[PDF][PDF] A Review of Intrusion Detection System Methods and Techniques: Past, Present and Future
YH Alagrash, HS Mehdy… - International Journal on …, 2023 - iotpe.tabaelm.com
The intrusion detection system (IDS) is a rapidly expanding field that continues to attract
interest due to the increasing variety of its applications. It has been the topic of research, with …
interest due to the increasing variety of its applications. It has been the topic of research, with …
Performance evaluation of machine learning for prediction of network traffic in a smart home
F Alghayadh, D Debnath - 2020 11th IEEE Annual Ubiquitous …, 2020 - ieeexplore.ieee.org
The network system of smart homes using a Internet of Things (IoT) device is increasing in
parallel with cybersecurity challenges as these loT devices have some vulnerabilities such …
parallel with cybersecurity challenges as these loT devices have some vulnerabilities such …
Intensive Malware Detection Approach based on Data Mining
Malicious software, sometimes known as malware, is software designed to harm a computer,
network, or any of the connected resources. Without the user's knowledge, malware can …
network, or any of the connected resources. Without the user's knowledge, malware can …
Detection of Malware by Using YARA Rules
RH Mahdi, H Trabelsi - … on Systems, Signals & Devices (SSD), 2024 - ieeexplore.ieee.org
Malware's continuous advancement and increasing sophistication have made it the most
critical issue for the user, resulting in more significant innovation, increasing complexity, and …
critical issue for the user, resulting in more significant innovation, increasing complexity, and …
Machine Learning Algorithms are Used for Fake Review Detection
An internet business's revenue can be significantly impacted by user reviews. Online users
read reviews before choosing any products or services. Because of this, a company's …
read reviews before choosing any products or services. Because of this, a company's …
Machine Learning Approach for Malware Detection Using Malware Memory Analysis Data
SP Ramesh, SR Anand, VG Karthikeyan - International Conference on …, 2024 - Springer
Malware has intensified due to technological advancements. It is critical to identify malware.
To detect malware, both static and dynamic methods are used. Sophisticated malware may …
To detect malware, both static and dynamic methods are used. Sophisticated malware may …
Check for updates Machine Learning Algorithms are Used for Fake Review Detection
An internet business's revenue can be significantly impacted by user reviews. Online users
read reviews before choosing any products or services. Because of this, a company's …
read reviews before choosing any products or services. Because of this, a company's …
Malware Detection via Machine Learning and Recognition of Non Stationary Tasks
Most research studies indicate that users are frequently targeted by malware. Mimicry
attacks enable malware to operate in ways that are similar to the work of legitimate users …
attacks enable malware to operate in ways that are similar to the work of legitimate users …
Machine Learning Based on User Behavior as a Resource Utilization to Detect Malware
YH Alagrash - 2020 - search.proquest.com
It is not just our success; every person in our lives plays a leading role in achieving our goals
and motivates us to learn more. I have to start by thanking my advisor Dr. Julian Rrushi. My …
and motivates us to learn more. I have to start by thanking my advisor Dr. Julian Rrushi. My …