版权说明 操作指南
首页 > 成果 > 详情

Abnormal traffic detection-based on memory augmented generative adversarial IIoT-assisted network

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文
作者:
Wang, Tao;Li, Wenwei;Rong, Huigui;Yue, Ziqiao;Zhou, Jiancun
通讯作者:
Wenwei Li
作者机构:
[Zhou, Jiancun; Wang, Tao] Hunan City Univ, Coll Informat & Elect Engn, Yiyang 413000, Hunan, Peoples R China.
[Rong, Huigui; Wang, Tao; Yue, Ziqiao; Li, Wenwei] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410012, Hunan, Peoples R China.
[Yue, Ziqiao; Li, Wenwei] Hunan Univ, Hunan Prov Key Lab Blockchain Infrastruct & Appli, Changsha 410012, Hunan, Peoples R China.
通讯机构:
[Wenwei Li] C
College of Computer Science and Electronic Engineering, Hunan University, Changsha, China<&wdkj&>Hunan Provincial Key Laboratory of Blockchain Infrastructure and Application, Hunan University, Changsha, China
语种:
英文
关键词:
Abnormal traffic detection;Memory augmented;IIoT-assisted network
期刊:
Wireless Networks
ISSN:
1022-0038
年:
2022
卷:
28
期:
6
页码:
2579-2595
基金类别:
Research Foundation of Education, Bureau of Hunan Province [19B109]; Research Foundation of Education Bureau of Hunan Province [20A088]; Special Funds for Construction of Innovative Provinces in Hunan Province of China [2020GK2006, 2020GK2007]
机构署名:
本校为第一机构
院系归属:
信息与电子工程学院
摘要:
The implementation of IoT in industrial management is referred as Industrial IoT (IIoT). It is used to increase the overall operational efficiency. IIoT is considered as the backbone of the contemporary industries. For this purpose, strong security foundations have to be deployed with IIoT. This accelerates the industrial automation process by enrolling thousands of IoT devices and thus befitting the scattered connection and constrained functionalities of the IoT devices. In the Industrial Internet of Things, abnormal traffic detection is an emerging dilemma in network security. It can be ensu...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com