Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …
attacks to exploit the information occurs. A technology to store and maintain user's …
Privacy laws and privacy by design schemes for the internet of things: A developer's perspective
Internet of Things applications have the potential to derive sensitive information about
individuals. Therefore, developers must exercise due diligence to make sure that data are …
individuals. Therefore, developers must exercise due diligence to make sure that data are …
Image encryption based on a single‐round dictionary and chaotic sequences in cloud computing
With the increasing popularity of multimedia technology and the prevalence of various smart
electronic devices, severe security problems have recently arisen in information and …
electronic devices, severe security problems have recently arisen in information and …
COMITMENT: A fog computing trust management approach
As an extension of cloud computing, fog computing is considered to be relatively more
secure than cloud computing due to data being transiently maintained and analyzed on …
secure than cloud computing due to data being transiently maintained and analyzed on …
Design and analysis of multimodel-based anomaly intrusion detection systems in industrial process automation
Industrial process automation is undergoing an increased use of information communication
technologies due to high flexibility interoperability and easy administration. But it also …
technologies due to high flexibility interoperability and easy administration. But it also …
Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks
S Subramani, M Selvi - Optik, 2023 - Elsevier
Abstract Internet of Things (IoT) utilization is increasing every day in both industry and other
applications recently. However, the IoT communication is under security threats from …
applications recently. However, the IoT communication is under security threats from …
Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking
Cloud computing is facing a multidimensional and rapidly evolving threat landscape, making
intrusion detection more challenging. This paper introduces a new hypervisor-based cloud …
intrusion detection more challenging. This paper introduces a new hypervisor-based cloud …
Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch
Abstract Distributed Denial of Service (DDoS) flooding attacks are one of the typical attacks
over the Internet. They aim to prevent normal users from accessing specific network …
over the Internet. They aim to prevent normal users from accessing specific network …
Cyphertext (CT) analytic engine and method for network anomaly detection
JN Ptasinski, R Casey, D Wasserman… - US Patent 9,191,400, 2015 - Google Patents
US9191400B1 - Cyphertext (CT) analytic engine and method for network anomaly detection
- Google Patents US9191400B1 - Cyphertext (CT) analytic engine and method for network …
- Google Patents US9191400B1 - Cyphertext (CT) analytic engine and method for network …
Designing privacy-aware internet of things applications
Abstract Internet of Things (IoT) applications typically collect and analyse personal data that
can be used to derive sensitive information about individuals. However, thus far, privacy …
can be used to derive sensitive information about individuals. However, thus far, privacy …