Machine learning for misuse-based network intrusion detection: overview, unified evaluation and feature choice comparison framework
Network Intrusion detection systems are essential for the protection of advanced
communication networks. Originally, these systems were hard-coded to identify specific …
communication networks. Originally, these systems were hard-coded to identify specific …
Machine learning and deep learning based intrusion detection in cloud environment: a review
Due to its open and dispersed nature, cloud computing (CC) faces several security-related
difficulties. As a result, it is weak and open to breaches that compromise the security …
difficulties. As a result, it is weak and open to breaches that compromise the security …
Security threats, defense mechanisms, challenges, and future directions in cloud computing
S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G
Internet need services offered by cloud computing for processing and storing more …
Internet need services offered by cloud computing for processing and storing more …
Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment
DK Jain, W Ding, K Kotecha - International Journal of Machine Learning …, 2023 - Springer
Cloud computing (CC) has become one of the prominent technologies because of the
significant utility services, which focus on outsourcing data to companies and individual …
significant utility services, which focus on outsourcing data to companies and individual …
[HTML][HTML] Hybridized classification algorithms for data classification applications: A review
Abstract Machine-based classification usually involves some computer programs, known as
algorithms, developed using several mathematical formulations to accelerate the automated …
algorithms, developed using several mathematical formulations to accelerate the automated …
Recurrent and deep learning neural network models for DDoS attack detection
Distributed denial of service (DDoS) attack is a subclass of denial of service attack that
performs severe attack in a cloud computing environment. It makes a malicious attempt to …
performs severe attack in a cloud computing environment. It makes a malicious attempt to …
[PDF][PDF] Enhanced coyote optimization with deep learning based cloud-intrusion detection system
Cloud Computing (CC) is the preference of all information technology (IT) organizations as it
offers pay-per-use based and flexible services to its users. But the privacy and security …
offers pay-per-use based and flexible services to its users. But the privacy and security …
Selection of a rational composition of information protection means using a genetic algorithm
This article describes a modified genetic algorithm (MGA) for solving a multicriteria
optimization problem for the selection and optimization of the information security means …
optimization problem for the selection and optimization of the information security means …
A Modified Hybrid Method Based on PSO, GA, and K‐Means for Network Anomaly Detection
Y Yuan, Y Li - Mathematical Problems in Engineering, 2022 - Wiley Online Library
Data anomaly detection plays a vital role in protecting network security and developing
network technology. Aiming at the detection problems of large data volume, complex …
network technology. Aiming at the detection problems of large data volume, complex …
[Retracted] Decision‐Making Model of Product Modeling Big Data Design Scheme Based on Neural Network Optimized by Genetic Algorithm
M Hu - Computational Intelligence and Neuroscience, 2021 - Wiley Online Library
At present, machine learning artificial neural network technology, as one of the core
technologies of enterprises, has received unprecedented attention. This technology is …
technologies of enterprises, has received unprecedented attention. This technology is …