A comprehensive survey on network anomaly detection
Nowadays, there is a huge and growing concern about security in information and
communication technology among the scientific community because any attack or anomaly …
communication technology among the scientific community because any attack or anomaly …
Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms
Purpose Nowadays, more interest is found among the researchers in MANETs in practical
and theoretical areas and their performance under various environments. WSNs have …
and theoretical areas and their performance under various environments. WSNs have …
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
Widespread adoption of cloud computing has increased the attractiveness of such services
to cybercriminals. Distributed denial of service (DDoS) attacks targeting the cloud's …
to cybercriminals. Distributed denial of service (DDoS) attacks targeting the cloud's …
Evaluation of machine learning classifiers for mobile malware detection
Mobile devices have become a significant part of people's lives, leading to an increasing
number of users involved with such technology. The rising number of users invites hackers …
number of users involved with such technology. The rising number of users invites hackers …
A survey of big data management: Taxonomy and state-of-the-art
The rapid growth of emerging applications and the evolution of cloud computing
technologies have significantly enhanced the capability to generate vast amounts of data …
technologies have significantly enhanced the capability to generate vast amounts of data …
Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks
Cloud computing services provide a wide range of resource pool for maintaining a large
amount of data. Cloud services are commonly used as the private or public data forum …
amount of data. Cloud services are commonly used as the private or public data forum …
RPL attack detection and prevention in the Internet of Things networks using a GRU based deep learning
Cyberattacks targeting Internet of Things (IoT), have increased significantly, over the past
decade, with the spread of internet-connected smart devices and applications. Routing …
decade, with the spread of internet-connected smart devices and applications. Routing …
Denial of service defence for resource availability in wireless sensor networks
Wireless sensor networks (WSN) over the years have become one of the most promising
networking solutions with exciting new applications for the near future. Its deployment has …
networking solutions with exciting new applications for the near future. Its deployment has …
Compression header analyzer intrusion detection system (CHA-IDS) for 6LoWPAN communication protocol
Prior 6LoWPAN intrusion detection system (IDS) utilized several features to detect various
malicious activities. However, these IDS methods only detect specific attack but fails when …
malicious activities. However, these IDS methods only detect specific attack but fails when …
Smart Spider Monkey Optimization (SSMO) for Energy‐Based Cluster‐Head Selection Adapted for Biomedical Engineering Applications
Using energy efficiency to increase the life and sustainability of wireless sensor networks
(WSNs) for biomedical applications is still a challenge. Clustering has boosted energy …
(WSNs) for biomedical applications is still a challenge. Clustering has boosted energy …