INVESTIGATION AND PENETRATION OF DIGITAL ATTACKS ON ZIGBEE-BASED IOT SYSTEMS
The market for Internet of Things (IoT) products and services has grown rapidly. It has been
predicted that the deployment of these IoT applications will grow exponentially in the near …
predicted that the deployment of these IoT applications will grow exponentially in the near …
Integration Between Network Intrusion Detection and Machine Learning Techniques to Optimizing Network Security
K Elzaridi, S Kurnaz - Babylonian Journal of Networking, 2024 - mesopotamian.press
In an increasingly linked world beset with cybersecurity risks, the necessity for powerful
intrusion detection systems (IDS) is paramount. This thesis proposes a fresh approach to …
intrusion detection systems (IDS) is paramount. This thesis proposes a fresh approach to …
ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION
This article outlines various techniques for detecting types of attacks that may arise in
ZigBee-based IoT system. The researchers introduced a hybrid Intrusion Detection System …
ZigBee-based IoT system. The researchers introduced a hybrid Intrusion Detection System …
[PDF][PDF] Original Research Article Enhanced Adaptive Security Algorithm (EASA) for optimized performance in smart city networks
MS Ram, R Anandan - Journal of Autonomous Intelligence, 2024 - jai.front-sci.com
ABSTRACT The Enhanced Adaptive Security Algorithm (EASA) is crafted to bolster the
robustness of smart city network security, specifically targeting the dynamic and complex …
robustness of smart city network security, specifically targeting the dynamic and complex …
Feature Based Transfer Learning Intrusion Detection System.
AM Kelani - 2023 - atrium.lib.uoguelph.ca
Recent Cyber security breaches, such as the latest T-Mobile data leak in May 2023, which
revealed the PINs, Full names, and Phone numbers of some customers, and a string of other …
revealed the PINs, Full names, and Phone numbers of some customers, and a string of other …
Intrusion detection system using deep neural network based on the ant colony optimization method
OA Mashi - 2023 - openaccess.altinbas.edu.tr
In this thesis, the ant colony optimization method based on the deep learning used for the
intrusion detection system. The features of the intrusion are not accurate and the number of …
intrusion detection system. The features of the intrusion are not accurate and the number of …
Intrusion detection systems for cybersecurity using machine learning
AK Shrivastav, S Mehta, S Jain… - Artificial Intelligence and …, 2025 - taylorfrancis.com
Intrusion Detection Systems (IDS) are critical components of cybersecurity, tasked with
identifying and mitigating malicious activities in computer networks. Tradi-tional IDS face …
identifying and mitigating malicious activities in computer networks. Tradi-tional IDS face …
Prototipo electrónico para internet de las cosas en viviendas inteligentes
AJA Chico, JEO Galarza, RVG Paredes… - Journal of Science …, 2024 - revistas.utb.edu.ec
El IoT ha trascendido en los últimos años al hacer posible la interconexión de dispositivos
inteligentes a través del internet, teniendo aplicaciones en diferentes campos, incluyendo …
inteligentes a través del internet, teniendo aplicaciones en diferentes campos, incluyendo …
Feature Selection Techniques in Intrusion Detection: A Comprehensive Review
L ALkahla, MK Hussein, A Alqassab - Iraqi Journal for Computers …, 2024 - ijci.uoitc.edu.iq
This investigation aims to explore previous research on the implementation of feature
selection in intrusion detection. Feature selection has demonstrated its ability to enhance or …
selection in intrusion detection. Feature selection has demonstrated its ability to enhance or …
[PDF][PDF] ENSEMBLE MACHINE LEARNING ALGORITHM METHODS FOR DETECTING THE ATTACKS USING INTRUSION DETECTION SYSTEM
LL Scientific - Journal of Theoretical and Applied Information …, 2024 - jatit.org
Everyday improvement in distributed computing administrations needs more regard to
convey the information with security in light of Interruption happening in a decentralized …
convey the information with security in light of Interruption happening in a decentralized …