Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system

WL Al-Yaseen, AK Idrees, FH Almasoudy - Pattern Recognition, 2022 - Elsevier
The intrusion detection system (IDS) has gained a rapid increase of interest due to its widely
recognized potential in various security fields, however, it suffers from several challenges …

Enhancing smart home security: anomaly detection and face recognition in smart home IoT devices using logit-boosted CNN models

A Rahim, Y Zhong, T Ahmad, S Ahmad, P Pławiak… - Sensors, 2023 - mdpi.com
Internet of Things (IoT) devices for the home have made a lot of people's lives better, but
their popularity has also raised privacy and safety concerns. This study explores the …

Public cloud networks oriented deep neural networks for effective intrusion detection in online music education

J Zhang, JD Peter, A Shankar, W Viriyasitavat - Computers and Electrical …, 2024 - Elsevier
The rapid growth of online music education has led to increased security risks from cyber
intrusions. This paper proposes public cloud networks oriented deep neural networks for …

Cybersafe Capabilities and Utilities for Smart Cities

K Kalinaki, NN Thilakarathne, HR Mubarak… - Cybersecurity for Smart …, 2023 - Springer
From the beginning of the 21st century, the entire world suffers from two critical problems:
the growth of the world population and the improvement of life expectancy of people owing …

[HTML][HTML] Smart home anomaly-based IDS: Architecture proposal and case study

A Lara, V Mayor, R Estepa, A Estepa, JE Díaz-Verdejo - Internet of Things, 2023 - Elsevier
The complexity and diversity of the technologies involved in the Internet of Things (IoT)
challenge the generalization of security solutions based on anomaly detection, which should …

Intelligent one-class classifiers for the development of an intrusion detection system: the mqtt case study

E Jove, J Aveleira-Mata, H Alaiz-Moretón… - Electronics, 2022 - mdpi.com
The ever-increasing number of smart devices connected to the internet poses an
unprecedented security challenge. This article presents the implementation of an Intrusion …

Minimizing latency for multi-dnn inference on resource-limited cpu-only edge devices

T Wang, T Shi, X Liu, J Wang, B Liu… - IEEE INFOCOM 2024 …, 2024 - ieeexplore.ieee.org
Despite considerable advancements in specialized hardware, the majority of IoT edge
devices still rely on CPUs. The burgeoning number of IoT users amplifies the challenges …

Flow and unified information-based DDoS attack detection system for multi-topology IoT networks

MF Saiyed, I Al-Anbagi - Internet of Things, 2023 - Elsevier
Abstract Internet of Things (IoT) networks are vulnerable to Distributed Denial of Service
(DDoS) attacks, which can degrade their Quality of Service (QoS). In general, DDoS attacks …

Privacy in smart speakers: A systematic literature review

G Maccario, M Naldi - Security and Privacy, 2023 - Wiley Online Library
Parallel to the increasing use of smart speakers (aka virtual assistants), privacy concerns
emerge. In this article, we provide a systematic review of the literature on privacy issues in …

A comparative analysis of Snort 3 and Suricata

AAE Boukebous, MI Fettache… - 2023 IEEE IAS …, 2023 - ieeexplore.ieee.org
The threat of intrusion has become a reality in modern network infrastructures, especially
with the increased usage of IoT devices, cloud computing and wireless telecommunications …