A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis
Intrusion detection (ID) is critical in securing computer networks against various malicious
attacks. Recent advancements in machine learning (ML), deep learning (DL), federated …
attacks. Recent advancements in machine learning (ML), deep learning (DL), federated …
[PDF][PDF] Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization.
R Alkanhel, ESM El-kenawy… - … , Materials & Continua, 2023 - researchgate.net
Applications of internet-of-things (IoT) are increasingly being used in many facets of our
daily life, which results in an enormous volume of data. Cloud computing and fog computing …
daily life, which results in an enormous volume of data. Cloud computing and fog computing …
lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning
Smart cities are being enabled all around the world by Internet of Things (IoT) applications.
A smart city idea necessitates the integration of information and communication …
A smart city idea necessitates the integration of information and communication …
[HTML][HTML] DDoS attack prevention for internet of thing devices using ethereum blockchain technology
RF Ibrahim, Q Abu Al-Haija, A Ahmad - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) has widely expanded due to its advantages in enhancing the
business, industrial, and social ecosystems. Nevertheless, IoT infrastructure is susceptible to …
business, industrial, and social ecosystems. Nevertheless, IoT infrastructure is susceptible to …
[HTML][HTML] PDF malware detection based on optimizable decision trees
Portable document format (PDF) files are one of the most universally used file types. This
has incentivized hackers to develop methods to use these normally innocent PDF files to …
has incentivized hackers to develop methods to use these normally innocent PDF files to …
Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review
In the continuously developing field of cyber security, user authentication and authorization
play a vital role in protecting personal information and digital assets from unauthorized use …
play a vital role in protecting personal information and digital assets from unauthorized use …
[HTML][HTML] Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms
E Altulaihan, MA Almaiah, A Aljughaiman - Sensors, 2024 - mdpi.com
Widespread and ever-increasing cybersecurity attacks against Internet of Things (IoT)
systems are causing a wide range of problems for individuals and organizations. The IoT is …
systems are causing a wide range of problems for individuals and organizations. The IoT is …
[HTML][HTML] An intrusion detection and classification system for IoT traffic with improved data engineering
Nowadays, the Internet of Things (IoT) devices and applications have rapidly expanded
worldwide due to their benefits in improving the business environment, industrial …
worldwide due to their benefits in improving the business environment, industrial …
Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks
S Subramani, M Selvi - Optik, 2023 - Elsevier
Abstract Internet of Things (IoT) utilization is increasing every day in both industry and other
applications recently. However, the IoT communication is under security threats from …
applications recently. However, the IoT communication is under security threats from …
[HTML][HTML] An intelligent identification and classification system for malicious uniform resource locators (URLs)
Q Abu Al-Haija, M Al-Fayoumi - Neural Computing and Applications, 2023 - Springer
Abstract Uniform Resource Locator (URL) is a unique identifier composed of protocol and
domain name used to locate and retrieve a resource on the Internet. Like any Internet …
domain name used to locate and retrieve a resource on the Internet. Like any Internet …