Machine learning (ML)-centric resource management in cloud computing: A review and future directions
Cloud computing has rapidly emerged as a model for delivering Internet-based utility
computing services. Infrastructure as a Service (IaaS) is one of the most important and …
computing services. Infrastructure as a Service (IaaS) is one of the most important and …
Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system
The mission of an intrusion detection system (IDS) is to monitor network activities and
assess whether or not they are malevolent. Specifically, anomaly-based IDS can discover …
assess whether or not they are malevolent. Specifically, anomaly-based IDS can discover …
Machine learning and deep learning based intrusion detection in cloud environment: a review
Due to its open and dispersed nature, cloud computing (CC) faces several security-related
difficulties. As a result, it is weak and open to breaches that compromise the security …
difficulties. As a result, it is weak and open to breaches that compromise the security …
Network intrusion detection of drones using recurrent neural networks
Y Sucharitha, PCS Reddy… - … : Future Trends and …, 2023 - Wiley Online Library
Summary Flying Ad Hoc Network (FANET) has obtained a great deal of interest over recent
times because of their significant applications. Thus, various examinations have been led on …
times because of their significant applications. Thus, various examinations have been led on …
An improved design for a cloud intrusion detection system using hybrid features selection approach with ML classifier
The focus of cloud computing nowadays has been reshaping the digital epoch, in which
clients now face serious concerns about the security and privacy of their data hosted in the …
clients now face serious concerns about the security and privacy of their data hosted in the …
A novel network intrusion detection method based on metaheuristic optimisation algorithms
R Ghanbarzadeh, A Hosseinalipour… - Journal of ambient …, 2023 - Springer
The growing use of the Internet with its vulnerabilities has necessitated the adoption of
Intrusion Detection Systems (IDS) to assure security. IDSs are protective systems that detect …
Intrusion Detection Systems (IDS) to assure security. IDSs are protective systems that detect …
An optimized model for network intrusion detection systems in industry 4.0 using XAI based Bi-LSTM framework
S Sivamohan, SS Sridhar - Neural Computing and Applications, 2023 - Springer
Industry 4.0 enable novel business cases, such as client-specific production, real-time
monitoring of process condition and progress, independent decision making and remote …
monitoring of process condition and progress, independent decision making and remote …
A hybrid intrusion detection system based on feature selection and weighted stacking classifier
R Zhao, Y Mu, L Zou, X Wen - IEEE Access, 2022 - ieeexplore.ieee.org
Cyber-attacks occur more frequently with the rapid growth in the Internet. Intrusion detection
systems (IDS) have become an important part of protecting system security. There are still …
systems (IDS) have become an important part of protecting system security. There are still …
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization
Industrial cyber-physical systems (CPS) are vulnerable to cyberattacks that can compromise
their operations, safety, and security. Traditional intrusion detection systems are ineffective …
their operations, safety, and security. Traditional intrusion detection systems are ineffective …
GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment
M Arunkumar, KA Kumar - International Journal of Information Technology, 2023 - Springer
Cloud computing is the most useful computing technology for the new service progression.
Due to the distributed nature of cloud computing, security threats and cyber attacks are …
Due to the distributed nature of cloud computing, security threats and cyber attacks are …