Fusion of linear and non-linear dimensionality reduction techniques for feature reduction in LSTM-based Intrusion Detection System
A Thakkar, N Kikani, R Geddam - Applied Soft Computing, 2024 - Elsevier
Securing networks is becoming increasingly crucial due to the widespread use of
information technology. Intrusion Detection System (IDS) plays a crucial role in network …
information technology. Intrusion Detection System (IDS) plays a crucial role in network …
Pythagorean fuzzy sets-based vikor and topsis-based multi-criteria decision-making model for mitigating resource deletion attacks in wsns
Abstract In Wireless Sensor Networks (WSNs), resource depletion attacks that focusses on
the compromization of routing protocol layer is identified to facilitate a major influence over …
the compromization of routing protocol layer is identified to facilitate a major influence over …
Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge
Nowadays, phishing attacks have grown rapidly, and there is an urgent need to introduce a
suitable detection method that has the ability to detect different types of phishing attacks …
suitable detection method that has the ability to detect different types of phishing attacks …
DT-ARO: decision tree-based artificial rabbits optimization to mitigate IoT botnet exploitation
The rapid growth of Artificial Intelligence (AI) algorithms has created the opportunity to solve
complex problems such as Internet of Things (IoT) botnet attacks. The severity of IoT botnet …
complex problems such as Internet of Things (IoT) botnet attacks. The severity of IoT botnet …
[PDF][PDF] Multi-step attack detection in industrial networks using a hybrid deep learning architecture
In recent years, the industrial network has seen a number of high-impact attacks. To counter
these threats, several security systems have been implemented to detect attacks on …
these threats, several security systems have been implemented to detect attacks on …
[HTML][HTML] An accurate detection approach for IoT botnet attacks using interpolation reasoning method
Nowadays, the rapid growth of technology delivers many new concepts and notations that
aim to increase the efficiency and comfort of human life. One of these techniques is the …
aim to increase the efficiency and comfort of human life. One of these techniques is the …
[HTML][HTML] An optimized ensemble model with advanced feature selection for network intrusion detection
In today's digital era, advancements in technology have led to unparalleled levels of
connectivity, but have also brought forth a new wave of cyber threats. Network Intrusion …
connectivity, but have also brought forth a new wave of cyber threats. Network Intrusion …
Attention-based RNN architecture for detecting multi-step cyber-attack using PSO metaheuristic
In recent years, the intensive usage of electronic devices called for a greater threat to
preventing a massive volume of information generated by billions of users every second …
preventing a massive volume of information generated by billions of users every second …
An early detection model for kerberoasting attacks and dataset labeling
The wild nature of humans has become civilized and the weapons they use to attack each
other are now digitized. Security over the Internet usually takes a defensive shape, aiming to …
other are now digitized. Security over the Internet usually takes a defensive shape, aiming to …
[PDF][PDF] New strategies for improving network security against cyber attack based on intelligent algorithms
MZ Abdullah, AK Jassim, FN Hummadi… - Journal of Engineering …, 2024 - iasj.net
Gradually, since the number of linked computer systems that use networks linked to the
Internet is raised the information that is delivered through those systems becomes more …
Internet is raised the information that is delivered through those systems becomes more …