Deep Learning for Cyber Deception in Wireless Networks

被引:0
|
作者
Olowononi, Felix O. [1 ]
Anwar, Ahmed H. [2 ]
Rawat, Danda B. [1 ]
Acosta, Jaime C. [2 ]
Kamhoua, Charles A. [2 ]
机构
[1] Howard University, Department of Electrical Engineering and Computer Science, DC, United States
[2] U.S. Army Research Laboratory, Adelphi,MD, United States
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Channel scheduling - Cybe deception - Deep learning - Emerging technologies - Integral part - Intelligent devices - IoBT - Jammers - Wireless communications networks - Wireless security
引用
收藏
页码:551 / 558
相关论文
共 50 条
  • [31] Performance Analysis of LEACH with Deep Learning in Wireless Sensor Networks
    Prajapati, Hardik K.
    Joshi, Rutvij
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (04) : 799 - 805
  • [32] Deep Reinforcement Learning for Dynamic Multichannel Access in Wireless Networks
    Wang, Shangxing
    Liu, Hanpeng
    Gomes, Pedro Henrique
    Krishnamachari, Bhaskar
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2018, 4 (02) : 257 - 265
  • [33] Distributed processing method for deep learning in wireless sensor networks
    Umeda, Karin
    Nishitsuji, Takashi
    Asaka, Takuya
    Miyoshi, Takumi
    IEICE COMMUNICATIONS EXPRESS, 2021, 10 (08): : 505 - 510
  • [34] Data Stream of Wireless Sensor Networks Based on Deep Learning
    Li Yue-jie
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (11) : 22 - 27
  • [35] Analysis of intrusion detection in cyber attacks using DEEP learning neural networks
    Kumar, Parasuraman
    Kumar, A. Anbarasa
    Sahayakingsly, C.
    Udayakumar, A.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) : 2565 - 2584
  • [36] Analysis of intrusion detection in cyber attacks using DEEP learning neural networks
    Parasuraman Kumar
    A. Anbarasa Kumar
    C. Sahayakingsly
    A. Udayakumar
    Peer-to-Peer Networking and Applications, 2021, 14 : 2565 - 2584
  • [37] Anomaly detection in cyber security attacks on networks using MLP deep learning
    Teoh, T. T.
    Chiew, Graeme
    Franco, Edwin J.
    Ng, P. C.
    Benjamin, M. P.
    Goh, Y. J.
    2018 INTERNATIONAL CONFERENCE ON SMART COMPUTING AND ELECTRONIC ENTERPRISE (ICSCEE), 2018,
  • [38] Deceptor-in-the-Middle (DitM): Cyber Deception for Security in Wireless Network Virtualization
    Adehayo, Ahdulhamid
    Rawat, Danda B.
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [39] Robust Deep Learning Ensemble Against Deception
    Wei, Wenqi
    Liu, Ling
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1513 - 1527
  • [40] Cyber Threats and Cyber Deception in Hybrid Warfare
    Steingartner, William
    Galinec, Darko
    ACTA POLYTECHNICA HUNGARICA, 2021, 18 (03) : 25 - 45