networked systems
Recently Published Documents


TOTAL DOCUMENTS

1386
(FIVE YEARS 356)

H-INDEX

54
(FIVE YEARS 13)

Author(s):  
Tian Xie ◽  
Sihan Wang ◽  
Xinyu Lei ◽  
Jingwen Shi ◽  
Guan-Hua Tu ◽  
...  

2022 ◽  
Vol 2022 (1) ◽  
pp. 013401
Author(s):  
Zu-Yu Qian ◽  
Cheng Yuan ◽  
Jie Zhou ◽  
Shi-Ming Chen ◽  
Sen Nie

Abstract Despite the significant advances in identifying the driver nodes and energy requiring in network control, a framework that incorporates more complicated dynamics remains challenging. Here, we consider the conformity behavior into network control, showing that the control of undirected networked systems with conformity will become easier as long as the number of external inputs beyond a critical point. We find that this critical point is fundamentally determined by the network connectivity. In particular, we investigate the nodal structural characteristic in network control and propose optimal control strategy to reduce the energy requiring in controlling networked systems with conformity behavior. We examine those findings in various synthetic and real networks, confirming that they are prevailing in describing the control energy of networked systems. Our results advance the understanding of network control in practical applications.


Author(s):  
Yuxuan Shen ◽  
Zidong Wang ◽  
Hongli Dong ◽  
Hongjian Liu
Keyword(s):  

2022 ◽  
Vol 412 ◽  
pp. 126593
Author(s):  
Shifang Dai ◽  
Lijuan Zha ◽  
Jinliang Liu ◽  
Xiangpeng Xie ◽  
Engang Tian

2021 ◽  
Vol 35 (6) ◽  
pp. 467-475
Author(s):  
Usman Shuaibu Musa ◽  
Sudeshna Chakraborty ◽  
Hitesh Kumar Sharma ◽  
Tanupriya Choudhury ◽  
Chiranjit Dutta ◽  
...  

The geometric increase in the usage of computer networking activities poses problems with the management of network normal operations. These issues had drawn the attention of network security researchers to introduce different kinds of intrusion detection systems (IDS) which monitor data flow in a network for unwanted and illicit operations. The violation of security policies with nefarious motive is what is known as intrusion. The IDS therefore examine traffic passing through networked systems checking for nefarious operations and threats, which then sends warnings if any of these malicious activities are detected. There are 2 types of detection of malicious activities, misuse detection, in this case the information about the passing network traffic is gathered, analyzed, which is then compared with the stored predefined signatures. The other type of detection is the Anomaly detection which is detecting all network activities that deviates from regular user operations. Several researchers have done various works on IDS in which they employed different machine learning (ML), evaluating their work on various datasets. In this paper, an efficient IDS is built using Ensemble machine learning algorithms which is evaluated on CIC-IDS2017, an updated dataset that contains most recent attacks. The results obtained show a great increase in the rate of detection, increase in accuracy as well as reduction in the false positive rates (FPR).


Sign in / Sign up

Export Citation Format

Share Document