Machine learning for anomaly detection: A systematic review
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …
components from data. Many techniques have been used to detect anomalies. One of the …
Anatomy of threats to the internet of things
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
A systematic review on hybrid intrusion detection system
As computer networks keep growing at a high rate, achieving confidentiality, integrity, and
availability of the information system is essential. Intrusion detection systems (IDSs) have …
availability of the information system is essential. Intrusion detection systems (IDSs) have …
iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System
J Verma, A Bhandari, G Singh - Computer Communications, 2022 - Elsevier
Introduction: The growth of ubiquitous networked devices and the proliferation of
geographically dispersed 'Internet of Thing'devices have exponentially increased network …
geographically dispersed 'Internet of Thing'devices have exponentially increased network …
Fraud detection and prevention by using big data analytics
BK Jha, GG Sivasankari… - 2020 Fourth international …, 2020 - ieeexplore.ieee.org
A retail sector is a group of organization or people who sell goods or services for gaining
income. Fraud is wrongful or criminal activities for the economic and personal benefits …
income. Fraud is wrongful or criminal activities for the economic and personal benefits …
Feature selection based intrusion detection system using the combination of DBSCAN, K-Mean++ and SMO algorithms
V Shakya, RRS Makwana - 2017 international conference on …, 2017 - ieeexplore.ieee.org
IDS is the main concern of the security which is useful to prevent the attack at host and
network level. In this propose work, classification of KDD intrusion dataset is proposed along …
network level. In this propose work, classification of KDD intrusion dataset is proposed along …
HyClass: Hybrid classification model for anomaly detection in cloud environment
Network traffic analysis is one of the most important tasks in the era of on-demand Cloud
Computing. However, increased resilience on computing needs, migration flexibility, and …
Computing. However, increased resilience on computing needs, migration flexibility, and …
[PDF][PDF] Convolutional neural network for intrusion detection system in cyber physical systems
Communication Technology in critical infrastructures such as Industrial Control Systems
make them vulnerable to cyberattacks. One particular class of cyber-attacks is advanced …
make them vulnerable to cyberattacks. One particular class of cyber-attacks is advanced …
Research on Network Data Algorithm Based on Association Rules
R Wang - International Journal of Informatics and Information …, 2023 - ijiis.org
The network data algorithm on account of association can effectively describe the
development process of historical data and predict the development trend of data. Draw …
development process of historical data and predict the development trend of data. Draw …
Intrusion detection system by using hybrid algorithm of data mining technique
ZA Foroushani, Y Li - proceedings of the 2018 7th international …, 2018 - dl.acm.org
The aim of a network-based intrusion detection system (NIDS) is to detect malicious activity
that targets a network and its resources. Abnormal activities or behaviors on the network …
that targets a network and its resources. Abnormal activities or behaviors on the network …