Comparative research on network intrusion detection methods based on machine learning
C Zhang, D Jia, L Wang, W Wang, F Liu, A Yang - Computers & Security, 2022 - Elsevier
Network intrusion detection system is an essential part of network security research. It
detects intrusion behaviors through active defense technology and takes emergency …
detects intrusion behaviors through active defense technology and takes emergency …
A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
Intelligent and behavioral-based detection of malware in IoT spectrum sensors
Abstract The number of Cyber-Physical Systems (CPS) available in industrial environments
is growing mainly due to the evolution of the Internet-of-Things (IoT) paradigm. In such a …
is growing mainly due to the evolution of the Internet-of-Things (IoT) paradigm. In such a …
Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection
V Prabhakaran, A Kulandasamy - Neural Computing and Applications, 2021 - Springer
Cloud computing helps users to store and retrieve their data in the cloud online on an as-per-
pay basis anytime, anywhere in the world. As a consequence, the security of data stored in …
pay basis anytime, anywhere in the world. As a consequence, the security of data stored in …
[PDF][PDF] Survey on intrusion detection system types
Intrusion detection system (IDS) is one of amongst the most essential consideration of cyber-
security that can discover intrusion before and/or after attack occur. An Intrusion detection …
security that can discover intrusion before and/or after attack occur. An Intrusion detection …
A cloud-assisted reliable trust computing scheme for data collection in internet of things
W Mo, W Liu, G Huang, NN **ong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Large number of Internet of Things (IoT) applications with intelligent sensing devices (ISDs)
are combined with cloud computing to collect and process data more efficiently. However …
are combined with cloud computing to collect and process data more efficiently. However …
AERF: Adaptive ensemble random fuzzy algorithm for anomaly detection in cloud computing
The abnormality of system behavior is inevitable in cloud computing because of its
complexity and scale. How to perform anomaly detection on the system's operating data to …
complexity and scale. How to perform anomaly detection on the system's operating data to …
A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural …
SS Sathiyadhas… - International Journal of …, 2022 - Wiley Online Library
In cloud computing, the resources and memory are dynamically allocated to the user based
on their needs. Security is considered as a major issue in cloud as the use of cloud is …
on their needs. Security is considered as a major issue in cloud as the use of cloud is …
Enhanced chimp optimization-based feature selection with fuzzy logic-based intrusion detection system in cloud environment
Cloud computing (CC) refers to an Internet-based computing technology in which shared
resources, such as storage, software, information, and platform, are offered to users on …
resources, such as storage, software, information, and platform, are offered to users on …
KVMInspector: KVM Based introspection approach to detect malware in cloud environment
Cloud security is of paramount importance in this new era of computing. There are various
security challenges in which researchers are still working on. Malware detection is one such …
security challenges in which researchers are still working on. Malware detection is one such …