Literature DB >> 35132282

A novel approach for DDoS attacks detection in COVID-19 scenario for small entrepreneurs.

Akshat Gaurav1, Brij B Gupta2,3,4, Prabin Kumar Panigrahi5.   

Abstract

The current COVID-19 issue has altered the way of doing business. Now that most customers prefer to do business online, many companies are shifting their business models, which attracts cyber attackers to launch several kinds of cyberattacks against commercial companies simultaneously. The most common and lethal DDoS attack disables the victim's online resources. While large businesses can afford defensive measures against DDoS assaults, the situation is different for new entrepreneurs. Their lack of security resources restricts their ability to ward off DDoS attacks. Here, we aim to highlight the problems that prospective entrepreneurs should be aware of before joining the business, followed by a filtering mechanism that efficiently identifies DDoS assaults in the COVID-19 scenario, which is the subject of our research. The suggested approach employs statistical and machine learning techniques to discriminate between DDoS attack data and regular communication. Our suggested framework is cost-effective and identifies DDoS attack traffic with a 92.8% accuracy rate.
© 2022 Elsevier Inc. All rights reserved.

Entities:  

Keywords:  DDoS; Entropy; Flash crowd; Machine learning; Small entrepreneurs

Year:  2022        PMID: 35132282      PMCID: PMC8810391          DOI: 10.1016/j.techfore.2022.121554

Source DB:  PubMed          Journal:  Technol Forecast Soc Change        ISSN: 0040-1625


Introduction

The European Commission, the EU’s executive arm, defines micro, small, and medium-sized entrepreneurs (Che, Zhang, 2019, Gupta, Seetharaman, Raj, 2013, Maroufkhani, Tseng, Iranmanesh, Ismail, Khalid, 2020). This term applies outside the geographical area covered by the EU’s authority (Commission, 1996). In response to the Council of Industry request, the European Commission suggested in 1992 that it restrict the definition of small and medium-sized entrepreneurs the Commission used in its expansion (Berisha and Pula, 2015). April 1996 saw the first proposal that laid the groundwork for a distinct definition of SMEs. The community and national level definitions might result in discreprency (Berisha and Pula, 2015).Table 1 summarizes the classification of small and medium-sized entrepreneurs according to European Union and World Bank. COVID-19 is one of the world’s most serious disasters, having claimed about 4,498,451 lives and displaced millions of people from many nations (Alowibdi, Alshdadi, Daud, Dessouky, Alhazmi, 2021, COVID-19, Sedik, Hammad, Abd El-Samie, Gupta, Abd El-Latif, 2021). COVID-19 has a significant impact on human life and requires company owners to migrate to an online platform (Alowibdi, Alshdadi, Daud, Dessouky, Alhazmi, 2021, Papadopoulos, Baltas, Balta, 2020, Pashchenko, 2021, Rahman, Hossain, Alrajeh, Gupta, 2021). Most large business owners have the knowledge and resources necessary to implement the proposed defense techniques against various cyber-attacks. On the other hand, small and medium-sized entrepreneurs lack the proposed knowledge and tools required to protect their online business platform from any type of cyber-attack (Carías, Arrizabalaga, Labaka, Hernantes, 2021, Millaire, Sathe, Thielen, 2017, Yeniman Yildirim, Akalp, Aytac, Bayram, 2011). DDoS attacks (Bhushan, Gupta, 2019, Chhabra, Gupta, Almomani, Dahiya, Gupta, 2021) are the deadliest of all kinds of cyber-attacks since they render the online business platform inaccessible to its consumers, making it impossible for them to do business. Small and medium-sized entrepreneurs suffer economic losses as a result of DDoS attacks, which raises the small and medium-sized companies’ overall losses. As represented in Fig. 1 , in a DDoS attack, the hacker utilizes a network of several number of hacked computers to create a large amount of fictitious traffic, depleting the victim’s resources. In 2021, DDoS attacks were increased by 25% compared to 2020. Also, there were approximately 1392 DDoS attacks per day in 2021 (Fig. 2 ). India is the most affected country in the world due tovarious DDoS attack (Azure, 2021). Due to this, small commercial businesses find it very difficult to identify and prevent DDoS attacks due to their limited budgets.
Fig. 1

DDoS attack in small and medium enterprises.

Fig. 2

DDoS statics by azure (Azure, 2021).

DDoS attack in small and medium enterprises. DDoS statics by azure (Azure, 2021). Apart from DDoS attacks, small and medium-sized entrepreneurs must contend with the flash crowd. The crowded flash crowd is an instance in which many people simultaneously attempt to visit one specific website, which subsequently hampers the performance of that portal. Thus, if small and medium-sized businesses inadvertently filter out flash crowd traffic , this undermines their reputation and escalates their losses. An online shopping business in Australia recently had to pay a significant amount of refunds because it could not manage a large amount of traffic produced by consumers. Because the fundamental features of DDoS attacks and flash crowds are almost identical, it is difficult to distinguish between the two types of scenarios.

Challenges in the detection of DDoS attacks

There are many defensive techniques available against DDoS attacks (Gupta et al., 2020), but none of them fully resolves the issue. There are many reasons for this, including the following: Due to the abundance of open-source tools accessible on the internet, anybody may use them to launch an assault. DDoS attacks almost always include faked IP packets, making it perticularly impossible to pinpoint the source of the attack. Additionally, the length of an attack has decreased to approximately 4 minutes in recent years. Thus, the affected machine crashes before any protection solution can detect the attack. As a result, obtaining comprehensive information on DDoS attacks is very challenging. The lack of a standard benchmark for DDoS defense filters in the computer industry makes it impossible to compare defensive products with their counterparts on the market directly. Numerous new technologies are entering the market, including cloud computing, fog computing, industrial computing systems, and the Internet of Things. Thus, it is a difficult job to enhance traditional defensive techniques in such a manner that they can be used in these situations.

Contribution

The previous subsection explains the details about the small entrepreneurs and the effect of DDoS attacks on them. In this context, we proposed a DDoS detection approach for small entrepreneurs. The main contribution of our proposed approach is as follows: Our proposed approach is reactive; hence, it is more accurate and its response time is less than other recent DDoS detection techniques. Our proposed approach uses statistical and machine learning approaches to detect various DDoS attacks. Our proposed approach is economical; hence, small entrepreneurs efficiently use it.

Organization

The rest of the paper is organized as follows: Section 2 reviews the latest work in the field of DDoS and flash crowd detection. Section 3 gives the motivation of our proposed approach. Section 4 explains the components of our proposed approach, and Section 5 represents the simulation results. Finally, Section 6 concludes the paper.

Related work

Researchers proposed different security techniques (Gupta, Li, Leung, Psannis, Yamaguchi, et al., 2021, Masud, Gaba, Alqahtani, Muhammad, Gupta, Kumar, Ghoneim, 2020, Nguyen, Le Viet, Elhoseny, Shankar, Gupta, Abd El-Latif, 2021, Rahman, Hossain, Alrajeh, Gupta, 2021, Wang, Li, Li, Gupta, Choi, 2020) for the identification and detection of DDoS attacks. In this section, we review some techniques proposed by the researchers for the detection of DDoS attacks. The authors in (Mishra et al., 2021) suggested a low-cost defensive method against DDoS attacks based on differences in entropy between DDoS attacks and normal traffic. Additionally, the authors suggested a method for mitigating the attack’s intensity. The suggested approach has three benefits over other current techniques: i) it has a high detection rate, (ii) it has a low false-positive rate, and (iii) it has the capacity to mitigate. The authors (Gupta et al., 2021a) provide a method for addressing authentication and security problems associated with smart vessels in maritime transport. By authenticating devices in maritime transport and detecting different cyberattacks such as DDoS. The suggested method employs an identity-based technique to authenticate smart vessel access. However, this approach is applies to maritime transport only. In this paper (Khan and Quadri, 2020), Khan et. al attempts to outline the issues that a potential entrepreneur should consider before entering the autonomous vehicle business, followed by innovative ideas that may assist in overcoming the essay’s hurdles. The authors developed the proposals and guidelines using the cybersecurity principles of confidentiality, integrity, and availability. The authors (Zhou et al., 2021a) present the construction of a secure data sharing method and a cyber-attack detection approach utilising identity-based encryption (IBE) and deep learning algorithms in their study. The suggested system utilises identity-based encryption to handle access control to the VANET’s smart cars, guaranteeing that no personally identifiable information is released. Deep learning technology evaluates network abnormalities and block malicious packets. Attacks on a virtual machine monitor (VMM) that regulates the VMs may be identified by examining packet transmission data. Thus, the authors (Shidaganti et al., 2020) suggest a method in this article to halt such identified assaults at their source and analyze the proposed solutions for a few distinct kinds of such attacks. The authors suggest selective cloud egress filtering (SCEF) that includes modules for dealing with identified threats. If the process determines the attack, the SCEF notifies the VMM of which VMs are involved, allowing for targeted remediation. In this study, the authors’ (Zhang et al., 2020) goal is to provide a broad framework for understanding the features of vulnerabilities in information systems, such as which category a particular vulnerability belongs to, the possible dangers it presents, and the critical indications for resolving it. Additionally, the authors gather data on actual vulnerabilities discovered in companies’ information systems through a leading vulnerability report site. The system extracts four layers of features : word, phrase, subject, and record. The experimental findings demonstrate that the broad framework assists in characterizing the modes and patterns associated with different kinds of vulnerabilities. Based on boosting, authors in (Cvitić et al., 2021) proposed a DDoS detection technique in IoT devices . Authors () proposed RFID tags for mutual authentication in IoT devices. Author (A. Dahiya, 2021) proposed a game theory-based security mechanism during the COVID-19 scenario. The authors (Dahiya and Gupta, 2020) suggested a method for mitigating DDoS assaults via a multi-attribute-based auction. Here, the authors proposed a reputation-based detection method in which the marginal utility of a user determines his/her reputation. Two distinct payment schemes for normal and fraudulent users have been suggested along with the identification method. In this method, a greedy resource allocation strategy distributes resources properly among authorised users. The differential payment system penalises malicious users who manipulate their offer to get the greatest share of restricted resources . The authors (Dahiya and Gupta, 2021) offer a DDoS detection method based on Bayesian game theory. The service provider and legitimate users are supposed to monitor the network for an extended period and accumulate probabilistic information about whether or not another user is malevolent. The service provider and legal users use this probabilistic information to adjust their behaviour in response to malicious users on the network. Taking these assumptions and facts into account, the authors offer a Bayesian pricing and auction method for achieving Bayesian Nash Equilibrium points in various situations in which probabilistic knowledge benefits genuine consumers and service providers. Additionally, we offer a reputation evaluation and updating system that considers payment and participation characteristics when determining a user’s trustworthiness. Apart from the above-explained approaches, the researchers have propsoed many other techniques and methods for increasing security and privacy (Zhou, Li, Zhang, Yin, Qi, Ma, 2021, Zhou, Mu, Wu, 2019, Zhou, Su, Zhang, Xia, Du, Gupta, Qi, 2021, Zhou, Wu, Yang, Sun, 2020). However, these approaches are not efficient in small and medium enterprises. Table 2 represents the comparison of some important approaches . Classification of small and medium entrepreneurs (Berisha andPula, 2015). Comparison of different approaches .

Motivation

As a result of the preceding explanation, we can see the potential damage caused by a DDoS attack. Two distinct attack techniques damage on small entrepreneurs: a bandwidth depletion attack and a resource depletion attack. In a bandwidth depletion assault, the attacker floods the small and medium entrepreneur network’s available bandwidth with malicious packets; in a resource depletion attack, the attacker attempts to use all available resources on the small and medium enterprise network. Researchers have spent significant efforts on methods for detecting and mitigating DDoS attacks. As mentioned before, the features of the flash crowd are similar to those of DDoS assaults; however, since the flash crowd traffic is produced by legal users, blocking this traffic may result in economic loss or diminished reputation for small and medium-sized entrepreneurs. Additionally, attackers may attempt to mimic the features of the flash mob to avoid detection filters. Numerous methods developed distinguish DDoS attacks from other types of attacks. These approaches identify flash crowd situations through the use of information theory-based methodologies. We discovered that when information theory-based techniques and statistical methods such as packet scoring are combined, the efficacy of information theory-based methods is enhanced since individual packet analysis is feasible. As a result, we focu our efforts on creating a filtering approach that uses information theory and static techniques. We used machine learning techniques to quickly and accurately identify different attack traffic.

Proposed methodology

This article provides a detection technique that uses entropy to find DDoS attacks for small and medium entrepreneurs. The two phases of our proposed method are as follows: the entropy calculation phase and the machine learning stage. The entropy calculation step determines the entropy of incoming packets.The second phase uses machine learning models to determine whether a packet is malicious or legal based on its entropy value.

Entropy calculation phase

This section explains the entropy calculation phase of our proposed approach. Suppose there is a discrete random variable X with a range of n possible values; the probability of the occurrence of that discrete random variable is given by Eq. 1. Shannon provides a formal definition of the notion of entropy. An uncertainty of a random variable is measured in terms of the uncertainty of the variable. In the case of random variables, the entropy (X) is suppressed in Eq. 2 The entropy value,(X), is stationary, which means that it has the same value over two distinct time periods. Most of DDoS attackers use tools to launch their assaults to target small and medium enterprises. For faking the destination address of attack packets, these tools make use of a preset software that runs in the background. Consequently, we can show that there is a linear function that represents all of the faked addresses.Therefore, the cluster probability is represented as:from Eq. 2,Where , Thus, the cluster entropy associated with DDoS attack traffic may be described by a stable stochastic process. □ The graph of Entropy,, variation is represented by a concave function. Let a function m(v) = - thenThe above equation is reduced as:Thus, we can say that entropy is a concave function □ Entropy of flash crowd is less than the DDoS attack scenario. Using Jensen’s inequality, we can represent the DDoS attack traffic by a monotonically increasing function.The flash crowd probability distribution, on the other hand, is modeled as a monotonically growing concave function, using Jensen’s inequality If represents the probability of different clusters during flash crow scenario and represents cluster entropy. Packets are more randomly distributed during DDoS attack, so we can say thatTherefore, from the above equations and the definition of entropy, we can say thatwhere represents the entropy of the DDoS attack and represents the entropy of flash crowd scenario. □

Machine learning phase

This phase consists of computing the entropy of the incoming traffic and organizing the data set for further analysis and usage in the next step. To determine which machine learning technique is the most successful in differentiating DDoS attack traffic from normal traffic, we will analyze our data set during this phase. We employed six of the most frequently used machine learning techniques when analyzing the data set, which are detailed in the following section.

Support vector machine

Vapnik et al.(Cortes, Vapnik, 1995, Vapnik, 1995) developed the support vector machine (SVM) (Zhang et al., 2004), a machine learning approach that is used in regression (Schölkopf, Smola, Williamson, Bartlett, 2000, Smola, Schölkopf, 2004) and pattern recognition techniques‘(Burges, 1998, Schölkopf, Smola, Williamson, Bartlett, 2000). An SVM maps the data in the input space to a linear-separable high-dimensional feature space using the kernel mapping method (Scholkopf et al., 1999). The decision function of an SVM is proportional to the number of SVs and their weights, and it also links kernels chosen a priori, such as Gaussian and polynomial (Scholkopf, Mika, Burges, Knirsch, Muller, Ratsch, Smola, 1999, Smola, Schölkopf, Müller, 1998). Suppose a and b represents the input variable and output variable. Then, a linear estimate function transforms the input variable into the output variable .where ’W’ is the weight, is the non-linear mapping, and ’c’ is constant. We have to find the optimal ’f’ with the lowest error. Authors (Cortes, Vapnik, 1995, Vapnik, 1995, Zhang, Zhou, Jiao, 2004) suggest different ways to find optimal value of ’f’ with the least amount of error.Where ’K’ is a constant, and is a small positive number. The last term in Eq. 8 is reduces to (Zhang et al., 2004)By using the Lagrange multiplier technique above defined two equations reduced to the following equation Where K is SV kernel.

Logistic regression

LR used a linear (Eq. 11) to classify the data points. We used the sigmoid function (Eq. 12) to limit the linear equations' output (Eq. 13) .

Decision Tree Classifier (DTC)

This method divides the data set repeatedly according to a criterion that optimizes data separation, producing a tree-like structure. A decision tree structure is comprised of just two components: the Decision Node and the Leaf Node, as represented in Fig. 3 .
Fig. 3

Decision tree classifier.

Decision tree classifier. A decision node has many branches, whereas a leaf node represents the decision’s final output. When developing a Decision Tree, the most difficult problem is determining which attributes should be used for the tree’s leaf node and decision node. In this case, the information gain method is used to make the selection, which involves partitioning the dataset and selecting the most appropriate choices for decision nodes and leaf nodes. To distinguish between leaf nodes and decision nodes in the information gain method, entropy is utilized as a distinguishing factor (algorithm 1).where E(D) is the entropy of the dataset, ’w’ is the weight, and E(f) is the entropy of the feature.
Algorithm 1

Decision Tree Classifier.

Random forest

Random forest (RF) is a classification and regression technique based on ensemble learning that is particularly well suited for issues requiring data sorting into classes. Breiman and Cutler were the ones that came up with the algorithm (Breiman and Cutler, 2007). In RF, prediction is accomplished via the use of decision trees. During the training phase, multiple decision trees are built and then utilised for class prediction; this is accomplished by taking into account the voted classes of all individual trees during the training phase (Fig. 4 ). The classwith the largest margin function (MF) (Liu et al., 2012) is considered the output.The margin function is calculated by Eq. 15.
Fig. 4

Random forest technique.

Random forest technique.

Gradient boosting

One of the most effective machine learning algorithms is gradient boosting. When we speak about machine learning algorithms, we often consider them to have two basic kinds of errors: bias and variance. As one of the boosting methods, gradient boosting is used to reduce the model’s bias error (Natekin and Knoll, 2013). The gradient boosting technique may be thought of as a mathematical optimization procedure whose objective is to create an additive model with the smallest loss function. In this way, the gradient boosting method continuously increases the number of decision trees that decrease the loss function during each step. The gradient boosting method performs better if the contribution of the new decision tree is reduced at each iterative step using a shrinkage parameter ’’, referred to as the learning rate (Touzani et al., 2018). The shrinking method in gradient boosting is based on the principle that a greater number of tiny steps results in more accuracy than a smaller number of major activities. Algorithm 2 explains this procedure.
Algorithm 2

Gradient Boosting (Natekin and Knoll, 2013).

Multinomial naive bayes

NLP often employs the Multinomial Naive Bayes method for probabilistic learning, which is a strategy for probabilistic learning. For the independent variable, it is necessary to predict the tag using the Bayes theorem. It calculates the likelihood of each title in a sample and provides the label with the greatest chance of being correct.

Proposed algorithm

This subsection explains details of the algorithm applied at the gateway router of small and medium enterprises. Because our suggested method is applied to the router, it can rapidly and efficiently detect the DDoS assault. Our suggested method is reactive, in the sense that it is capable of detecting and mitigating attack traffic in real time. The following are the stages in our suggested strategy: The method we offer examines the incoming traffic for each time frame . The attribute values of the packets are retrieved and aggregated for each time frame. Following that, the entropy value for the packets in the time frame is computed. The entropy value is then input into the trained machine learning model, which predicts whether a DDoS assault or normal traffic causes the incoming data. Algorithm 3 gives the details of our proposed approach. The attributes used in the algorithm are explained in Table 3
Algorithm 3

Filtering.

Table 3

Attributes used in algorithm .

TermExplanation
PkKth incoming packet
Ai[k]Kth attribute of ith packet
H[k]Entropy Value for kth packet
DnNormal Data rate
DcCurrent Data rate
Filtering. Attributes used in algorithm .

Results and analysis

Dataset preprocessing

The simulation is conducted out using OMNET++. The attack packets overwhelm the victim with a huge amount of erroneous traffic in this scenario. In this instance, the attacker node produces packets every one second, while the genuine nodes emit packets every five seconds. The whole simulation takes 100 seconds to complete, and during that time, all log data is gathered. Because our suggested method is not protocol-specific, we simulate it using a generic routing protocol. Null values are removed from the dataset during the preparation step, since the dataset contains a large number of them. Fig. 5 (b) and Fig. 5(a) illustrate the change in entropy between DDoS attack period and non-attack time. Finally, the dataset has been partitioned into a training and a testing set, allowing for an exhaustive evaluation of the proposed technique on both sets.
Fig. 5

Dataset representation.

Dataset representation.

Machine learning techniques

This subsection compares six different machine learning techniques used to analyze the dataset prepared in the previous subsection. We calculate the following statistical parameters for the comparison. Precision- It determines the proportion of genuine packets in the overall number of forwarded packets. Recall- It quantifies the proportion of valid packets that are not rejected as a result of the suggested method. Accuracy- It assesses the adequacy of our suggested strategy. F-1 Score- It assesses the effectiveness of the suggested strategy.where si True positive, is false positive, is true negative, and si false negative.

Confusion matrix calculation

A confusion matrix (Fig. 6 ) is often used to assess the performance of the proposed model. In this matrix, the actual goal values are compared to the predictions produced by the machine learning model. This information provides us with a comprehensive picture of how well our classification model is doing as well as the kind of mistakes it is committing on a consistent basis. We can compute the precision, accuracy, recall, and f-1 score using a confusion matrix.
Fig. 6

Confusion matrix for different machine learning models.

Confusion matrix for different machine learning models.

State-of-art comparison

This part analyses several machine learning methods and determines which one is the most suitable for our suggested strategy. First, we compute the accuracy, precision, recall, and f-1 score for each of the six machine learning methods. The value of these statistical characteristics for machine learning methods is shown in Table 4 . To better understand the results, we represent the statistical parameters in the graphical formation in Figure 7 . Fig. 7 and Table 4 clearly show that the LR-based technique has the highest recall rate and accuracy. Hence, we can say that the LR-based technique can be used with our proposed approach to identifying DDoS attacks.
Table 4

Comparison of different Machine Learning techniques .

ParameterMNBLRDTCGBCRFSVM
Accuracy0.9210.92840.920.92660.9210.9280
Precision0.940.930.940.930.940.94
Recall0.980.990.980.990.980.99
F1 score0.960.960.960.960.960.96
Fig. 7

Statistical parameters calculation.

Comparison of different Machine Learning techniques . Statistical parameters calculation. Decision Tree Classifier. Gradient Boosting (Natekin and Knoll, 2013).

Conclusion

Following the COVID-19 pandemic, the way people work has changed dramatically. Because the majority of consumers now work online and prefer online sales and purchases, company owners are migrating to online platforms. This new transaction makes it simpler for hackers to steal users’ sensitive information or disrupt the web platform’s regular operations. Cyberattackers often use a DDoS attack due to its simplicity of deployment and ability to fully consume the target system’s resources. The DDoS attack’s objective is to bring the victim’s system to halt or to deplete its processing capacity. When a flash crowd is present, which is when real people generate large quantities of bandwidth, the DDoS attack becomes more difficult to detect. Given this, identifying DDoS attacks efficiently and accurately has long been a major research challenge. Due to the similarities between DDoS attacks and flash crowd, it is almost difficult to distinguish them. In this context, we present a method in this article that identifies DDoS assaults effectively and distinguishes them from the flash crowd for small and medium-sized entrepreneurs using entropy and machine learning. The dataset was generated using the OMNET++ discrete event simulator and used to train six machine learning algorithms. The accuracy, precision, recall, and f1 score are used to determine the efficacy of machine learning techniques. On the datasets, certain models, such as LR, outperformed others, including DT, SVM, LR, MNB, RF, and GB, in terms of accuracy. We want to do further testing on a variety of data sets in the future.

CRediT authorship contribution statement

Akshat Gaurav: Conceptualization, Formal analysis, Writing – original draft. Brij B. Gupta: Conceptualization, Formal analysis, Writing – original draft, Supervision. Prabin Kumar Panigrahi: Conceptualization, Writing – original draft, Supervision.
Table 1

Classification of small and medium entrepreneurs (Berisha andPula, 2015).

CategoryEuropean Union
World Bank
Head CountTurnover (million)Total EmployeTotal Assets (million)
Medium<250<€ 50>50; 300>$3; $15
Small<50<€ 10>10; 50>$0.1; $3
Micro<10<€ 2<10 $0.1
Table 2

Comparison of different approaches .

ApproachComplexityDetection rateRemarks
(Mishra et al., 2021)LowHighSDN based
(Bhushan and Gupta, 2018)LowHighSDN based
(Zhou et al., 2021a)ModerateHighIBE based
(Gupta et al., 2021a)ModerateHighIBS signature based
(Tewari and Gupta, 2020)LowModerateRFID tags
(Cvitić et al., 2021)LowModerateBoosting based
  7 in total

1.  New support vector algorithms

Authors: 
Journal:  Neural Comput       Date:  2000-05       Impact factor: 2.026

2.  The connection between regularization operators and support vector kernels.

Authors:  Alex J. Smola; Bernhard Schölkopf; Klaus Robert Müller
Journal:  Neural Netw       Date:  1998-06

3.  Wavelet support vector machine.

Authors:  Li Zhang; Weida Zhou; Licheng Jiao
Journal:  IEEE Trans Syst Man Cybern B Cybern       Date:  2004-02

4.  Input space versus feature space in kernel-based methods.

Authors:  B Schölkopf; S Mika; C C Burges; P Knirsch; K R Müller; G Rätsch; A J Smola
Journal:  IEEE Trans Neural Netw       Date:  1999

5.  Gradient boosting machines, a tutorial.

Authors:  Alexey Natekin; Alois Knoll
Journal:  Front Neurorobot       Date:  2013-12-04       Impact factor: 2.650

6.  Efficient deep learning approach for augmented detection of Coronavirus disease.

Authors:  Ahmed Sedik; Mohamed Hammad; Fathi E Abd El-Samie; Brij B Gupta; Ahmed A Abd El-Latif
Journal:  Neural Comput Appl       Date:  2021-01-19       Impact factor: 5.102

  7 in total
  6 in total

1.  Sustainable impact of COVID-19 on education projects: aspects of naturalism.

Authors:  Song Pu; Jamshid Ali Turi; Wang Bo; Chen Zheng; Dandan Tang; Wasim Iqbal
Journal:  Environ Sci Pollut Res Int       Date:  2022-05-14       Impact factor: 5.190

2.  Assessing the nexus between fiscal policy, COVID-19, and economic growth.

Authors:  Tao Wang; Ke Gao; Chen Wen; Yuanzhi Xiao; Yan Bingzheng
Journal:  Environ Sci Pollut Res Int       Date:  2022-04-29       Impact factor: 5.190

3.  Unleashing the mechanism between small and medium enterprises, and green financing in China: a pathway toward environmental sustainability and green economic recovery.

Authors:  Yongjun Hou; Zhen Fang
Journal:  Environ Sci Pollut Res Int       Date:  2022-08-03       Impact factor: 5.190

4.  Unbundling the dynamic impact of renewable energy and financial development on real per capita growth in African countries.

Authors:  Amarachi W Konyeaso; Perekunah B Eregha; Xuan Vinh Vo
Journal:  Environ Sci Pollut Res Int       Date:  2022-07-30       Impact factor: 5.190

5.  Multicriteria decision making and goal programming for determination of electric automobile aimed at sustainable green environment: a case study.

Authors:  Mustafa Hamurcu; Tamer Eren
Journal:  Environ Syst Decis       Date:  2022-09-13

6.  The impact of COVID-19 on small- and medium-sized enterprises (SMEs): empirical evidence for green economic implications.

Authors:  Lijie Du; Asif Razzaq; Muhammad Waqas
Journal:  Environ Sci Pollut Res Int       Date:  2022-08-02       Impact factor: 5.190

  6 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.