A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions
As our professional, social, and financial existences become increasingly digitized and as
our government, healthcare, and military infrastructures rely more on computer technologies …
our government, healthcare, and military infrastructures rely more on computer technologies …
Darknet as a source of cyber intelligence: Survey, taxonomy, and characterization
Today, the Internet security community largely emphasizes cyberspace monitoring for the
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …
purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …
In-vehicle network intrusion detection using deep convolutional neural network
The implementation of electronics in modern vehicles has resulted in an increase in attacks
targeting in-vehicle networks; thus, attack detection models have caught the attention of the …
targeting in-vehicle networks; thus, attack detection models have caught the attention of the …
CNN-based network intrusion detection against denial-of-service attacks
As cyberattacks become more intelligent, it is challenging to detect advanced attacks in a
variety of fields including industry, national defense, and healthcare. Traditional intrusion …
variety of fields including industry, national defense, and healthcare. Traditional intrusion …
A stacking ensemble for network intrusion detection using heterogeneous datasets
S Rajagopal, PP Kundapur… - Security and …, 2020 - Wiley Online Library
The problem of network intrusion detection poses innumerable challenges to the research
community, industry, and commercial sectors. Moreover, the persistent attacks occurring on …
community, industry, and commercial sectors. Moreover, the persistent attacks occurring on …
A deep learning ensemble for network anomaly and cyber-attack detection
Currently, expert systems and applied machine learning algorithms are widely used to
automate network intrusion detection. In critical infrastructure applications of communication …
automate network intrusion detection. In critical infrastructure applications of communication …
Network intrusion detection system using J48 Decision Tree
S Sahu, BM Mehtre - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
As the number of cyber attacks have increased, detecting the intrusion in networks become
a very tough job. For network intrusion detection system (NIDS), many data mining and …
a very tough job. For network intrusion detection system (NIDS), many data mining and …
Applications in security and evasions in machine learning: a survey
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …
privacy in various applications. ML is used to address serious issues such as real-time …
[PDF][PDF] Intrusion detection system using data mining technique: Support vector machine
YB Bhavsar, KC Waghmare - International Journal of Emerging …, 2013 - academia.edu
Security and privacy of a system is compromised, when an intrusion happens. Intrusion
Detection System (IDS) plays vital role in network security as it detects various types of …
Detection System (IDS) plays vital role in network security as it detects various types of …
Support vector machine meets software defined networking in ids domain
L Boero, M Marchese… - 2017 29th International …, 2017 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) are aimed at analyzing and detecting security problems.
IDS based on anomaly detection and, in particular, on statistical analysis, inspect each traffic …
IDS based on anomaly detection and, in particular, on statistical analysis, inspect each traffic …