Zero-day attack detection: a systematic literature review

R Ahmad, I Alsmadi, W Alhamdani… - Artificial Intelligence …, 2023 - Springer
With the continuous increase in cyberattacks over the past few decades, the quest to
develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …

Intrusion detection and prevention in fog based IoT environments: A systematic literature review

CA de Souza, CB Westphall, RB Machado, L Loffi… - Computer Networks, 2022 - Elsevier
Abstract Currently, the Internet of Things is spreading in all areas that apply computing
resources. An important ally of the IoT is fog computing. It extends cloud computing and …

A comprehensive deep learning benchmark for IoT IDS

R Ahmad, I Alsmadi, W Alhamdani, L Tawalbeh - Computers & Security, 2022 - Elsevier
The significance of an intrusion detection system (IDS) in networks security cannot be
overstated in detecting and responding to malicious attacks. Failure to detect large-scale …

The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective

B Zolfaghari, A Yazdinejad, A Dehghantanha… - arxiv preprint arxiv …, 2022 - arxiv.org
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …

[HTML][HTML] Cyberattack and fraud detection using ensemble stacking

R Soleymanzadeh, M Aljasim, MW Qadeer, R Kashef - AI, 2022 - mdpi.com
Smart devices are used in the era of the Internet of Things (IoT) to provide efficient and
reliable access to services. IoT technology can recognize comprehensive information …

Comprehensive study of moving from grid and cloud computing through fog and edge computing towards dew computing

ZS Ageed, SRM Zeebaree… - … 4th International Iraqi …, 2021 - ieeexplore.ieee.org
Dew Computing (DC) is a comparatively modern field with a wide range of applications. By
examining how technological advances such as fog, edge and Dew computing, and …

Towards building data analytics benchmarks for IoT intrusion detection

R Ahmad, I Alsmadi, W Alhamdani, L Tawalbeh - Cluster Computing, 2022 - Springer
Data analytics projects span all types of domains and applications. Researchers publish
results using certain datasets and classification models. They present results with a …

[PDF][PDF] Enhanced Gorilla Troops Optimizer with Deep Learning Enabled Cybersecurity Threat Detection.

FS Alrayes, N Alotaibi, JS Alzahrani… - Comput. Syst. Sci …, 2023 - academia.edu
The Internet of Things (IoT) is a type of network which enables objects connected by utilizing
communication protocols. Connected objects are in all forms (ie, smart fridges, watches, and …

Enhancing cloud security: A study on ensemble learning‐based intrusion detection systems

M Al‐Sharif, A Bushnag - IET Communications, 2024 - Wiley Online Library
Cloud computing has become an essential technology for people and enterprises due to the
simplicity and rapid availability of services on the internet. These services are usually …

[HTML][HTML] Internet of things aware secure dew computing architecture for distributed hotspot network: A conceptual study

PP Ray, K Skala - Applied Sciences, 2022 - mdpi.com
Building a widely distributed hotspot network is a very tedious task due to its complexity.
Providing security, fully distributed network services, and a cost-conscious impact are the …