Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model
The adoption of cloud computing has become increasingly widespread across various
domains. However, the inherent security vulnerabilities of cloud computing pose significant …
domains. However, the inherent security vulnerabilities of cloud computing pose significant …
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature
Recent technological advancements have significantly expanded both networks and data,
thereby introducing new forms of attacks that pose considerable challenges to intrusion …
thereby introducing new forms of attacks that pose considerable challenges to intrusion …
[HTML][HTML] Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security
Network security is essential to our daily communications and networks. Cybersecurity
researchers initiate the significance of emerging proficient network intrusion detection …
researchers initiate the significance of emerging proficient network intrusion detection …
A comprehensive survey on intrusion detection algorithms
Y Li, Z Li, M Li - Computers and Electrical Engineering, 2025 - Elsevier
Although there are many reviews on Intrusion Detection Systems (IDS), the basic parts of
Intrusion Detection Algorithms (IDA), such as imbalanced datasets, feature engineering, and …
Intrusion Detection Algorithms (IDA), such as imbalanced datasets, feature engineering, and …
Performance metrics of an intrusion detection system through Window-Based Deep Learning models
F Isiaka - Journal of Data Science and Intelligent Systems, 2024 - ojs.bonviewpress.com
Intrusion and prevention technologies perform reliably in harsh conditions by fortifying many
of the world's highest security sites with few defects in high performance. This paper aims to …
of the world's highest security sites with few defects in high performance. This paper aims to …
Extended Fuzzy Neutrosophic Classifier for Accurate Intrusion Detection and Classification.
M Elhoseny, M Abdel-salam… - International Journal of …, 2024 - search.ebscohost.com
Intrusion Detection is crucial in contemporary cybersecurity landscapes to proactively thwart
and identify possible threats. The risk of data breaches, malicious activities, and …
and identify possible threats. The risk of data breaches, malicious activities, and …
Machine learning based network intrusion detection optimization for cloud computing environments
Cloud computing is an emerging choice among businesses all over the world since it
provides flexible and world wide web computer capabilities as a customizable service …
provides flexible and world wide web computer capabilities as a customizable service …
Metaheuristic assisted hybrid deep classifiers for intrusion detection: a bigdata perspective
L Madhuridevi, NVS Sree Rathna Lakshmi - Wireless Networks, 2024 - Springer
The growth of social networks and cloud computing has resulted in the production of
enormous amounts of data, which poses significant challenges for intrusion detection …
enormous amounts of data, which poses significant challenges for intrusion detection …
Domain knowledge free cloud-IDS with lightweight embedding method
The expansion of the cloud computing market has provided a breakthrough in efficiently
storing and managing data for individuals and companies. As personal and corporate data …
storing and managing data for individuals and companies. As personal and corporate data …
Improving Performance of Intrusion Detection Using ALO Selected Features and GRU Network
K Sundaram, S Subramanian, Y Natarajan… - SN Computer …, 2023 - Springer
The expansion of the internet has not only opened up new possibilities for cooperation,
networking, and ingenuity, but also presented fresh security hazards and complexities. As …
networking, and ingenuity, but also presented fresh security hazards and complexities. As …