Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation
Intrusion detection systems (IDSs) are intrinsically linked to a comprehensive solution of
cyberattacks prevention instruments. To achieve a higher detection rate, the ability to design …
cyberattacks prevention instruments. To achieve a higher detection rate, the ability to design …
Machine learning for cloud security: a systematic review
The popularity and usage of Cloud computing is increasing rapidly. Several companies are
investing in this field either for their own use or to provide it as a service for others. One of …
investing in this field either for their own use or to provide it as a service for others. One of …
Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation
Recent advances in intrusion detection systems based on machine learning have indeed
outperformed other techniques, but struggle with detecting multiple classes of attacks with …
outperformed other techniques, but struggle with detecting multiple classes of attacks with …
Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud
AAR Melvin, GJW Kathrine, SS Ilango… - Transactions on …, 2022 - Wiley Online Library
In this new era of cloud computing, Intrusion Detection System (IDS) is very essential for the
continual monitoring of computing resources for signs of compromise since the number of …
continual monitoring of computing resources for signs of compromise since the number of …
Optimization of grow lights control in IoT-based aeroponic systems with sensor fusion and random forest classification
S Karuniawati, AG Putrada… - … on Electronics and …, 2021 - ieeexplore.ieee.org
Grow lights are LED lights specifically for agriculture that can be used for aeroponics
because aeroponics is often cultivated in low light conditions, for example in an indoor …
because aeroponics is often cultivated in low light conditions, for example in an indoor …
[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.
SS Pericherla - ISC Int. J. Inf. Secur., 2023 - researchgate.net
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …
internal digital resources and workloads. One major drawback or limitation of cloud …
Malware detection based on multi-level and dynamic multi-feature using ensemble learning at hypervisor
J Zhang, C Gao, L Gong, Z Gu, D Man, W Yang… - Mobile Networks and …, 2021 - Springer
As more and more applications migrate to clouds, the type and amount of malware attack
against virtualized environments are increasing, which is a key factor that restricts the …
against virtualized environments are increasing, which is a key factor that restricts the …
HyINT: signature-anomaly intrusion detection system
Information plethora being generated in an organization tends to the evolution of cloud
computing technologies for efficient management and accessibility of voluminous data. With …
computing technologies for efficient management and accessibility of voluminous data. With …
Secure monitoring of patients with wandering behavior in hospital environments
Today there is considerable interest for making use of the latest technological
advancements for several healthcare applications. However, there are several challenges …
advancements for several healthcare applications. However, there are several challenges …
A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
DR Rani, G Geethakumari - Peer-to-Peer Networking and Applications, 2021 - Springer
Cloud computing is becoming a prominent service model of computing platforms offering
resources to all categories of users on-demand. On the other side, cloud environment is …
resources to all categories of users on-demand. On the other side, cloud environment is …