A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis

S Muneer, U Farooq, A Athar… - Journal of …, 2024 - Wiley Online Library
Intrusion detection (ID) is critical in securing computer networks against various malicious
attacks. Recent advancements in machine learning (ML), deep learning (DL), federated …

[PDF][PDF] Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization.

R Alkanhel, ESM El-kenawy… - … , Materials & Continua, 2023 - researchgate.net
Applications of internet-of-things (IoT) are increasingly being used in many facets of our
daily life, which results in an enormous volume of data. Cloud computing and fog computing …

lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning

C Hazman, A Guezzaz, S Benkirane, M Azrour - Cluster Computing, 2023 - Springer
Smart cities are being enabled all around the world by Internet of Things (IoT) applications.
A smart city idea necessitates the integration of information and communication …

[HTML][HTML] DDoS attack prevention for internet of thing devices using ethereum blockchain technology

RF Ibrahim, Q Abu Al-Haija, A Ahmad - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) has widely expanded due to its advantages in enhancing the
business, industrial, and social ecosystems. Nevertheless, IoT infrastructure is susceptible to …

[HTML][HTML] PDF malware detection based on optimizable decision trees

Q Abu Al-Haija, A Odeh, H Qattous - Electronics, 2022 - mdpi.com
Portable document format (PDF) files are one of the most universally used file types. This
has incentivized hackers to develop methods to use these normally innocent PDF files to …

Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review

ZT Pritee, MH Anik, SB Alam, JR Jim, MM Kabir… - Computers & …, 2024 - Elsevier
In the continuously developing field of cyber security, user authentication and authorization
play a vital role in protecting personal information and digital assets from unauthorized use …

[HTML][HTML] Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms

E Altulaihan, MA Almaiah, A Aljughaiman - Sensors, 2024 - mdpi.com
Widespread and ever-increasing cybersecurity attacks against Internet of Things (IoT)
systems are causing a wide range of problems for individuals and organizations. The IoT is …

[HTML][HTML] An intrusion detection and classification system for IoT traffic with improved data engineering

AA Alsulami, Q Abu Al-Haija, A Tayeb, A Alqahtani - Applied Sciences, 2022 - mdpi.com
Nowadays, the Internet of Things (IoT) devices and applications have rapidly expanded
worldwide due to their benefits in improving the business environment, industrial …

Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks

S Subramani, M Selvi - Optik, 2023 - Elsevier
Abstract Internet of Things (IoT) utilization is increasing every day in both industry and other
applications recently. However, the IoT communication is under security threats from …

[HTML][HTML] An intelligent identification and classification system for malicious uniform resource locators (URLs)

Q Abu Al-Haija, M Al-Fayoumi - Neural Computing and Applications, 2023 - Springer
Abstract Uniform Resource Locator (URL) is a unique identifier composed of protocol and
domain name used to locate and retrieve a resource on the Internet. Like any Internet …