Cyber sentinel: Exploring conversational agents in streamlining security tasks with gpt-4
In an era where cyberspace is both a battleground and a backbone of modern society, the
urgency of safeguarding digital assets against ever-evolving threats is paramount. This …
urgency of safeguarding digital assets against ever-evolving threats is paramount. This …
Enhancing network threat detection with random forest-based NIDS and permutation feature importance
Abstract Network Intrusion Detection Systems (NIDS) are critical for protecting computer
networks from unauthorized activities. Traditional NIDS rely on rule-based signatures, which …
networks from unauthorized activities. Traditional NIDS rely on rule-based signatures, which …
Large language models in 6G security: challenges and opportunities
The rapid integration of Generative AI (GenAI) and Large Language Models (LLMs) in
sectors such as education and healthcare have marked a significant advancement in …
sectors such as education and healthcare have marked a significant advancement in …
Hazard prediction of water inrush in water-rich tunnels based on random forest algorithm
N Zhang, M Niu, F Wan, J Lu, Y Wang, X Yan, C Zhou - Applied Sciences, 2024 - mdpi.com
To prevent large-scale water inrush accidents during the excavation process of a water-rich
tunnel, a method, based on a random forest (RF) algorithm, for predicting the hazard level of …
tunnel, a method, based on a random forest (RF) algorithm, for predicting the hazard level of …
Intrusion detection method based on improved social network search algorithm
Z Yang, Q Wang, X Zong, G Wang - Computers & Security, 2024 - Elsevier
The network security problem in today's world is becoming more and more prominent, and
intrusion detection as a branch in the field of network security has been developed …
intrusion detection as a branch in the field of network security has been developed …
ENNigma: A framework for Private Neural Networks
The widespread use of the Internet and digital services has significantly increased data
collection and processing. Critical domains like healthcare rely on this data, but privacy and …
collection and processing. Critical domains like healthcare rely on this data, but privacy and …
Cyber threat hunting using unsupervised federated learning and adversary emulation
The rapid growth of communication networks, coupled with the increasing complexity of
cyber threats, necessitates the implementation of proactive measures to protect networks …
cyber threats, necessitates the implementation of proactive measures to protect networks …
Advancing security in 5g core networks through unsupervised federated time series modeling
The rapid development of fifth-generation (5G) mobile communication technology poses
fresh challenges for cybersecurity defense systems. Current intrusion detection mechanisms …
fresh challenges for cybersecurity defense systems. Current intrusion detection mechanisms …
Application of GA-WELM Model Based on Stratified Cross-Validation in Intrusion Detection
C Chen, X Guo, W Zhang, Y Zhao, B Wang, B Ma… - Symmetry, 2023 - mdpi.com
Aiming at the problem of poor detection performance under the environment of imbalanced
type distribution, an intrusion detection model of genetic algorithm to optimize weighted …
type distribution, an intrusion detection model of genetic algorithm to optimize weighted …
ResACAG: A graph neural network based intrusion detection
A Zhang, Y Zhao, C Zhou, T Zhang - Computers and Electrical Engineering, 2025 - Elsevier
With the continuous growth of network throughput, the field of network security is facing
increasingly severe challenges. To address this challenge, this paper proposes a network …
increasingly severe challenges. To address this challenge, this paper proposes a network …