![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Correction to: Example‑dependent cost‑sensitive credit cards fraud detection using SMOTE and Bayes minimum risk
The article Example-dependent cost-sensitive credit cards fraud detection using SMOTE and Bayes minimum risk,
-
Article
Open AccessAnomaly detection optimization using big data and deep learning to reduce false-positive
Anomaly-based Intrusion Detection System (IDS) has been a hot research topic because of its ability to detect new threats rather than only memorized signatures threats of signature-based IDS. Especially after ...
-
Article
Example-dependent cost-sensitive credit cards fraud detection using SMOTE and Bayes minimum risk
This paper presents fraud detection problem as one of the most common problems in secure banking research field, due to its importance in reducing the losses of banks and e-transactions companies. Our work wil...
-
Article
Open AccessA comparative dimensionality reduction study in telecom customer segmentation using deep learning and PCA
Telecom Companies logs customer’s actions which generate a huge amount of data that can bring important findings related to customer’s behavior and needs. The main characteristics of such data are the large nu...
-
Article
Open AccessBig data analysis and distributed deep learning for next-generation intrusion detection system optimization
With the growing use of information technology in all life domains, hacking has become more negatively effective than ever before. Also with develo** technologies, attacks numbers are growing exponentially e...
-
Chapter and Conference Paper
ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets)
This article deals with access control in Mobile Autonomic Networks (MAutoNets), which are basically mobile ad-hoc networks. Our goal is to build an autonomic access control system. We define the Secure Relati...
-
Chapter and Conference Paper
Autonomic Security for Home Networks
Home networks are becoming prevalent and interest in their security is increasing. We introduce in this paper an autonomic security model, in which we deal with a home network as an ad hoc network in general, ...