[HTML][HTML] A survey on intrusion detection systems for fog and cloud computing

V Chang, L Golightly, P Modesti, QA Xu, LMT Doan… - Future Internet, 2022 - mdpi.com
The rapid advancement of internet technologies has dramatically increased the number of
connected devices. This has created a huge attack surface that requires the deployment of …

Landscape of automated log analysis: A systematic literature review and map** study

Ł Korzeniowski, K Goczyła - IEEE Access, 2022 - ieeexplore.ieee.org
Logging is a common practice in software engineering to provide insights into working
systems. The main uses of log files have always been failure identification and root cause …

[HTML][HTML] Revolutionizing SIEM security: An innovative correlation engine design for multi-layered attack detection

M Sheeraz, MH Durad, MA Paracha, SM Mohsin… - Sensors, 2024 - mdpi.com
Advances in connectivity, communication, computation, and algorithms are driving a
revolution that will bring economic and social benefits through smart technologies of the …

A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications

Y Kumar, V Kumar - Wireless Personal Communications, 2023 - Springer
The significance of wireless networks is expanding very rapidly, and their increasing
pervasiveness makes them a vital component of the activities involved in living in the …

[HTML][HTML] A comprehensive survey of Federated Intrusion Detection Systems: techniques, challenges and solutions

I Makris, A Karampasi, P Radoglou-Grammatikis… - Computer Science …, 2025 - Elsevier
Cyberattacks have increased radically over the last years, while the exploitation of Artificial
Intelligence (AI) leads to the implementation of even smarter attacks which subsequently …

Cyber-physical systems: security threats and countermeasures

M Hammoudeh, G Epiphaniou, P Pinto - Journal of Sensor and Actuator …, 2023 - mdpi.com
The recent proliferation of sensors and actuators, which is related to the Internet of Things
(IoT), provide smart living to the general public in many data-critical areas, from homes and …

[HTML][HTML] A vote-based architecture to generate classified datasets and improve performance of intrusion detection systems based on supervised learning

D Teixeira, S Malta, P Pinto - Future Internet, 2022 - mdpi.com
An intrusion detection system (IDS) is an important tool to prevent potential threats to
systems and data. Anomaly-based IDSs may deploy machine learning algorithms to classify …

A tool for assisting in the forensic investigation of cyber-security incidents

K Touloumis, A Michalitsi-Psarrou… - … Conference on Big …, 2022 - ieeexplore.ieee.org
The exponential growth of networking capabilities including the Internet of Things (IoT), has
led to an outburst of cyberattacks. Many well-documented cyber-attacks have targeted …

[PDF][PDF] Securing network using raspberry Pi by implementing VPN, Pi-hole, and IPS (VPiSec)

AM Taib, MFH Ishak, NK Kamarudin - International Journal, 2020 - academia.edu
Every device on earth these days is associated with the Internet which brings humans an
advancement of communication. Nonetheless, this technology discloses the user to the …

Incident handling for healthcare organizations and supply-chains

E Lakka, G Hatzivasilis, S Karagiannis… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Healthcare ecosystems form a critical type of infrastructures that provide valuable services in
today societies. However, the underlying sensitive information is also of interest of malicious …