A modified grey wolf optimization algorithm for an intrusion detection system
Cyber-attacks and unauthorized application usage have increased due to the extensive use
of Internet services and applications over computer networks, posing a threat to the service's …
of Internet services and applications over computer networks, posing a threat to the service's …
Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT)
The Internet of Things (IoT) plays a crucial role in various sectors such as automobiles and
the logistic tracking medical field because it consists of distributed nodes, servers, and …
the logistic tracking medical field because it consists of distributed nodes, servers, and …
smote-drnn: A deep learning algorithm for botnet detection in the internet-of-things networks
Nowadays, hackers take illegal advantage of distributed resources in a network of
computing devices (ie, botnet) to launch cyberattacks against the Internet of Things (IoT) …
computing devices (ie, botnet) to launch cyberattacks against the Internet of Things (IoT) …
A comprehensive review of deep learning techniques for the detection of (distributed) denial of service attacks
A Comprehensive Review of Deep Learning Techniques for the Detection of (Distributed)
Denial of Service Attacks Page 1 Information Technology and Control 2022/1/51 180 A …
Denial of Service Attacks Page 1 Information Technology and Control 2022/1/51 180 A …
Secured communication using virtual private network (VPN)
The evolution and era of the latest programs and services, collectively with the enlargement
of encrypted communications, make it difficult for site visitors within a safety enterprise …
of encrypted communications, make it difficult for site visitors within a safety enterprise …
LITNET-2020: An annotated real-world network flow dataset for network intrusion detection
Network intrusion detection is one of the main problems in ensuring the security of modern
computer networks, Wireless Sensor Networks (WSN), and the Internet-of-Things (IoT). In …
computer networks, Wireless Sensor Networks (WSN), and the Internet-of-Things (IoT). In …
[HTML][HTML] A Fuzzy Logic based feature engineering approach for Botnet detection using ANN
In recent years, Botnet has become one of the most dreadful type of malicious entity.
Because of the hidden and carrying capacity of Botnet, the detection task has become a real …
Because of the hidden and carrying capacity of Botnet, the detection task has become a real …
[HTML][HTML] Enhanced threat intelligence framework for advanced cybersecurity resilience
The increasing severity of cyber-attacks against organizations emphasizes the necessity for
efficient threat intelligence. This article presents a novel multi-layered architecture for threat …
efficient threat intelligence. This article presents a novel multi-layered architecture for threat …
Network intrusion detection with a hashing based apriori algorithm using Hadoop MapReduce
Ubiquitous nature of Internet services across the globe has undoubtedly expanded the
strategies and operational mode being used by cybercriminals to perpetrate their unlawful …
strategies and operational mode being used by cybercriminals to perpetrate their unlawful …
Performance improvement of intrusion detection system for detecting attacks on internet of things and edge of things
YK Saheed - Artificial Intelligence for Cloud and Edge Computing, 2022 - Springer
Edge computing (EC) is a computing methodology that is distributed in nature that brings
data storage and computation closer to the place where it is to be used to accelerate …
data storage and computation closer to the place where it is to be used to accelerate …