Multi-attribute decision-making for intrusion detection systems: A systematic review
Intrusion detection systems (IDSs) employ sophisticated security techniques to detect
malicious activities on hosts and/or networks. IDSs have been utilized to ensure the security …
malicious activities on hosts and/or networks. IDSs have been utilized to ensure the security …
A survey of information security incident handling in the cloud
Incident handling strategy is one key strategy to mitigate risks to the confidentiality, integrity
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …
Deep Q-learning based reinforcement learning approach for network intrusion detection
The rise of the new generation of cyber threats demands more sophisticated and intelligent
cyber defense solutions equipped with autonomous agents capable of learning to make …
cyber defense solutions equipped with autonomous agents capable of learning to make …
A GA-LR wrapper approach for feature selection in network intrusion detection
Intrusions constitute one of the main issues in computer network security. Through malicious
actions, hackers can have unauthorised access that compromises the integrity, the …
actions, hackers can have unauthorised access that compromises the integrity, the …
Sustainability appraisal of desired contaminated groundwater remediation strategies: an information-entropy-based stochastic multi-criteria preference model
L He, F Shao, L Ren - Environment, development and sustainability, 2021 - Springer
This study proposes an information-entropy-based stochastic multi-criteria preference model
(SMCPM) to assess the sustainability of groundwater remediation strategies. The model was …
(SMCPM) to assess the sustainability of groundwater remediation strategies. The model was …
A dynamic decision-making approach for intrusion response in industrial control systems
X Li, C Zhou, YC Tian, Y Qin - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Industrial control systems (ICSs) are facing more and more cybersecurity issues, leading to
increasingly severe risks in critical infrastructure. To mitigate risks, develo** an …
increasingly severe risks in critical infrastructure. To mitigate risks, develo** an …
Packet-level and flow-level network intrusion detection based on reinforcement learning and adversarial training
B Yang, MH Arshad, Q Zhao - Algorithms, 2022 - mdpi.com
Powered by advances in information and internet technologies, network-based applications
have developed rapidly, and cybersecurity has grown more critical. Inspired by …
have developed rapidly, and cybersecurity has grown more critical. Inspired by …
Model-based response planning strategies for autonomic intrusion protection
The continuous increase in the quantity and sophistication of cyberattacks is making it more
difficult and error prone for system administrators to handle the alerts generated by intrusion …
difficult and error prone for system administrators to handle the alerts generated by intrusion …
Recall management in pharmaceutical industry through supply chain coordination
This paper is motivated by a real pharmaceutical supply chain (PSC) of Valsartan, facing two
major concerns. First, implementing effective policies for product recall management due to …
major concerns. First, implementing effective policies for product recall management due to …
A decision support system for optimal selection of enterprise information security preventative actions
Types and complexity of information security related vulnerabilities are growing rapidly and
present numerous challenges to the enterprises. One of the key challenges is to identify the …
present numerous challenges to the enterprises. One of the key challenges is to identify the …