Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey

H Albasheer, M Md Siraj, A Mubarakali… - Sensors, 2022 - mdpi.com
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of
enterprise networks against cyber-attacks. However, NIDS networks suffer from several …

A survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions

S Arisdakessian, OA Wahab, A Mourad… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
In the past several years, the world has witnessed an acute surge in the production and
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …

A survey on the role of artificial intelligence, machine learning and deep learning for cybersecurity attack detection

A Salih, ST Zeebaree, S Ameen… - … & Innovation amid …, 2021 - ieeexplore.ieee.org
With the growing internet services, cybersecurity becomes one of the major research
problems of the modern digital era. Cybersecurity involves techniques to protect and control …

An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks

R Kumar, A Malik, V Ranga - Knowledge-Based Systems, 2022 - Elsevier
Smart devices are connected to the internet, called the Internet of Things (IoT); it is a
wireless network that plays a vital role in modernizing people's interaction by improving …

[PDF][PDF] Deep learning approaches for intrusion detection

AA Salih, SY Ameen, SR Zeebaree… - Asian Journal of …, 2021 - academia.edu
Recently, computer networks faced a big challenge, which is that various malicious attacks
are growing daily. Intrusion detection is one of the leading research problems in network …

A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques …

W Hu, Q Cao, M Darbandi, N Jafari Navimipour - Cluster Computing, 2024 - Springer
The number of cloud-, edge-, and Internet of Things (IoT)-based applications that produce
sensitive and personal data has rapidly increased in recent years. The IoT is a new model …

Various Soft Computing Based Techniques for Developing Intrusion Detection Management System

GS Sajjaa, H Pallathadka, M Naved… - ECS …, 2022 - iopscience.iop.org
Protecting networks and data requires an effective Intrusion Detection System (IDS).
Contextual knowledge processing may be used to identify attacks that are specific to certain …

Multivariable heuristic approach to intrusion detection in network environments

M Niemiec, R Kościej, B Gdowski - Entropy, 2021 - mdpi.com
The Internet is an inseparable part of our contemporary lives. This means that protection
against threats and attacks is crucial for major companies and for individual users. There is a …

Privacy and security of smart systems

K Suresh Kumar, D Prabakaran… - … for sustainable smart …, 2022 - Wiley Online Library
A smart city is a digitized urban area with a collection of electronic sensor nodes for data
collection to maintain the resources and various features efficiently. The smart systems …

An Intrusion Detection System for Smart Autonomous E-Bikes

R Maged, M Sabry, A Ali, I Mesabah… - 2023 Eleventh …, 2023 - ieeexplore.ieee.org
As the world continues to face environmental challenges, cost-effective ecological mobility
solutions are sought. In this context, E-bikes have been gaining popularity. In this context, a …