As-ids: Anomaly and signature based ids for the internet of things

Y Otoum, A Nayak - Journal of Network and Systems Management, 2021 - Springer
Abstract The Internet of Things (IoT) is a massively extensive environment that can manage
many diverse applications. Security is critical due to potential malicious threats and the …

[retracted] analysis of intrusion detection approaches for network traffic anomalies with comparative analysis on botnets (2008–2020)

S Ahmad, S Jha, A Alam, M Alharbi… - Security and …, 2022 - Wiley Online Library
Botnets are conglomerations of traded PCs (bots) that are remotely controlled by its
originator (botmaster) under a command‐and‐control (C&C) foundation. Botnets are the …

Machine learning techniques for anomaly detection in smart healthcare

M Kavitha, P Srinivas, PSL Kalyampudi… - 2021 Third …, 2021 - ieeexplore.ieee.org
Anomaly detection is a vital research problem among the different domains intrusion
detection, fraud detection, device health monitoring, fault data detection, event detection in …

[HTML][HTML] Numerical feature selection and hyperbolic tangent feature scaling in machine learning-based detection of anomalies in the computer network behavior

D Protić, M Stanković, R Prodanović, I Vulić… - Electronics, 2023 - mdpi.com
Anomaly-based intrusion detection systems identify the computer network behavior which
deviates from the statistical model of typical network behavior. Binary classifiers based on …

Performance Analysis of Anomaly-Based Network Intrusion Detection Using Feature Selection and Machine Learning Techniques

S Seniaray, R **dal - Wireless Personal Communications, 2024 - Springer
Data and information, being a critical part of the Internet, are vital to network security.
Intrusion Detection System (IDS) is required to preserve confidentiality, data integrity, and …

Analysis of deep learning-based approaches for spam bots and cyberbullying detection in online social networks

AVS Kumar, NS Kumar, RK Devi… - AI-Centric Modeling …, 2024 - api.taylorfrancis.com
Networking is the swap** of data or views among people or professionals through various
social networking platforms. Online social networks (OSNs) play a major role in everyone's …

[PDF][PDF] FIFO & LIFO in green supply chain inventory model of hazardous substance components industry with storage using simulated annealing

AS Yadav, M Abid, S Bansal… - Advances in …, 2020 - research-publication.com
FIFO & LIFO, which stands for first in first out & last-in-first-out, is a method of inventory
valuation that assumes that the last items placed in inventory were sold for the first time …

[PDF][PDF] LIFO in green supply chain inventory model of auto-components industry with warehouses using differential evolution

AS Yadav, A Kumar, P Agarwal… - Advances in …, 2020 - research-publication.com
LIFO, which stands for last-in-first-out, is a method of inventory valuation that assumes that
the last items placed in inventory were sold for the first time during the accounting year. This …

Data mining technique based critical disease prediction in medical field

A Kumar, S Samee - Intelligent Systems and Computer …, 2020 - ebooks.iospress.nl
In the present days' deaths because of some critical disease has become a significant issue
in the medical field. Data mining is one of the significant territories of research that is famous …

Machine learning-based network intrusion detection system

S Seniaray, R **dal - … Technologies: Proceedings of Fourth ICCNCT 2021, 2022 - Springer
As the network is dramatically extended, security has become a significant issue. Various
attacks like DoS, R2L, U2R are significantly increasing to affect these networks. Thus …