Deep Echo State Networks for Detecting Internet Worm and Ransomware Attacks.
Tarun SharmaKhushi PatniZhida LiLjiljana TrajkovicPublished in: ISCAS (2023)
Keyphrases
- echo state networks
- countermeasures
- recurrent neural networks
- network traffic
- malicious traffic
- security mechanisms
- network intrusion detection systems
- internet users
- identity theft
- artificial intelligence
- security flaws
- detecting malicious
- terrorist attacks
- malicious activities
- worm detection
- security protocols
- feed forward
- computer networks
- neural network