A critical review of artificial intelligence based approaches in intrusion detection: A comprehensive analysis

S Muneer, U Farooq, A Athar… - Journal of …, 2024 - Wiley Online Library
Intrusion detection (ID) is critical in securing computer networks against various malicious
attacks. Recent advancements in machine learning (ML), deep learning (DL), federated …

[HTML][HTML] A survey of deep learning-based intrusion detection in automotive applications

B Lampe, W Meng - Expert Systems with Applications, 2023 - Elsevier
Modern automobiles depend on internal vehicle networks (IVNs) to control systems from the
anti-lock brakes to the transmission to the locks on the doors. Many IVNs, particularly the …

Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures

IA Kandhro, SM Alanazi, F Ali, A Kehar, K Fatima… - IEEE …, 2023 - ieeexplore.ieee.org
Computer viruses, malicious, and other hostile attacks can affect a computer network.
Intrusion detection is a key component of network security as an active defence technology …

Performance analysis of enterprise cloud computing: a review

HS Malallah, R Qashi, LM Abdulrahman… - Journal of Applied …, 2023 - jastt.org
Cloud computing has swiftly established itself as the norm in its field as a result of the
advantages described above. In an attempt to reduce the amount of time spent on …

RETRACTED ARTICLE: FSO-LSTM IDS: hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks

AS Alqahtani - The Journal of Supercomputing, 2022 - Springer
Abstract The Internet of Things (IoT) has achieved exponential growth worldwide. Although
the IoT is used by millions of users, these networks are handicapped by attacks such as …

[PDF][PDF] SQL injection attacks prevention system technology

FQ Kareem, SY Ameen, AA Salih… - Asian Journal of …, 2021 - researchgate.net
The vulnerabilities in most web applications enable hackers to gain access to confidential
and private information. Structured query injection poses a significant threat to web …

[PDF][PDF] A Responsible AI Development for Sustainable Enterprises: A Review of Integrating Ethical AI with IoT and Enterprise Systems

Z Abdulqader, DM Abdulqader… - Journal of Information …, 2024 - researchgate.net
In the midst of the rapid advancement of technology that is now taking place, the disciplines
of processing and algorithms have arisen as very important areas of research and practical …

[PDF][PDF] Secure data transfer over internet using image steganography

DM Abdullah, SY Ameen, N Omar… - Asian Journal of …, 2021 - researchgate.net
Whether it's for work or personal well-being, kee** secrets or private information has
become part of our everyday existence. Therefore, several researchers acquire an entire …

A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM.

NK Muthunambu, S Prabakaran… - Computers …, 2024 - search.ebscohost.com
The extensive utilization of the Internet in everyday life can be attributed to the substantial
accessibility of online services and the growing significance of the data transmitted via the …

Predicting football outcomes by using Poisson model: Applied to Spanish Primera División

GM Zebari, S Zeebaree, MM Sadeeq… - Journal of Applied Science …, 2021 - jastt.org
During the past decades, sport, in general, has become one of the most powerful
competitions and the most popular in the world. As well, everyone is waiting for the winner …