Intrusion detection systems: A cross-domain overview
LN Tidjon, M Frappier… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …
information of users, companies, and industries. However, the growth of the information …
Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms
S Pamarthi, R Narmadha - International Journal of Intelligent …, 2022 - emerald.com
Purpose Nowadays, more interest is found among the researchers in MANETs in practical
and theoretical areas and their performance under various environments. WSNs have …
and theoretical areas and their performance under various environments. WSNs have …
Data-driven intrusion detection for intelligent internet of vehicles: A deep convolutional neural network-based method
As an industrial application of Internet of Things (IoT), Internet of Vehicles (IoV) is one of the
most crucial techniques for Intelligent Transportation System (ITS), which is a basic element …
most crucial techniques for Intelligent Transportation System (ITS), which is a basic element …
Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …
A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network
J Yu, X Ye, H Li - Future Generation Computer Systems, 2022 - Elsevier
The openness of network data makes it vulnerable to hackers, viruses and other attacks,
which seriously threatens the privacy and property security of users. In order to improve the …
which seriously threatens the privacy and property security of users. In order to improve the …
Robust enhancement of intrusion detection systems using deep reinforcement learning and stochastic game
H Benaddi, K Ibrahimi, A Benslimane… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The incorporation of advanced networking technologies makes modern systems vulnerable
to cyber-attacks that can result in a number of harmful outcomes. Due to the increase of …
to cyber-attacks that can result in a number of harmful outcomes. Due to the increase of …
A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks
M Islabudeen, MK Kavitha Devi - Wireless Personal Communications, 2020 - Springer
Abstract Design of intrusion detection and prevention scheme for improving MANET security,
with considered energy efficiency, detection rate, delay, and false positive rate are major …
with considered energy efficiency, detection rate, delay, and false positive rate are major …
An approach for optimal-secure multi-path routing and intrusion detection in MANET
N Veeraiah, BT Krishna - Evolutionary Intelligence, 2022 - Springer
Mobile ad-hoc network (MANET) is dynamic in nature that is susceptible to energy and
security constraints. Among most of the existing techniques, energy optimization was a …
security constraints. Among most of the existing techniques, energy optimization was a …
An enhanced optimization based algorithm for intrusion detection in SCADA network
S Shitharth - Computers & Security, 2017 - Elsevier
Abstract Supervisory Control and Data Acquisition (SCADA) systems are widely used in
many applications including power transmission and distribution for situational awareness …
many applications including power transmission and distribution for situational awareness …
Trust-aware FuzzyClus-Fuzzy NB: intrusion detection scheme based on fuzzy clustering and Bayesian rule
N Veeraiah, BT Krishna - Wireless Networks, 2019 - Springer
The dynamic nature of the nodes on the mobile ad hoc network (MANET) imposes security
issues in the network and most of the Intrusion detection methods concentrated on the …
issues in the network and most of the Intrusion detection methods concentrated on the …