A Systematic Literature Review on Host-Based Intrusion Detection Systems
H Satilmiş, S Akleylek, ZY Tok - Ieee Access, 2024 - ieeexplore.ieee.org
With the advancements in computer networks and systems, the number of security
vulnerabilities and cyber attacks targeting/using these vulnerabilities continues to increase …
vulnerabilities and cyber attacks targeting/using these vulnerabilities continues to increase …
Secure deep learning framework for cloud to protect the virtual machine from malicious events
V Kumar, Shaheen, D Rajani… - Wireless Personal …, 2023 - Springer
In recent decades, user communication has been digitalized with some advanced
applications. However, securing the digital cloud system is complicated because of the …
applications. However, securing the digital cloud system is complicated because of the …
Anomaly Detection with Machine Learning Models Using API Calls
Malware is malicious code developed to damage telecommunications and computer
systems. Many malware causes anomaly events, such as occupying the systems' resources …
systems. Many malware causes anomaly events, such as occupying the systems' resources …