Network intrusion detection for IoT security based on learning techniques
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …
Swarm intelligence inspired intrusion detection systems—a systematic literature review
Abstract An Intrusion Detection System (IDS) is one of the fundamental building blocks in
securing a network. A huge number of techniques have been proposed and implemented to …
securing a network. A huge number of techniques have been proposed and implemented to …
A comparative study of different machine learning methods for landslide susceptibility assessment: A case study of Uttarakhand area (India)
Landslide susceptibility assessment of Uttarakhand area of India has been done by applying
five machine learning methods namely Support Vector Machines (SVM), Logistic …
five machine learning methods namely Support Vector Machines (SVM), Logistic …
A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection
V Hajisalem, S Babaie - Computer Networks, 2018 - Elsevier
Due to the widespread use of the internet, computer systems are prone to information theft
that has led to the emergence of Intrusion Detection Systems (IDSs). Various approaches …
that has led to the emergence of Intrusion Detection Systems (IDSs). Various approaches …
Intrusion detection using naive Bayes classifier with feature reduction
S Mukherjee, N Sharma - Procedia Technology, 2012 - Elsevier
Intrusion detection is the process of monitoring and analyzing the events occurring in a
computer system in order to detect signs of security problems. Today most of the intrusion …
computer system in order to detect signs of security problems. Today most of the intrusion …
Attack classification using feature selection techniques: a comparative study
The goal of securing a network is to protect the information flowing through the network and
to ensure the security of intellectual as well as sensitive data for the underlying application …
to ensure the security of intellectual as well as sensitive data for the underlying application …
A new intrusion detection system based on Moth–Flame Optimizer algorithm
This study relies on using a Moth–Flame Optimization (MFO) method as a search algorithm
and a Decision Tree (DT) as an evaluation algorithm to generate an efficient feature subset …
and a Decision Tree (DT) as an evaluation algorithm to generate an efficient feature subset …
A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions
As our professional, social, and financial existences become increasingly digitized and as
our government, healthcare, and military infrastructures rely more on computer technologies …
our government, healthcare, and military infrastructures rely more on computer technologies …
On self-organizing sequential search heuristics
R Rivest - Communications of the ACM, 1976 - dl.acm.org
This paper examines a class of heuristics for maintaining a sequential list in approximately
optimal order with respect to the average time required to search for a specified element …
optimal order with respect to the average time required to search for a specified element …
[图书][B] Digital forensics
A Årnes - 2017 - books.google.com
The definitive text for students of digital forensics, as well as professionals looking to deepen
their understanding of an increasingly critical field Written by faculty members and …
their understanding of an increasingly critical field Written by faculty members and …