Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions
The field of Explainable Artificial Intelligence (XAI) has garnered considerable research
attention in recent years, aiming to provide interpretability and confidence to the inner …
attention in recent years, aiming to provide interpretability and confidence to the inner …
A holistic review of network anomaly detection systems: A comprehensive survey
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in
most network defense systems for detecting and preventing potential threats. The paper …
most network defense systems for detecting and preventing potential threats. The paper …
Protocol-based deep intrusion detection for dos and ddos attacks using unsw-nb15 and bot-iot data-sets
Since its inception, the Internet of Things (IoT) has witnessed mushroom growth as a
breakthrough technology. In a nutshell, IoT is the integration of devices and data such that …
breakthrough technology. In a nutshell, IoT is the integration of devices and data such that …
An intrusion detection and prevention system in cloud computing: A systematic review
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …
Voting extreme learning machine based distributed denial of service attack detection in cloud computing
GS Kushwah, V Ranga - Journal of Information Security and Applications, 2020 - Elsevier
Distributed denial of service attack is one of the most dangerous attacks in cloud computing.
This attack makes the cloud services inaccessible to the end-users by exhausting resources …
This attack makes the cloud services inaccessible to the end-users by exhausting resources …
A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing
The rapid growth of new emerging computing technologies has encouraged many
organizations to outsource their data and computational requirements. Such services are …
organizations to outsource their data and computational requirements. Such services are …
Toward zero trust security in 5g open architecture network slices
HA Kholidy, A Karam, J Sidoran… - MILCOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Develo** trust in 5G network slicing is an important issue since as mobile networks evolve
the number of internal components, network functions, and the use of virtualized elements …
the number of internal components, network functions, and the use of virtualized elements …
Intrusion response systems: Foundations, design, and challenges
In the last few decades, various network attacks have emerged. This phenomenon requires
serious consideration to address its extensive consequences. To overcome the effects of …
serious consideration to address its extensive consequences. To overcome the effects of …
A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …
intrusion detection and blockchain applications against cyber attacks. This work aims to …
5g network slicing: Analysis of multiple machine learning classifiers
M Malkoc, HA Kholidy - arxiv preprint arxiv:2310.01747, 2023 - arxiv.org
The division of one physical 5G communications infrastructure into several virtual network
slices with distinct characteristics such as bandwidth, latency, reliability, security, and service …
slices with distinct characteristics such as bandwidth, latency, reliability, security, and service …