Multi-attribute decision-making for intrusion detection systems: A systematic review

A Alamleh, OS Albahri, AA Zaidan… - … Journal of Information …, 2023 - World Scientific
Intrusion detection systems (IDSs) employ sophisticated security techniques to detect
malicious activities on hosts and/or networks. IDSs have been utilized to ensure the security …

A survey of information security incident handling in the cloud

NH Ab Rahman, KKR Choo - computers & security, 2015 - Elsevier
Incident handling strategy is one key strategy to mitigate risks to the confidentiality, integrity
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …

Deep Q-learning based reinforcement learning approach for network intrusion detection

H Alavizadeh, H Alavizadeh, J Jang-Jaccard - Computers, 2022 - mdpi.com
The rise of the new generation of cyber threats demands more sophisticated and intelligent
cyber defense solutions equipped with autonomous agents capable of learning to make …

A GA-LR wrapper approach for feature selection in network intrusion detection

C Khammassi, S Krichen - computers & security, 2017 - Elsevier
Intrusions constitute one of the main issues in computer network security. Through malicious
actions, hackers can have unauthorised access that compromises the integrity, the …

Sustainability appraisal of desired contaminated groundwater remediation strategies: an information-entropy-based stochastic multi-criteria preference model

L He, F Shao, L Ren - Environment, development and sustainability, 2021 - Springer
This study proposes an information-entropy-based stochastic multi-criteria preference model
(SMCPM) to assess the sustainability of groundwater remediation strategies. The model was …

A dynamic decision-making approach for intrusion response in industrial control systems

X Li, C Zhou, YC Tian, Y Qin - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Industrial control systems (ICSs) are facing more and more cybersecurity issues, leading to
increasingly severe risks in critical infrastructure. To mitigate risks, develo** an …

Packet-level and flow-level network intrusion detection based on reinforcement learning and adversarial training

B Yang, MH Arshad, Q Zhao - Algorithms, 2022 - mdpi.com
Powered by advances in information and internet technologies, network-based applications
have developed rapidly, and cybersecurity has grown more critical. Inspired by …

Model-based response planning strategies for autonomic intrusion protection

S Iannucci, S Abdelwahed - ACM Transactions on Autonomous and …, 2018 - dl.acm.org
The continuous increase in the quantity and sophistication of cyberattacks is making it more
difficult and error prone for system administrators to handle the alerts generated by intrusion …

Recall management in pharmaceutical industry through supply chain coordination

SM Hosseini-Motlagh, M Jazinaninejad… - Annals of Operations …, 2023 - Springer
This paper is motivated by a real pharmaceutical supply chain (PSC) of Valsartan, facing two
major concerns. First, implementing effective policies for product recall management due to …

A decision support system for optimal selection of enterprise information security preventative actions

FÖ Sönmez, BG Kılıç - IEEE Transactions on Network and …, 2020 - ieeexplore.ieee.org
Types and complexity of information security related vulnerabilities are growing rapidly and
present numerous challenges to the enterprises. One of the key challenges is to identify the …