A comprehensive systematic literature review on intrusion detection systems
Effectively detecting intrusions in the computer networks still remains problematic. This is
because cyber attackers are changing packet contents to disguise the intrusion detection …
because cyber attackers are changing packet contents to disguise the intrusion detection …
iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System
Introduction: The growth of ubiquitous networked devices and the proliferation of
geographically dispersed 'Internet of Thing'devices have exponentially increased network …
geographically dispersed 'Internet of Thing'devices have exponentially increased network …
Global intrusion detection environments and platform for anomaly-based intrusion detection systems
The defense is the critical element of the computer system, and the most challenging issues
are detecting the intrusion attacks. The IDS is the most critical cyber-security factor which …
are detecting the intrusion attacks. The IDS is the most critical cyber-security factor which …
Road: Robotics-assisted onsite data collection and deep learning enabled robotic vision system for identification of cracks on diverse surfaces
Crack detection on roads is essential nowadays because it has a significant impact on
ensuring the safety and reliability of road infrastructure. Thus, it is necessary to create more …
ensuring the safety and reliability of road infrastructure. Thus, it is necessary to create more …
Introspecting intrusion detection systems in dealing with security concerns in cloud environment
Cloud computing is one of the most quickly develo** computing advances in today's IT
environment. The cloud infrastructure links data and software from different geographically …
environment. The cloud infrastructure links data and software from different geographically …
Apprehending mirai botnet philosophy and smart learning models for IoT-DDoS detection
This paper aims at imparting acquaintance to the researchers an insight into the IoT
metamorphosis from a security point of view. This paper presents a state-of-the-art …
metamorphosis from a security point of view. This paper presents a state-of-the-art …
A meta-analysis of role of network intrusion detection systems in confronting network attacks
Traffic on the network is increasing immensely. Unprecedented development and close
integration of devices for the Internet of Things (IoT) have contributed to an enormous …
integration of devices for the Internet of Things (IoT) have contributed to an enormous …
Feature selection algorithm characterization for NIDS using machine and deep learning
Data dimensionality is increasing at a rapid rate, posing difficulties for traditional mining and
learning algorithms. Commercial NIDS models make use of statistical measures to analyze …
learning algorithms. Commercial NIDS models make use of statistical measures to analyze …
Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems
Introduction The convergence of the Internet of Anything (IoX), software-defined
communication layer, and sophisticated cloud platform has steered the dawn of the fourth …
communication layer, and sophisticated cloud platform has steered the dawn of the fourth …
AIDAAS: Incident handling and remediation anomaly-based IDaaS for cloud service providers
In recent years cloud computing has become an integral part of the IT sector. Malicious
individuals have expanded their capacity to breach Cloud security. It is scattered across …
individuals have expanded their capacity to breach Cloud security. It is scattered across …