Intrusion detection and prevention systems: an updated review

NA Azeez, TM Bada, S Misra, A Adewumi… - … Analytics and Innovation …, 2020 - Springer
Abstract The evolution of Information Technology (IT), cutting across several divides in our
daily endeavors allows us to interact with all forms of data at different OSI model layers from …

A novel support vector machine based intrusion detection system for mobile ad hoc networks

EA Shams, A Rizaner - Wireless Networks, 2018 - Springer
The performance of mobile ad hoc networks (MANETs) is significantly affected by the
malicious nodes. One of the most common attacks in MANETs is denial of service (DoS); a …

Secure distributed adaptive bin packing algorithm for cloud storage

I Mohiuddin, A Almogren, M Al Qurishi… - Future Generation …, 2019 - Elsevier
Cloud computing delivers highly scalable and flexible computing and storage resources on
pay-per-use policy. Cloud Computing's services for computation and storage are getting …

An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory.

AS Hanafi, YK Saheed… - International Journal of …, 2023 - search.ebscohost.com
Abstract A Mobile Ad-hoc Network (MANET) is a self-organizing collection of mobile devices
communicating in a distributed fashion across numerous hops. MANETs are an appealing …

An effective hybrid intrusion detection system for use in security monitoring in the virtual network layer of cloud computing technology

T Nathiya, G Suseendran - … and Innovation: Proceedings of ICDMAI 2018 …, 2019 - Springer
Security in the cloud computing environment is very important in the detection of intrusions
into the virtual network layer. Denial of service (DoS) and distributed denial of service …

Intrusion detection mechanism using fuzzy rule interpolation

M Almseidin, S Kovacs - arxiv preprint arxiv:1904.08790, 2019 - arxiv.org
Fuzzy Rule Interpolation (FRI) methods can serve deducible (interpolated) conclusions even
in case if some situations are not explicitly defined in a fuzzy rule based knowledge …

[PDF][PDF] An intellectual intrusion detection system model for attacks classification using RNN

RB Krishnan, NR Raajan - Int. J. Pharm. Technol, 2016 - academia.edu
Abstract Objectives: The maturation of Internet facilities and its usance directs to
possibleness for the incident of illegal intrusive actions over base environment. To avoid …

Intrusion detection system in ad hoc networks with artificial neural networks and algorithm K-means

DRC Canêdo, ARSR Romariz - IEEE Latin America …, 2019 - ieeexplore.ieee.org
There has been a great technological advance in the infrastructure of mobile technologies.
The increase in the use of wireless local area networks and the use of services from …

[PDF][PDF] Energy efficient intrusion detection system for ZigBee based wireless sensor networks.

J Govindasamy, S Punniakodi - International Journal of Intelligent …, 2017 - researchgate.net
Nowadays, ZigBee is one of the dominating standards for wireless sensor networks and
Internet of Things (IoT) networks. Even though, the ZigBee standard is formed with low per …

A network anomaly intrusion detection method based on ensemble learning for library e-learning platform

T Sun, K Yan, T Li, X Lu, O Dona - 2022 4th World Symposium …, 2022 - ieeexplore.ieee.org
E-learning is an important part of the library service and a direction of transformation for
libraries. How to ensure the security of e-learning platforms is a key point that cannot be …