Image-based malware classification using VGG19 network and spatial convolutional attention

MJ Awan, OA Masood, MA Mohammed, A Yasin… - Electronics, 2021 - mdpi.com
In recent years the amount of malware spreading through the internet and infecting
computers and other communication devices has tremendously increased. To date …

Survey on Federated Learning for Intrusion Detection System: Concept, Architectures, Aggregation Strategies, Challenges, and Future Directions

A Khraisat, A Alazab, S Singh, T Jan… - ACM Computing …, 2024 - dl.acm.org
Intrusion Detection Systems (IDS) are essential for securing computer networks by
identifying and mitigating potential threats. However, traditional IDS systems face challenges …

Intrusion detection based on bidirectional long short-term memory with attention mechanism

Y Yang, S Tu, RH Ali, H Alasmary, M Waqas… - 2023 - ro.ecu.edu.au
With the recent developments in the Internet of Things (IoT), the amount of data collected
has expanded tremendously, resulting in a higher demand for data storage, computational …

Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks

DK Sharma, T Dhankhar, G Agrawal, SK Singh… - Ad Hoc Networks, 2021 - Elsevier
Internet of things or in short IoT is a network of interconnected entities such as computing
devices, mechanical machines, digital gadgets etc. Cloud based IoT infrastructures are …

Mitigating the risks of malware attacks with deep Learning techniques

AM Alnajim, S Habib, M Islam, R Albelaihi… - Electronics, 2023 - mdpi.com
Malware has become increasingly prevalent in recent years, endangering people,
businesses, and digital assets worldwide. Despite the numerous techniques and …

The use of computational geometry techniques to resolve the issues of coverage and connectivity in wireless sensor networks

S Devi, A Sangwan, A Sangwan, MA Mohammed… - Sensors, 2022 - mdpi.com
Wireless Sensor Networks (WSNs) enhance the ability to sense and control the physical
environment in various applications. The functionality of WSNs depends on various aspects …

Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks

FM Aswad, AMS Ahmed, NAM Alhammadi… - Journal of Intelligent …, 2023 - degruyter.com
With the rapid growth of informatics systems' technology in this modern age, the Internet of
Things (IoT) has become more valuable and vital to everyday life in many ways. IoT …

Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction

FM Aswad, AN Kareem, AM Khudhur… - Journal of Intelligent …, 2021 - degruyter.com
Floods are one of the most common natural disasters in the world that affect all aspects of
life, including human beings, agriculture, industry, and education. Research for developing …

Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat

I Herrera Montano, JJ García Aranda, J Ramos Diaz… - Cluster …, 2022 - Springer
Data leakage is a problem that companies and organizations face every day around the
world. Mainly the data leak caused by the internal threat posed by authorized personnel to …

Feature selection in intrusion detection systems: a new hybrid fusion of Bat algorithm and Residue Number System

YK Saheed, TO Kehinde, M Ayobami Raji… - Journal of Information …, 2024 - Taylor & Francis
This research introduces innovative approaches to enhance intrusion detection systems
(IDSs) by addressing critical challenges in existing methods. Various machine-learning …