly detection system using genetic algorithm and fuzzy logic AH Hamamoto, LF Carvalho, LDH Sampaio, T Abrão, ML Proença Jr Expert Systems with Applications 92, 390-402, 2018 | 301 | 2018 |
Long Short-Term Memory and Fuzzy Logic for Anomaly Detection and Mitigation in Software-Defined Network Environment MP Novaes, LF Carvalho, J Lloret, ML Proença IEEE Access 8, 83765-83781, 2020 | 143 | 2020 |
Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments MP Novaes, LF Carvalho, J Lloret, ML Proença Jr Future Generation Computer Systems 125, 156-167, 2021 | 138 | 2021 |
A GRU deep learning system against attacks in software defined networks MVO Assis, LF Carvalho, J Lloret, ML Proença Jr Journal of Network and Computer Applications 177, 102942, 2021 | 135 | 2021 |
Near real-time security system applied to SDN environments in IoT networks using convolutional neural network MVO de Assis, LF Carvalho, JJPC Rodrigues, J Lloret, ML Proença Jr Computers & Electrical Engineering 86, 106738, 2020 | 129 | 2020 |
Network anomaly detection using IP flows with principal component analysis and ant colony optimization G Fernandes Jr, LF Carvalho, JJPC Rodrigues, ML Proença Jr Journal of Network and Computer Applications 64, 1-11, 2016 | 91 | 2016 |
An ecosystem for anomaly detection and mitigation in software-defined networking LF Carvalho, T Abrao, L de Souza Mendes, ML Proença Jr Expert Systems with Applications 104, 121-133, 2018 | 83 | 2018 |
Fast Defense System Against Attacks in Software Defined Networks MVO De Assis, MP Novaes, CB Zerbini, LF Carvalho, T Abrãao, ... IEEE Access 6, 69620-69639, 2018 | 40 | 2018 |
Artificial immune systems and fuzzy logic to detect flooding attacks in software-defined networks GF Scaranti, LF Carvalho, S Barbon, ML Proença IEEE Access 8, 100172-100184, 2020 | 39 | 2020 |
Unsupervised learning clustering and self-organized agents applied to help network management LF Carvalho, S Barbon Jr, L de Souza Mendes, ML Proença Jr Expert Systems with Applications 54, 29-47, 2016 | 38 | 2016 |
Anomaly detection using the correlational paraconsistent machine with digital signatures of network segment EHM Pena, LF Carvalho, S Barbon Jr, JJPC Rodrigues, ML Proença Jr Information Sciences 420, 313-328, 2017 | 37 | 2017 |
Holt-winters statistical forecasting and aco metaheuristic for traffic characterization MVO de Assis, LF Carvalho, JJPC Rodrigues, ML Proença 2013 IEEE international conference on communications (ICC), 2524-2528, 2013 | 32 | 2013 |
A gated recurrent unit deep learning model to detect and mitigate distributed denial of service and portscan attacks DMB Lent, MP Novaes, LF Carvalho, J Lloret, JJPC Rodrigues, ... IEEE Access 10, 73229-73242, 2022 | 27 | 2022 |
Unsupervised online anomaly detection in Software Defined Network environments GF Scaranti, LF Carvalho, SB Junior, J Lloret, ML Proença Jr Expert Systems with Applications 191, 116225, 2022 | 26 | 2022 |
A novel anomaly detection system to assist network management in SDN environment LF Carvalho, G Fernandes, JJPC Rodrigues, LS Mendes, ML Proença 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 25 | 2017 |
Wavelet against random forest for anomaly mitigation in software-defined networking CB Zerbini, LF Carvalho, T Abrão, ML Proenca Jr Applied Soft Computing 80, 138-153, 2019 | 21 | 2019 |
Digital signature of network segment for healthcare environments support LF Carvalho, G Fernandes Jr, MVO De Assis, J Rodrigues, ML Proença Jr Irbm 35 (6), 299-309, 2014 | 19 | 2014 |
ACO and GA metaheuristics for anomaly detection AH Hamamoto, LF Carvalho, ML Proenca 2015 34th International Conference of the Chilean Computer Science Society …, 2015 | 14 | 2015 |
Digital signature to help network management using flow analysis ML Proenca Jr, G Fernandes Jr, LF Carvalho, MVO de Assis, ... International Journal of Network Management 26 (2), 76-94, 2016 | 12 | 2016 |