Multi‐aspects AI‐based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview
IH Sarker - Security and Privacy, 2023 - Wiley Online Library
Due to the rising dependency on digital technology, cybersecurity has emerged as a more
prominent field of research and application that typically focuses on securing devices …
prominent field of research and application that typically focuses on securing devices …
[HTML][HTML] A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection
M Vishwakarma, N Kesswani - Decision Analytics Journal, 2023 - Elsevier
Technology is pivotal in the rapid growth of services and intensifying the quality of life.
Recent technology, like the Internet of Things (IoT), demonstrates an impressive …
Recent technology, like the Internet of Things (IoT), demonstrates an impressive …
Combining multi-agent systems and Artificial Intelligence of Things: Technical challenges and gains
Abstract A Multi-Agent System (MAS) usually refers to a network of autonomous agents that
interact with each other to achieve a common objective. This system is therefore composed …
interact with each other to achieve a common objective. This system is therefore composed …
[HTML][HTML] Smart home anomaly-based IDS: Architecture proposal and case study
The complexity and diversity of the technologies involved in the Internet of Things (IoT)
challenge the generalization of security solutions based on anomaly detection, which should …
challenge the generalization of security solutions based on anomaly detection, which should …
Integration of IoT and Blockchain for Smart and Secured Supply Chain Management: Case Studies of China
This chapter will focus on the combination of supply chain management and digital
technology. Starting from the popular digital terms in the current market, the authors examine …
technology. Starting from the popular digital terms in the current market, the authors examine …
Oblivious network intrusion detection systems
A main function of network intrusion detection systems (NIDSs) is to monitor network traffic
and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but …
and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but …
On the way to automatic exploitation of vulnerabilities and validation of systems security through security chaos engineering
S Palacios Chavarro, P Nespoli, D Díaz-López… - Big Data and Cognitive …, 2022 - mdpi.com
Software is behind the technological solutions that deliver many services to our society,
which means that software security should not be considered a desirable feature anymore …
which means that software security should not be considered a desirable feature anymore …
Machine Learning Based Intrusion Detection System
R Udayakumar, D Balakrishnan… - 2023 3rd …, 2023 - ieeexplore.ieee.org
In today's digital landscape, the increasing frequency and sophistication of cyberattacks
have highlighted the necessity for robust intrusion detection systems (IDS) to safe-guard …
have highlighted the necessity for robust intrusion detection systems (IDS) to safe-guard …
On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT
MWP Shuvo, MN Hoq, S Majumdar… - … Conference on Research …, 2023 - Springer
Even though there exist a number of security guidelines and recommendations from various
worldwide standardization authorities (eg, NIST, ISO, ENISA), it is evident from many of the …
worldwide standardization authorities (eg, NIST, ISO, ENISA), it is evident from many of the …
MalSEIRS: Forecasting malware spread based on compartmental models in epidemiology
I Martínez Martínez, A Florián Quitián… - …, 2021 - Wiley Online Library
Over the last few decades, the Internet has brought about a myriad of benefits to almost
every aspect of our daily lives. However, malware attacks have also widely proliferated …
every aspect of our daily lives. However, malware attacks have also widely proliferated …