Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm
With the rapid expansion of Internet of Things (IoT) networks, the need for robust security
measures to detect and report potential threats is becoming more urgent. In this paper, we …
measures to detect and report potential threats is becoming more urgent. In this paper, we …
Online banking user authentication methods: a systematic literature review
Online banking has become increasingly popular in recent years, making it a target for
cyberattacks. Banks have implemented various user authentication methods to protect their …
cyberattacks. Banks have implemented various user authentication methods to protect their …
A novel deep learning-based intrusion detection system for IOT networks
A Awajan - Computers, 2023 - mdpi.com
The impressive growth rate of the Internet of Things (IoT) has drawn the attention of
cybercriminals more than ever. The growing number of cyber-attacks on IoT devices and …
cybercriminals more than ever. The growing number of cyber-attacks on IoT devices and …
Optimized machine learning-based intrusion detection system for fog and edge computing environment
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the
cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited …
cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited …
Enhancing intrusion detection systems for IoT and cloud environments using a growth optimizer algorithm and conventional neural networks
Intrusion detection systems (IDS) play a crucial role in securing networks and identifying
malicious activity. This is a critical problem in cyber security. In recent years, metaheuristic …
malicious activity. This is a critical problem in cyber security. In recent years, metaheuristic …
[HTML][HTML] Novel hybrid of AOA-BSA with double adaptive and random spare for global optimization and engineering problems
Abstract Archimedes Optimization Algorithm (AOA) is a new physics-based optimizer that
simulates Archimedes principles. AOA has been used in a variety of real-world applications …
simulates Archimedes principles. AOA has been used in a variety of real-world applications …
Novel memetic of beluga whale optimization with self-adaptive exploration–exploitation balance for global optimization and engineering problems
A population-based optimizer called beluga whale optimization (BWO) depicts behavioral
patterns of water aerobics, foraging, and diving whales. BWO runs effectively, nevertheless it …
patterns of water aerobics, foraging, and diving whales. BWO runs effectively, nevertheless it …
Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment
A Binbusayyis - Expert Systems with Applications, 2024 - Elsevier
Fog computing (FC) extends cloud technology by providing services, storage, and network
interaction between data centers and end devices. By putting storage and processing closer …
interaction between data centers and end devices. By putting storage and processing closer …
Improved discrete salp swarm algorithm using exploration and exploitation techniques for feature selection in intrusion detection systems
The salp swarm algorithm (SSA) is a well-known optimization algorithm that is increasingly
being utilized to solve many sorts of optimization problems. However, SSA may converge to …
being utilized to solve many sorts of optimization problems. However, SSA may converge to …
Intrusion detection in Internet of things using improved binary golden jackal optimization algorithm and LSTM
AV Hanafi, A Ghaffari, H Rezaei, A Valipour… - Cluster Computing, 2024 - Springer
Internet of things (IoT) technology has gained a reputation in recent years due to its ease of
use and adaptability. Due to the amount of sensitive and significant data exchanged over the …
use and adaptability. Due to the amount of sensitive and significant data exchanged over the …