A survey on data-driven network intrusion detection
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …
classes compared to normal traffic. Many datasets are collected in simulated environments …
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
Adversarial attacks against network intrusion detection in IoT systems
Deep learning (DL) has gained popularity in network intrusion detection, due to its strong
capability of recognizing subtle differences between normal and malicious network activities …
capability of recognizing subtle differences between normal and malicious network activities …
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review
Providing a high-performance Intrusion Detection System (IDS) can be very effective in
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …
Reliability and high availability in cloud computing environments: a reference roadmap
Reliability and high availability have always been a major concern in distributed systems.
Providing highly available and reliable services in cloud computing is essential for …
Providing highly available and reliable services in cloud computing is essential for …
IoT malware network traffic classification using visual representation and deep learning
With the increase of IoT devices and technologies coming into service, Malware has risen as
a challenging threat with increased infection rates and levels of sophistication. Without …
a challenging threat with increased infection rates and levels of sophistication. Without …
Deep generative learning models for cloud intrusion detection systems
Intrusion detection (ID) on the cloud environment has received paramount interest over the
last few years. Among the latest approaches, machine learning-based ID methods allow us …
last few years. Among the latest approaches, machine learning-based ID methods allow us …
Internet of Things architecture challenges: A systematic review
Summary The Internet of Things (IoT) is a rapidly growing trend within many domains, such
as automotive, avionics, automation, energy, and health. IoT architecture is the system of …
as automotive, avionics, automation, energy, and health. IoT architecture is the system of …
Towards effective network intrusion detection: from concept to creation on Azure cloud
Network Intrusion Detection is one of the most researched topics in the field of computer
security. Hacktivists use sophisticated tools to launch numerous attacks that hamper the …
security. Hacktivists use sophisticated tools to launch numerous attacks that hamper the …
Intrusion detection in Edge-of-Things computing
AS Almogren - Journal of Parallel and Distributed Computing, 2020 - Elsevier
Abstract Edge-of-Things (EoT) is a new evolving computing model driven by the Internet of
Things (IoT). It enables data processing, storage, and service to be shifted from the Cloud to …
Things (IoT). It enables data processing, storage, and service to be shifted from the Cloud to …