Firewall best practices for securing smart healthcare environment: A review

RW Anwar, T Abdullah, F Pastore - Applied Sciences, 2021 - mdpi.com
Smart healthcare environments are growing at a rapid pace due to the services and benefits
offered to healthcare practitioners and to patients. At the same time, smart healthcare …

Cyber attacks in cyber-physical microgrid systems: A comprehensive review

S Suprabhath Koduru, VSP Machina, S Madichetty - Energies, 2023 - mdpi.com
The importance of and need for cyber security have increased in the last decade. The critical
infrastructure of the country, modeled with cyber-physical systems (CPS), is becoming …

[HTML][HTML] Novel hybrid firefly algorithm: An application to enhance XGBoost tuning for intrusion detection classification

M Zivkovic, M Tair, K Venkatachalam, N Bacanin… - PeerJ Computer …, 2022 - peerj.com
The research proposed in this article presents a novel improved version of the widely
adopted firefly algorithm and its application for tuning and optimising XGBoost classifier …

Classification of firewall log data using multiclass machine learning models

M Aljabri, AA Alahmadi, RMA Mohammad… - Electronics, 2022 - mdpi.com
These days, we are witnessing unprecedented challenges to network security. This indeed
confirms that network security has become increasingly important. Firewall logs are …

A local feature engineering strategy to improve network anomaly detection

S Carta, AS Podda, DR Recupero, R Saia - Future Internet, 2020 - mdpi.com
The dramatic increase in devices and services that has characterized modern societies in
recent decades, boosted by the exponential growth of ever faster network connections and …

Stacking ensemble-based HIDS framework for detecting anomalous system processes in windows based operating systems using multiple word embedding

Y Kumar, B Subba - Computers & Security, 2023 - Elsevier
Globally, more than 80% of end-user devices run on Microsoft's Windows-based operating
systems. Therefore, majority of the cyber-attack payloads are crafted explicitly for exploiting …

[PDF][PDF] Digitale Überwachung und Kontrolle am Arbeitsplatz

W Christl - Von der Ausweitung betrieblicher …, 2021 - wien.arbeiterkammer.at
Durch die rasante Entwicklung der Informations-und Kommunikationstechnologien dringt
die Erfassung von Daten über ArbeitnehmerInnen immer mehr in den betrieblichen Alltag …

A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection

M Lyu, HH Gharakheili, V Sivaraman - IEEE Access, 2024 - ieeexplore.ieee.org
Enterprise networks that host valuable assets and services are popular and frequent targets
of distributed network attacks. In order to cope with the ever-increasing threats, industrial …

Performance evaluation of Convolutional Neural Network for web security

I Jemal, MA Haddar, O Cheikhrouhou… - Computer …, 2021 - Elsevier
Due to the daily use of web applications in several critical domains such as banking and
online shopping, cybersecurity has become a challenge. Recently, deep learning …

PROGESI: a PROxy Grammar to Enhance web application firewall for SQL Injection prevention

A Coscia, V Dentamaro, S Galantucci, A Maci… - IEEE …, 2024 - ieeexplore.ieee.org
A web application is prone to security threats due to its open nature. The security of these
platforms is imperative for organizations of all sizes because they store sensitive information …