Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues
S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …
attacks to exploit the information occurs. A technology to store and maintain user's …
A systematic review of security threats and countermeasures in SaaS
MÁ Díaz de León Guillén… - Journal of computer …, 2020 - content.iospress.com
Among the service models provided by the cloud, the software as a service (SaaS) model
has had the greatest growth. This service model is an attractive option for organizations, as …
has had the greatest growth. This service model is an attractive option for organizations, as …
A survey and classification of XML based attacks on web applications
ABSTRACT XML based attacks are executed in web applications through crafted XML
document that forces XML parser to process un-validated documents. This leads to …
document that forces XML parser to process un-validated documents. This leads to …
Data Mining Techniques and Applications: A Ten-Year Update
N Rahman - … Journal of Strategic Information Technology and …, 2018 - igi-global.com
Data mining has been gaining attention with the complex business environments, as a rapid
increase of data volume and the ubiquitous nature of data in this age of the internet and …
increase of data volume and the ubiquitous nature of data in this age of the internet and …
Design challenges and assessment of modern web applications intrusion detection and prevention systems (IDPS)
Y Sadqi, M Mekkaoui - Innovations in Smart Cities Applications Volume 4 …, 2021 - Springer
Intrusion detection and prevention systems (IDPS) are primarily designed to observe, detect
and prevent malicious activity on the network. However, the characteristics of traditional …
and prevent malicious activity on the network. However, the characteristics of traditional …
[PDF][PDF] Protection of XML-based denial-of-service and HTTP flooding attacks in web services using the middleware tool
A Alasri, R Sulaiman - International Journal of Engineering and …, 2018 - researchgate.net
A web service is defined as the method of communication between the web applications and
the clients. Web services are very flexible and scalable as they are independent of both the …
the clients. Web services are very flexible and scalable as they are independent of both the …
[PDF][PDF] Reducing the Effect of Denial of Service in Web Service Environment
A Alshayea, MAH Eljinini - Journal of Advances in Information Technology, 2023 - jait.us
Denial of Service (DoS) attacks can cost online and web service providers money and
damage their reputations. The lack of security protection in web services creates a …
damage their reputations. The lack of security protection in web services creates a …
Graph-based fuzzy approach against DDoS attacks
While internet technologies have been evolving day by day, threats against them have been
increasing with the same pace. One of the most serious and commonly executed attack type …
increasing with the same pace. One of the most serious and commonly executed attack type …
Association Rule Mining for Intrusion Detection System: A Survey
D Selvamani, V Selvi - Asian Journal of Engineering and Applied …, 2019 - ajeat.com
Many modern intrusion detection systems are based on data mining and database-centric
architecture, where a number of data mining techniques have been found. Among the most …
architecture, where a number of data mining techniques have been found. Among the most …
[PDF][PDF] A Comprehensive Review of Intrusion Detection System Approach and Technique
OA Ebere, I Led, UTG Ekene, DG Chijioke… - International Journal of …, 2021 - ijaem.net
The problem of securing information and data flows has existed from the origin of network
communication. Diverse approaches have been developed to protect and transfer such …
communication. Diverse approaches have been developed to protect and transfer such …