[HTML][HTML] Intrusion detection for network based cloud computing by custom RC-NN and optimization

T Thilagam, R Aruna - ICT Express, 2021 - Elsevier
Intrusion detection acts as a vital function in providing information security, and additionally
the key technology is to precisely classify diverse attacks. Intrusion detection system (IDS) is …

Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes

LE Jim, N Islam, MA Gregory - Computers & Security, 2022 - Elsevier
The dynamic distributed topology of a Mobile Ad Hoc Network (MANET) provides many
challenges including decentralized infrastructure wherein each node acts as both the host …

A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications

Y Kumar, V Kumar - Wireless Personal Communications, 2023 - Springer
The significance of wireless networks is expanding very rapidly, and their increasing
pervasiveness makes them a vital component of the activities involved in living in the …

Security as a service platform leveraging multi-access edge computing infrastructure provisions

P Ranaweera, VN Imrith, M Liyanag… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-
level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In …

A comparative analysis of Snort 3 and Suricata

AAE Boukebous, MI Fettache… - 2023 IEEE IAS …, 2023 - ieeexplore.ieee.org
The threat of intrusion has become a reality in modern network infrastructures, especially
with the increased usage of IoT devices, cloud computing and wireless telecommunications …

An optimal intrusion detection system using GWO-CSA-DSAE model

PK Keserwani, MC Govil, E S. Pilli - Cyber-Physical Systems, 2021 - Taylor & Francis
In the high demand of the cloud computing environment, intrusion detection in a cloud
network playing a big role in maintaining the faith of the client (s). Due to the increasing …

Explainable AI and deep autoencoders based security framework for IoT network attack certainty

CS Kalutharage, X Liu, C Chrysoulas - … Attacks and Defenses for Internet-of …, 2022 - Springer
Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS)
have become increasingly popular and continue to show remarkable performance in …

Xanthus: Push-button orchestration of host provenance data collection

X Han, J Mickens, A Gehani, M Seltzer… - Proceedings of the 3rd …, 2020 - dl.acm.org
Host-based anomaly detectors generate alarms by inspecting audit logs for suspicious
behavior. Unfortunately, evaluating these anomaly detectors is hard. There are few high …

Evaluating the effectiveness of free rule sets for Snort

N Granberg - 2022 - diva-portal.org
As more of the modern world is connected to the Internet, threats can reach further than ever
before. Attacks happen all the time and many have serious consequences that disrupts the …

[HTML][HTML] Technology, Science and Culture: A Global Vision, Volume IV

LR Hernández, MAS Meneses - … Culture-A Global Vision, Volume IV, 2023 - intechopen.com
Chemistry is not a stagnant scientific discipline; on the contrary, chemistry is a continuously
advancing activity. Indeed, the XXI century is registering the emergence of several highly …