[HTML][HTML] Cyber security in iot-based cloud computing: A comprehensive survey
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …
at various locations and are accessible from various industrial environments. Cloud …
A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges
Abstract Internet of Things (IoT) is widely accepted technology in both industrial as well as
academic field. The objective of IoT is to combine the physical environment with the cyber …
academic field. The objective of IoT is to combine the physical environment with the cyber …
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
A survey of intrusion detection systems leveraging host data
RA Bridges, TR Glass-Vanderlan… - ACM computing …, 2019 - dl.acm.org
This survey focuses on intrusion detection systems (IDS) that leverage host-based data
sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is …
sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is …
MLEsIDSs: machine learning-based ensembles for intrusion detection systems—a review
Network security plays an essential role in secure communication and avoids financial loss
and crippled services due to network intrusions. Intruders generally exploit the flaws of …
and crippled services due to network intrusions. Intruders generally exploit the flaws of …
Intrusion detection systems in the cloud computing: A comprehensive and deep literature review
Z Liu, B Xu, B Cheng, X Hu… - … : Practice and Experience, 2022 - Wiley Online Library
Abrupt development of resources and rising expenses of infrastructure are leading
institutions to take on cloud computing. Albeit, the cloud environment is vulnerable to various …
institutions to take on cloud computing. Albeit, the cloud environment is vulnerable to various …
[PDF][PDF] Survey on intrusion detection system types
Intrusion detection system (IDS) is one of amongst the most essential consideration of cyber-
security that can discover intrusion before and/or after attack occur. An Intrusion detection …
security that can discover intrusion before and/or after attack occur. An Intrusion detection …
Feature selection using a combination of ant colony optimization and random forest algorithms applied to isolation forest based intrusion detection system
For businesses to operate effectively, networks and computer systems have become crucial
instruments. They are now used in all professional fields, including the military, universities …
instruments. They are now used in all professional fields, including the military, universities …
New anomaly network intrusion detection system in cloud environment based on optimized back propagation neural network using improved genetic algorithm
Cloud computing is distributed architecture, providing computing facilities and storage
resource as a service over an open environment (Internet), this lead to different matters …
resource as a service over an open environment (Internet), this lead to different matters …
Probabilistic real-time intrusion detection system for docker containers
The use of containers has become mainstream and ubiquitous in cloud environments. A
container is a way to abstract processes and file systems into a single unit separate from the …
container is a way to abstract processes and file systems into a single unit separate from the …