[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva papers …, 2022 - ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

A Khraisat, A Alazab - Cybersecurity, 2021 - Springer
Abstract The Internet of Things (IoT) has been rapidly evolving towards making a greater
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …

A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions

A Thakkar, R Lohiya - Artificial Intelligence Review, 2022 - Springer
With the increase in the usage of the Internet, a large amount of information is exchanged
between different communicating devices. The data should be communicated securely …

Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset

AR Gad, AA Nashat, TM Barkat - IEEE Access, 2021 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) are a subsystem of the proposed intelligent
transportation system (ITS) that enables vehicles to communicate over the wireless …

Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection

H Zhang, JL Li, XM Liu, C Dong - Future Generation Computer Systems, 2021 - Elsevier
A robust network intrusion detection system (NIDS) plays an important role in cyberspace
security for protecting confidential systems from potential threats. In real world network, there …

An optimized CNN-based intrusion detection system for reducing risks in smart farming

A El-Ghamry, A Darwish, AE Hassanien - Internet of Things, 2023 - Elsevier
Smart farming is a well-known and superior method of managing a farm, becoming more
prevalent in today's contemporary agricultural practices. Crops are monitored for their …

[HTML][HTML] Evolving techniques in cyber threat hunting: A systematic review

A Mahboubi, K Luong, H Aboutorab, HT Bui… - Journal of Network and …, 2024 - Elsevier
In the rapidly changing cybersecurity landscape, threat hunting has become a critical
proactive defense against sophisticated cyber threats. While traditional security measures …

Distributed Deep CNN‐LSTM Model for Intrusion Detection Method in IoT‐Based Vehicles

A Alferaidi, K Yadav, Y Alharbi… - Mathematical …, 2022 - Wiley Online Library
As 5G and other technologies are widely used in the Internet of Vehicles, intrusion detection
plays an increasingly important role as a vital detection tool for information security …

Adoption of cloud computing as innovation in the organization

L Golightly, V Chang, QA Xu, X Gao… - International Journal of …, 2022 - journals.sagepub.com
Over the years, there has been a heavy reliance on cloud computing as IT has innovated
through time. In recent times cloud computing has grown monumentally. Many organizations …

A modified grey wolf optimization algorithm for an intrusion detection system

A Alzaqebah, I Aljarah, O Al-Kadi, R Damaševičius - Mathematics, 2022 - mdpi.com
Cyber-attacks and unauthorized application usage have increased due to the extensive use
of Internet services and applications over computer networks, posing a threat to the service's …