[HTML][HTML] Intrusion detection for network based cloud computing by custom RC-NN and optimization
T Thilagam, R Aruna - ICT Express, 2021 - Elsevier
Intrusion detection acts as a vital function in providing information security, and additionally
the key technology is to precisely classify diverse attacks. Intrusion detection system (IDS) is …
the key technology is to precisely classify diverse attacks. Intrusion detection system (IDS) is …
Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes
LE Jim, N Islam, MA Gregory - Computers & Security, 2022 - Elsevier
The dynamic distributed topology of a Mobile Ad Hoc Network (MANET) provides many
challenges including decentralized infrastructure wherein each node acts as both the host …
challenges including decentralized infrastructure wherein each node acts as both the host …
A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications
The significance of wireless networks is expanding very rapidly, and their increasing
pervasiveness makes them a vital component of the activities involved in living in the …
pervasiveness makes them a vital component of the activities involved in living in the …
Security as a service platform leveraging multi-access edge computing infrastructure provisions
The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-
level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In …
level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In …
A comparative analysis of Snort 3 and Suricata
AAE Boukebous, MI Fettache… - 2023 IEEE IAS …, 2023 - ieeexplore.ieee.org
The threat of intrusion has become a reality in modern network infrastructures, especially
with the increased usage of IoT devices, cloud computing and wireless telecommunications …
with the increased usage of IoT devices, cloud computing and wireless telecommunications …
An optimal intrusion detection system using GWO-CSA-DSAE model
In the high demand of the cloud computing environment, intrusion detection in a cloud
network playing a big role in maintaining the faith of the client (s). Due to the increasing …
network playing a big role in maintaining the faith of the client (s). Due to the increasing …
Explainable AI and deep autoencoders based security framework for IoT network attack certainty
Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS)
have become increasingly popular and continue to show remarkable performance in …
have become increasingly popular and continue to show remarkable performance in …
Xanthus: Push-button orchestration of host provenance data collection
Host-based anomaly detectors generate alarms by inspecting audit logs for suspicious
behavior. Unfortunately, evaluating these anomaly detectors is hard. There are few high …
behavior. Unfortunately, evaluating these anomaly detectors is hard. There are few high …
Evaluating the effectiveness of free rule sets for Snort
N Granberg - 2022 - diva-portal.org
As more of the modern world is connected to the Internet, threats can reach further than ever
before. Attacks happen all the time and many have serious consequences that disrupts the …
before. Attacks happen all the time and many have serious consequences that disrupts the …
[HTML][HTML] Technology, Science and Culture: A Global Vision, Volume IV
LR Hernández, MAS Meneses - … Culture-A Global Vision, Volume IV, 2023 - intechopen.com
Chemistry is not a stagnant scientific discipline; on the contrary, chemistry is a continuously
advancing activity. Indeed, the XXI century is registering the emergence of several highly …
advancing activity. Indeed, the XXI century is registering the emergence of several highly …