A comprehensive systematic literature review on intrusion detection systems

M Ozkan-Okay, R Samet, Ö Aslan, D Gupta - IEEE Access, 2021 - ieeexplore.ieee.org
Effectively detecting intrusions in the computer networks still remains problematic. This is
because cyber attackers are changing packet contents to disguise the intrusion detection …

[HTML][HTML] Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms

M Mazini, B Shirazi, I Mahdavi - Journal of King Saud University-Computer …, 2019 - Elsevier
Intrusion detection systems (IDSs) has been considered as the main component of a safe
network. One of the problems of these security systems is false alarm report of intrusion to …

[HTML][HTML] River water salinity prediction using hybrid machine learning models

AM Melesse, K Khosravi, JP Tiefenbacher, S Heddam… - Water, 2020 - mdpi.com
Electrical conductivity (EC), one of the most widely used indices for water quality
assessment, has been applied to predict the salinity of the Babol-Rood River, the greatest …

[PDF][PDF] Blockchain: Secured Solution for Signature Transfer in Distributed Intrusion Detection System.

SR Khonde, V Ulagamuthalvi - Computer Systems Science & …, 2022 - cdn.techscience.cn
Exchange of data in networks necessitates provision of security and confidentiality. Most
networks compromised by intruders are those where the exchange of data is at high risk …

[PDF][PDF] A Novel Intrusion Detection Model of Unknown Attacks Using Convolutional Neural Networks.

A Alsaleh - Computer Systems Science & Engineering, 2024 - cdn.techscience.cn
With the increasing number of connected devices in the Internet of Things (IoT) era, the
number of intrusions is also increasing. An intrusion detection system (IDS) is a secondary …

[HTML][HTML] Discovering computer networks intrusion using data analytics and machine intelligence

OA Sarumi, AO Adetunmbi, FA Adetoye - Scientific African, 2020 - Elsevier
In this era of a digital revolution, the use of the Internet for information storage, access, and
dissemination has increased astronomically. Also, the advent of the Internet of Things (IoT) …

[HTML][HTML] Hybrid intrusion detection system using blockchain framework

SR Khonde, V Ulagamuthalvi - EURASIP Journal on Wireless …, 2022 - Springer
Data security and confidentiality are major goals now days due to the extensive use of the
internet for data sharing. In modern era, most of the networks are compromised by intruders …

[PDF][PDF] Dynamic Ant Colony System with Three Level Update Feature Selection for Intrusion Detection.

HM Rais, T Mehmood - Int. J. Netw. Secur., 2018 - researchgate.net
The current era is known as the age of digital information and general medium of access to
this information is computer networks. The uses of network technology also make …

[PDF][PDF] Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing.

E Mugabo, QY Zhang - Int. J. Netw. Secur., 2020 - academia.edu
Intrusion detection system (IDS) has become an important security method that monitors and
investigates the network security in mobile cloud computing (MCC). However, in some …

Security enrichment in intrusion detection system using classifier ensemble

UR Salunkhe, SN Mali - Journal of Electrical and Computer …, 2017 - Wiley Online Library
In the era of Internet and with increasing number of people as its end users, a large number
of attack categories are introduced daily. Hence, effective detection of various attacks with …