INVESTIGATION AND PENETRATION OF DIGITAL ATTACKS ON ZIGBEE-BASED IOT SYSTEMS

F Sadikin, N Wiranda - Jurnal Teknologi Informasi Universitas …, 2023 - jtiulm.ti.ft.ulm.ac.id
The market for Internet of Things (IoT) products and services has grown rapidly. It has been
predicted that the deployment of these IoT applications will grow exponentially in the near …

Integration Between Network Intrusion Detection and Machine Learning Techniques to Optimizing Network Security

K Elzaridi, S Kurnaz - Babylonian Journal of Networking, 2024 - mesopotamian.press
In an increasingly linked world beset with cybersecurity risks, the necessity for powerful
intrusion detection systems (IDS) is paramount. This thesis proposes a fresh approach to …

ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION

F Sadikin, N Wiranda - Jurnal Teknologi Informasi Universitas …, 2023 - jtiulm.ti.ft.ulm.ac.id
This article outlines various techniques for detecting types of attacks that may arise in
ZigBee-based IoT system. The researchers introduced a hybrid Intrusion Detection System …

[PDF][PDF] Original Research Article Enhanced Adaptive Security Algorithm (EASA) for optimized performance in smart city networks

MS Ram, R Anandan - Journal of Autonomous Intelligence, 2024 - jai.front-sci.com
ABSTRACT The Enhanced Adaptive Security Algorithm (EASA) is crafted to bolster the
robustness of smart city network security, specifically targeting the dynamic and complex …

Feature Based Transfer Learning Intrusion Detection System.

AM Kelani - 2023 - atrium.lib.uoguelph.ca
Recent Cyber security breaches, such as the latest T-Mobile data leak in May 2023, which
revealed the PINs, Full names, and Phone numbers of some customers, and a string of other …

Intrusion detection system using deep neural network based on the ant colony optimization method

OA Mashi - 2023 - openaccess.altinbas.edu.tr
In this thesis, the ant colony optimization method based on the deep learning used for the
intrusion detection system. The features of the intrusion are not accurate and the number of …

Intrusion detection systems for cybersecurity using machine learning

AK Shrivastav, S Mehta, S Jain… - Artificial Intelligence and …, 2025 - taylorfrancis.com
Intrusion Detection Systems (IDS) are critical components of cybersecurity, tasked with
identifying and mitigating malicious activities in computer networks. Tradi-tional IDS face …

Prototipo electrónico para internet de las cosas en viviendas inteligentes

AJA Chico, JEO Galarza, RVG Paredes… - Journal of Science …, 2024 - revistas.utb.edu.ec
El IoT ha trascendido en los últimos años al hacer posible la interconexión de dispositivos
inteligentes a través del internet, teniendo aplicaciones en diferentes campos, incluyendo …

Feature Selection Techniques in Intrusion Detection: A Comprehensive Review

L ALkahla, MK Hussein, A Alqassab - Iraqi Journal for Computers …, 2024 - ijci.uoitc.edu.iq
This investigation aims to explore previous research on the implementation of feature
selection in intrusion detection. Feature selection has demonstrated its ability to enhance or …

[PDF][PDF] ENSEMBLE MACHINE LEARNING ALGORITHM METHODS FOR DETECTING THE ATTACKS USING INTRUSION DETECTION SYSTEM

LL Scientific - Journal of Theoretical and Applied Information …, 2024 - jatit.org
Everyday improvement in distributed computing administrations needs more regard to
convey the information with security in light of Interruption happening in a decentralized …