Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …

Privacy laws and privacy by design schemes for the internet of things: A developer's perspective

A Aljeraisy, M Barati, O Rana, C Perera - ACM Computing Surveys (Csur …, 2021 - dl.acm.org
Internet of Things applications have the potential to derive sensitive information about
individuals. Therefore, developers must exercise due diligence to make sure that data are …

Image encryption based on a single‐round dictionary and chaotic sequences in cloud computing

Y Li, H Yu, B Song, J Chen - Concurrency and Computation …, 2021 - Wiley Online Library
With the increasing popularity of multimedia technology and the prevalence of various smart
electronic devices, severe security problems have recently arisen in information and …

COMITMENT: A fog computing trust management approach

M Al-Khafajiy, T Baker, M Asim, Z Guo, R Ranjan… - Journal of Parallel and …, 2020 - Elsevier
As an extension of cloud computing, fog computing is considered to be relatively more
secure than cloud computing due to data being transiently maintained and analyzed on …

Design and analysis of multimodel-based anomaly intrusion detection systems in industrial process automation

C Zhou, S Huang, N **ong, SH Yang… - … on Systems, Man …, 2015 - ieeexplore.ieee.org
Industrial process automation is undergoing an increased use of information communication
technologies due to high flexibility interoperability and easy administration. But it also …

Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks

S Subramani, M Selvi - Optik, 2023 - Elsevier
Abstract Internet of Things (IoT) utilization is increasing every day in both industry and other
applications recently. However, the IoT communication is under security threats from …

Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking

A Aldribi, I Traoré, B Moa, O Nwamuo - Computers & Security, 2020 - Elsevier
Cloud computing is facing a multidimensional and rapidly evolving threat landscape, making
intrusion detection more challenging. This paper introduces a new hypervisor-based cloud …

Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch

X **g, Z Yan, X Jiang, W Pedrycz - Information Fusion, 2019 - Elsevier
Abstract Distributed Denial of Service (DDoS) flooding attacks are one of the typical attacks
over the Internet. They aim to prevent normal users from accessing specific network …

Cyphertext (CT) analytic engine and method for network anomaly detection

JN Ptasinski, R Casey, D Wasserman… - US Patent 9,191,400, 2015 - Google Patents
US9191400B1 - Cyphertext (CT) analytic engine and method for network anomaly detection
- Google Patents US9191400B1 - Cyphertext (CT) analytic engine and method for network …

Designing privacy-aware internet of things applications

C Perera, M Barhamgi, AK Bandara, M Ajmal… - Information …, 2020 - Elsevier
Abstract Internet of Things (IoT) applications typically collect and analyse personal data that
can be used to derive sensitive information about individuals. However, thus far, privacy …