Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
Shallow and deep networks intrusion detection system: A taxonomy and survey
Intrusion detection has attracted a considerable interest from researchers and industries.
The community, after many years of research, still faces the problem of building reliable and …
The community, after many years of research, still faces the problem of building reliable and …
From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …
attacks. This holds true, as more and more organizations admit compromises on a daily …
An ensemble of prediction and learning mechanism for improving accuracy of anomaly detection in network intrusion environments
The connectivity of our surrounding objects to the internet plays a tremendous role in our
daily lives. Many network applications have been developed in every domain of life …
daily lives. Many network applications have been developed in every domain of life …
Detection of DDOS attack using deep learning model in cloud storage application
In recent years, distributed denial of service (DDoS) attacks pose a serious threat to network
security. How to detect and defend against DDoS attacks is currently a hot topic in both …
security. How to detect and defend against DDoS attacks is currently a hot topic in both …
[HTML][HTML] A comprehensive review of AI based intrusion detection system
T Sowmya, EAM Anita - Measurement: Sensors, 2023 - Elsevier
In today's digital world, the tremendous amount of data poses a significant challenge to
cyber security. The complexity of cyber-attacks makes it difficult to develop efficient tools to …
cyber security. The complexity of cyber-attacks makes it difficult to develop efficient tools to …
A systematic review on hybrid intrusion detection system
As computer networks keep growing at a high rate, achieving confidentiality, integrity, and
availability of the information system is essential. Intrusion detection systems (IDSs) have …
availability of the information system is essential. Intrusion detection systems (IDSs) have …
[PDF][PDF] Intrusion detection using a novel hybrid method incorporating an improved KNN
H Shapoorifard, P Shamsinejad - Int. J. Comput. Appl, 2017 - fardapaper.ir
These days, with the tremendous growth of network-based service and shared information
on networks, the risk of network attacks and intrusions increases too, therefore network …
on networks, the risk of network attacks and intrusions increases too, therefore network …
Network intrusion detection method based on PCA and Bayes algorithm
B Zhang, Z Liu, Y Jia, J Ren… - Security and …, 2018 - Wiley Online Library
Intrusion detection refers to monitoring network data information, quickly detecting intrusion
behavior, can avoid the harm caused by intrusion to a certain extent. Traditional intrusion …
behavior, can avoid the harm caused by intrusion to a certain extent. Traditional intrusion …
Feature selection of denial-of-service attacks using entropy and granular computing
Recently, many researchers have paid attention toward denial of services (DoS) and its
malicious handling. The Intrusion detection system is one of the most common detection …
malicious handling. The Intrusion detection system is one of the most common detection …