Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system
WL Al-Yaseen, AK Idrees, FH Almasoudy - Pattern Recognition, 2022 - Elsevier
The intrusion detection system (IDS) has gained a rapid increase of interest due to its widely
recognized potential in various security fields, however, it suffers from several challenges …
recognized potential in various security fields, however, it suffers from several challenges …
Enhancing smart home security: anomaly detection and face recognition in smart home IoT devices using logit-boosted CNN models
Internet of Things (IoT) devices for the home have made a lot of people's lives better, but
their popularity has also raised privacy and safety concerns. This study explores the …
their popularity has also raised privacy and safety concerns. This study explores the …
Public cloud networks oriented deep neural networks for effective intrusion detection in online music education
J Zhang, JD Peter, A Shankar, W Viriyasitavat - Computers and Electrical …, 2024 - Elsevier
The rapid growth of online music education has led to increased security risks from cyber
intrusions. This paper proposes public cloud networks oriented deep neural networks for …
intrusions. This paper proposes public cloud networks oriented deep neural networks for …
Cybersafe Capabilities and Utilities for Smart Cities
From the beginning of the 21st century, the entire world suffers from two critical problems:
the growth of the world population and the improvement of life expectancy of people owing …
the growth of the world population and the improvement of life expectancy of people owing …
[HTML][HTML] Smart home anomaly-based IDS: Architecture proposal and case study
The complexity and diversity of the technologies involved in the Internet of Things (IoT)
challenge the generalization of security solutions based on anomaly detection, which should …
challenge the generalization of security solutions based on anomaly detection, which should …
Intelligent one-class classifiers for the development of an intrusion detection system: the mqtt case study
The ever-increasing number of smart devices connected to the internet poses an
unprecedented security challenge. This article presents the implementation of an Intrusion …
unprecedented security challenge. This article presents the implementation of an Intrusion …
Minimizing latency for multi-dnn inference on resource-limited cpu-only edge devices
Despite considerable advancements in specialized hardware, the majority of IoT edge
devices still rely on CPUs. The burgeoning number of IoT users amplifies the challenges …
devices still rely on CPUs. The burgeoning number of IoT users amplifies the challenges …
Flow and unified information-based DDoS attack detection system for multi-topology IoT networks
MF Saiyed, I Al-Anbagi - Internet of Things, 2023 - Elsevier
Abstract Internet of Things (IoT) networks are vulnerable to Distributed Denial of Service
(DDoS) attacks, which can degrade their Quality of Service (QoS). In general, DDoS attacks …
(DDoS) attacks, which can degrade their Quality of Service (QoS). In general, DDoS attacks …
Privacy in smart speakers: A systematic literature review
G Maccario, M Naldi - Security and Privacy, 2023 - Wiley Online Library
Parallel to the increasing use of smart speakers (aka virtual assistants), privacy concerns
emerge. In this article, we provide a systematic review of the literature on privacy issues in …
emerge. In this article, we provide a systematic review of the literature on privacy issues in …
A comparative analysis of Snort 3 and Suricata
AAE Boukebous, MI Fettache… - 2023 IEEE IAS …, 2023 - ieeexplore.ieee.org
The threat of intrusion has become a reality in modern network infrastructures, especially
with the increased usage of IoT devices, cloud computing and wireless telecommunications …
with the increased usage of IoT devices, cloud computing and wireless telecommunications …