Security data collection and data analytics in the internet: A survey

X **g, Z Yan, W Pedrycz - IEEE Communications Surveys & …, 2018‏ - ieeexplore.ieee.org
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …

[PDF][PDF] DoS and DDoS attack detection using deep learning and IDS

M Shurman, R Khrais, A Yateem - Int. Arab J. Inf. Technol, 2020‏ - researchgate.net
In the recent years, Denial-of-Dervice (DoS) orDistributed Denial-of-Service (DDoS) attack
has spread greatly and attackers make online systems unavailable to legitimate users by …

A survey of distributed denial of service attack

KN Mallikarjunan, K Muthupriya… - 2016 10th International …, 2016‏ - ieeexplore.ieee.org
Information security deals with a large number of subjects like spoofed message detection,
audio processing, video surveillance and cyber-attack detections. However the biggest …

Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch

X **g, Z Yan, X Jiang, W Pedrycz - Information Fusion, 2019‏ - Elsevier
Abstract Distributed Denial of Service (DDoS) flooding attacks are one of the typical attacks
over the Internet. They aim to prevent normal users from accessing specific network …

IoT denial-of-service attack detection and prevention using hybrid IDS

MM Shurman, RM Khrais… - 2019 International Arab …, 2019‏ - ieeexplore.ieee.org
the more (IoT) scales up with promises, the more security issues raise to the surface and
must be tackled down. IoT is very vulnerable against DoS attacks. In this paper, we propose …

Artificial neural network-based mechanism to detect security threats in wireless sensor networks

S Khan, MA Khan, N Alnazzawi - Sensors, 2024‏ - mdpi.com
Wireless sensor networks (WSNs) are essential in many areas, from healthcare to
environmental monitoring. However, WSNs are vulnerable to routing attacks that might …

Predictive maintenance in industrial IoT (IIoT)

FS Al-Anzi, AF Al-Anzi, S Sarath - International Conference on …, 2024‏ - spiedigitallibrary.org
Industrial maintenance practices have been transformed by the integration of the Industrial
Internet of Things (IIoT) and AI. In the context of the IIoT, this research article seeks to …

Breakpoint based online anomaly detection

E Krönert, D Hattab, A Celisse - arxiv preprint arxiv:2402.03565, 2024‏ - arxiv.org
The goal of anomaly detection is to identify observations that are generated by a distribution
that differs from the reference distribution that qualifies normal behavior. When examining a …

Time Series Forecasting Model for E-commerce Store Sales Using FB-Prophet

M Alsaidi, A Alhindi - 2023 14th International Conference on …, 2023‏ - ieeexplore.ieee.org
Recently, there has been a huge increase in online sales. Therefore, increasing e-
commerce sales improves the quality of business sales. To increase the efficiency of this …

Evolution and Optimization of Language Model Architectures: From Foundations to Future Directions

ZM AlQenaei - International Conference on Computing and Machine …, 2024‏ - Springer
In the continuously advancing domain of artificial intelligence, language model architectures
have undergone a significant transformation, evolving from fundamental statistical methods …