Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey
H Albasheer, M Md Siraj, A Mubarakali… - Sensors, 2022 - mdpi.com
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of
enterprise networks against cyber-attacks. However, NIDS networks suffer from several …
enterprise networks against cyber-attacks. However, NIDS networks suffer from several …
A survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions
In the past several years, the world has witnessed an acute surge in the production and
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …
A survey on the role of artificial intelligence, machine learning and deep learning for cybersecurity attack detection
With the growing internet services, cybersecurity becomes one of the major research
problems of the modern digital era. Cybersecurity involves techniques to protect and control …
problems of the modern digital era. Cybersecurity involves techniques to protect and control …
An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks
Smart devices are connected to the internet, called the Internet of Things (IoT); it is a
wireless network that plays a vital role in modernizing people's interaction by improving …
wireless network that plays a vital role in modernizing people's interaction by improving …
[PDF][PDF] Deep learning approaches for intrusion detection
AA Salih, SY Ameen, SR Zeebaree… - Asian Journal of …, 2021 - academia.edu
Recently, computer networks faced a big challenge, which is that various malicious attacks
are growing daily. Intrusion detection is one of the leading research problems in network …
are growing daily. Intrusion detection is one of the leading research problems in network …
A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques …
W Hu, Q Cao, M Darbandi, N Jafari Navimipour - Cluster Computing, 2024 - Springer
The number of cloud-, edge-, and Internet of Things (IoT)-based applications that produce
sensitive and personal data has rapidly increased in recent years. The IoT is a new model …
sensitive and personal data has rapidly increased in recent years. The IoT is a new model …
Various Soft Computing Based Techniques for Developing Intrusion Detection Management System
Protecting networks and data requires an effective Intrusion Detection System (IDS).
Contextual knowledge processing may be used to identify attacks that are specific to certain …
Contextual knowledge processing may be used to identify attacks that are specific to certain …
Multivariable heuristic approach to intrusion detection in network environments
M Niemiec, R Kościej, B Gdowski - Entropy, 2021 - mdpi.com
The Internet is an inseparable part of our contemporary lives. This means that protection
against threats and attacks is crucial for major companies and for individual users. There is a …
against threats and attacks is crucial for major companies and for individual users. There is a …
Privacy and security of smart systems
K Suresh Kumar, D Prabakaran… - … for sustainable smart …, 2022 - Wiley Online Library
A smart city is a digitized urban area with a collection of electronic sensor nodes for data
collection to maintain the resources and various features efficiently. The smart systems …
collection to maintain the resources and various features efficiently. The smart systems …
An Intrusion Detection System for Smart Autonomous E-Bikes
As the world continues to face environmental challenges, cost-effective ecological mobility
solutions are sought. In this context, E-bikes have been gaining popularity. In this context, a …
solutions are sought. In this context, E-bikes have been gaining popularity. In this context, a …