Network intrusion detection for IoT security based on learning techniques

N Chaabouni, M Mosbah, A Zemmari… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …

Swarm intelligence inspired intrusion detection systems—a systematic literature review

MH Nasir, SA Khan, MM Khan, M Fatima - Computer Networks, 2022 - Elsevier
Abstract An Intrusion Detection System (IDS) is one of the fundamental building blocks in
securing a network. A huge number of techniques have been proposed and implemented to …

A comparative study of different machine learning methods for landslide susceptibility assessment: A case study of Uttarakhand area (India)

BT Pham, B Pradhan, DT Bui, I Prakash… - … Modelling & Software, 2016 - Elsevier
Landslide susceptibility assessment of Uttarakhand area of India has been done by applying
five machine learning methods namely Support Vector Machines (SVM), Logistic …

A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection

V Hajisalem, S Babaie - Computer Networks, 2018 - Elsevier
Due to the widespread use of the internet, computer systems are prone to information theft
that has led to the emergence of Intrusion Detection Systems (IDSs). Various approaches …

Intrusion detection using naive Bayes classifier with feature reduction

S Mukherjee, N Sharma - Procedia Technology, 2012 - Elsevier
Intrusion detection is the process of monitoring and analyzing the events occurring in a
computer system in order to detect signs of security problems. Today most of the intrusion …

Attack classification using feature selection techniques: a comparative study

A Thakkar, R Lohiya - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
The goal of securing a network is to protect the information flowing through the network and
to ensure the security of intellectual as well as sensitive data for the underlying application …

A new intrusion detection system based on Moth–Flame Optimizer algorithm

M Alazab, RA Khurma, A Awajan… - Expert Systems with …, 2022 - Elsevier
This study relies on using a Moth–Flame Optimization (MFO) method as a search algorithm
and a Decision Tree (DT) as an evaluation algorithm to generate an efficient feature subset …

A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions

EM Rudd, A Rozsa, M Günther… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As our professional, social, and financial existences become increasingly digitized and as
our government, healthcare, and military infrastructures rely more on computer technologies …

On self-organizing sequential search heuristics

R Rivest - Communications of the ACM, 1976 - dl.acm.org
This paper examines a class of heuristics for maintaining a sequential list in approximately
optimal order with respect to the average time required to search for a specified element …

[图书][B] Digital forensics

A Årnes - 2017 - books.google.com
The definitive text for students of digital forensics, as well as professionals looking to deepen
their understanding of an increasingly critical field Written by faculty members and …