Supervised feature selection techniques in network intrusion detection: A critical review
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
The Android malware detection systems between hope and reality
The widespread use of Android-based smartphones made it an important target for
malicious applications' developers. So, a large number of frameworks have been proposed …
malicious applications' developers. So, a large number of frameworks have been proposed …
Intelligent intrusion detection system using clustered self organized map
M Almi'ani, AA Ghazleh, A Al-Rahayfeh… - … on software defined …, 2018 - ieeexplore.ieee.org
The impact of information security breaching becomes bigger and complicated to ignore
every day. New and more sophisticated attacks are emerging and developed; requiring the …
every day. New and more sophisticated attacks are emerging and developed; requiring the …
Empirical enhancement of intrusion detection systems: a comprehensive approach with genetic algorithm-based hyperparameter tuning and hybrid feature selection
Abstract Machine learning-based IDSs have demonstrated promising outcomes in
identifying and mitigating security threats within IoT networks. However, the efficacy of such …
identifying and mitigating security threats within IoT networks. However, the efficacy of such …
A migration-based cuttlefish algorithm with short-term memory for optimization problems
MS Al Daweri, S Abdullah, KAZ Ariffin - IEEE Access, 2020 - ieeexplore.ieee.org
Cuttlefish algorithm (CFA) is a metaheuristic bio-inspired algorithm that mimics the color-
changing behavior by the cuttlefish. It is produced by light reflected from different layers of …
changing behavior by the cuttlefish. It is produced by light reflected from different layers of …
Swift Detection of XSS Attacks: Enhancing XSS Attack Detection by Leveraging Hybrid Semantic Embeddings and AI Techniques
Abstract Cross-Site Scripting (XSS) attacks continue to be a significant threat to web
application security, necessitating robust detection mechanisms to safeguard user data and …
application security, necessitating robust detection mechanisms to safeguard user data and …
Intrusion detection system based on improved abc algorithm with tabu search
An intrusion detection system (IDS) plays an important role in cyber security to detect
network attacks. To improve the effectiveness of IDS, a new intrusion detection approach …
network attacks. To improve the effectiveness of IDS, a new intrusion detection approach …
Cascaded hybrid intrusion detection model based on SOM and RBF neural networks
M Almiani, A AbuGhazleh… - Concurrency and …, 2020 - Wiley Online Library
Cybercriminal activities over computer network systems are considered one of the
preponderant issues that humanity will face in the coming two decades. The development …
preponderant issues that humanity will face in the coming two decades. The development …
Convolutional neural network models using metaheuristic based feature selection method for intrusion detection Saldırı tespiti için metasezgisel tabanlı özellik seçim …
M Salati, İ ASKERBEYLİ… - Journal of the Faculty of …, 2024 - avesis.ankara.edu.tr
This paper proposes a novel approach for intrusion detection using a metaheuristic-based
feature selection method combined with convolutional neural networks (CNNs). The feature …
feature selection method combined with convolutional neural networks (CNNs). The feature …
A Perspective for Intrusion Detection & Prevention in Cloud Environment
S Rani - International Journal of Advanced Networking and …, 2021 - search.proquest.com
The cloud environment is used in all sectors that provide different services to the users. The
assistance provided by the cloud environment in different sectors such as business …
assistance provided by the cloud environment in different sectors such as business …