Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

Shallow and deep networks intrusion detection system: A taxonomy and survey

E Hodo, X Bellekens, A Hamilton, C Tachtatzis… - arXiv preprint arXiv …, 2017 - arxiv.org
Intrusion detection has attracted a considerable interest from researchers and industries.
The community, after many years of research, still faces the problem of building reliable and …

From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods

A Nisioti, A Mylonas, PD Yoo… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …

An ensemble of prediction and learning mechanism for improving accuracy of anomaly detection in network intrusion environments

Imran, F Jamil, D Kim - Sustainability, 2021 - mdpi.com
The connectivity of our surrounding objects to the internet plays a tremendous role in our
daily lives. Many network applications have been developed in every domain of life …

Detection of DDOS attack using deep learning model in cloud storage application

A Agarwal, M Khari, R Singh - Wireless Personal Communications, 2022 - Springer
In recent years, distributed denial of service (DDoS) attacks pose a serious threat to network
security. How to detect and defend against DDoS attacks is currently a hot topic in both …

[HTML][HTML] A comprehensive review of AI based intrusion detection system

T Sowmya, EAM Anita - Measurement: Sensors, 2023 - Elsevier
In today's digital world, the tremendous amount of data poses a significant challenge to
cyber security. The complexity of cyber-attacks makes it difficult to develop efficient tools to …

A systematic review on hybrid intrusion detection system

EM Maseno, Z Wang, H Xing - Security and Communication …, 2022 - Wiley Online Library
As computer networks keep growing at a high rate, achieving confidentiality, integrity, and
availability of the information system is essential. Intrusion detection systems (IDSs) have …

[PDF][PDF] Intrusion detection using a novel hybrid method incorporating an improved KNN

H Shapoorifard, P Shamsinejad - Int. J. Comput. Appl, 2017 - fardapaper.ir
These days, with the tremendous growth of network-based service and shared information
on networks, the risk of network attacks and intrusions increases too, therefore network …

Network intrusion detection method based on PCA and Bayes algorithm

B Zhang, Z Liu, Y Jia, J Ren… - Security and …, 2018 - Wiley Online Library
Intrusion detection refers to monitoring network data information, quickly detecting intrusion
behavior, can avoid the harm caused by intrusion to a certain extent. Traditional intrusion …

Feature selection of denial-of-service attacks using entropy and granular computing

S Khan, A Gani, AWA Wahab, PK Singh - Arabian Journal for Science and …, 2018 - Springer
Recently, many researchers have paid attention toward denial of services (DoS) and its
malicious handling. The Intrusion detection system is one of the most common detection …