[PDF][PDF] A meta-analytic review of intelligent intrusion detection techniques in cloud computing environment
MG Raj, SK Pani - International Journal of Advanced …, 2021 - pdfs.semanticscholar.org
Security and data privacy continue to be major considerations in the selection and study of
cloud computing. Organizations are migrating more critical operations to the cloud, resulting …
cloud computing. Organizations are migrating more critical operations to the cloud, resulting …
An intrusion detection method for industrial control system based on machine learning
Y Cao, L Zhang, X Zhao, K **, Z Chen - Information, 2022 - mdpi.com
The integration of communication networks and the internet of industrial control in Industrial
Control System (ICS) increases their vulnerability to cyber attacks, causing devastating …
Control System (ICS) increases their vulnerability to cyber attacks, causing devastating …
Heuristic intrusion detection based on traffic flow statistical analysis
W Szczepanik, M Niemiec - Energies, 2022 - mdpi.com
As telecommunications are becoming increasingly important for modern systems, ensuring
secure data transmission is getting more and more critical. Specialised numerous devices …
secure data transmission is getting more and more critical. Specialised numerous devices …
A Novel Internet of Things (IoT) Web Attack Detection Architecture Based on the Combination of Symbolism and Connectionism AI
The rapid advancement and wide application of the Internet of Things technology (IoT) have
brought unprecedented convenience to people's production and life. A great number of …
brought unprecedented convenience to people's production and life. A great number of …
[PDF][PDF] Heuristic-based intrusion detection functionality in a snort environment
B Gdowski, R Kościej, M Niemiec - Information & Security, 2021 - connections-qj.org
This article provides an introduction to intrusion detection systems, focusing on extending
the Snort environment's functionalities by adding a new heuristic detection algorithm. The …
the Snort environment's functionalities by adding a new heuristic detection algorithm. The …
Hybrid intelligent technique for intrusion detection in cyber physical systems with improved feature set
M Sagar, C Vanmathi - Journal of Intelligent & Fuzzy Systems, 2024 - content.iospress.com
Abstract Machine learning techniques commonly used for intrusion detection systems (IDSs
face challenges due to inappropriate features and class imbalance. A novel IDS comprises …
face challenges due to inappropriate features and class imbalance. A novel IDS comprises …
Exploring IoT Device Vulnerabilities Through Malware Analysis and Reverse Engineering
R Tamilkodi, VB Sankar, S Madhu… - … Conference on Data …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) has significantly expanded the attack surface for cyber threats,
presenting new cybersecurity challenges. This project aims to analyze IoT device …
presenting new cybersecurity challenges. This project aims to analyze IoT device …
[PDF][PDF] Deployment of Snort Intrusion Detection System on Usmanu Danfodiyo University Network
MD Sifawa, BA Buhari, L Sulaiman - International Journal of …, 2022 - academia.edu
-------------------------------------------------------------------ABSTRACT-------------------------------------------
--------------------The increasingly frequent attacks on Internet visible systems are attempts to …
--------------------The increasingly frequent attacks on Internet visible systems are attempts to …
Host Intrusion Detection System Using Novel Predefined Signature Patterns by Comparing Random Forest over Decision Tree Algorithm
P Sai Chowdary, D Vinod - Advances in Parallel Computing …, 2022 - ebooks.iospress.nl
The objective of the work is to identify anomaly intrusion detection in a user network
environment using information accessing and retrieval from homogeneous network …
environment using information accessing and retrieval from homogeneous network …
[ΑΝΑΦΟΡΑ][C] Heurystyczna detekcja ataków sieciowych z wykorzystaniem środowiska Snort 3
S Wnęk, R Kościej, M Niemiec - Przegląd Telekomunikacyjny+ …, 2022 - yadda.icm.edu.pl
Artykuł przedstawia algorytm detekcji ataków sieciowych, bazujący na podejściu
heurystycznym. Szczegółowo opisany został sposób w jaki opracowane rozwiązanie …
heurystycznym. Szczegółowo opisany został sposób w jaki opracowane rozwiązanie …