A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cyber security solutions

M Ozkan-Okay, E Akin, Ö Aslan, S Kosunalp… - IEEe …, 2024 - ieeexplore.ieee.org
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence
methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement …

A systematic review on hybrid intrusion detection system

EM Maseno, Z Wang, H **ng - Security and Communication …, 2022 - Wiley Online Library
As computer networks keep growing at a high rate, achieving confidentiality, integrity, and
availability of the information system is essential. Intrusion detection systems (IDSs) have …

A novel feature selection approach to classify intrusion attacks in network communications

M Ozkan-Okay, R Samet, Ö Aslan, S Kosunalp, T Iliev… - Applied Sciences, 2023 - mdpi.com
The fast development of communication technologies and computer systems brings several
challenges from a security point of view. The increasing number of IoT devices as well as …

[HTML][HTML] Hybrid Learning Model for intrusion detection system: A combination of parametric and non-parametric classifiers

C Rajathi, P Rukmani - Alexandria Engineering Journal, 2025 - Elsevier
The growing digital transformation has increased the need for effective intrusion detection
systems. Traditional intrusion detection systems face challenges in accurately classifying …

Anomaly intrusion detection using machine learning-IG-R based on NSL-KDD dataset

AH Aljammal, I Al-Oqily, M Obiedat… - Bulletin of Electrical …, 2024 - beei.org
Cybersecurity is challenging for security guards because of the rising quantity, variety, and
frequency of attacks and malicious activities in cyberspace. Intrusion attacks are among the …

[PDF][PDF] Increasing the performance of intrusion detection models developed using machine learning method with preprocessing applied to the dataset

EG İlgün, R Samet - Journal of the Faculty of Engineering and …, 2024 - scholar.archive.org
Increasing the performance of intrusion detection models developed using machine
learning method with preprocessing applied to t Page 1 Journal of the Faculty of …

Network traffic virtualization using wireshark and google maps

S Arvind, S Arvind, VK Silveri, G Potey… - 2023 International …, 2023 - ieeexplore.ieee.org
Security analysts have the knowledge necessary to identify the types of traffic that are
present in a network, identify instances of abnormally high traffic, and identify the network …

Autoencoder-based intrusion detection in critical infrastructures

HC Altunay, Z Albayrak, M Çakmak - Current Trends in Computing, 2024 - dergipark.org.tr
Securing critical infrastructure systems such as electricity, energy, health, management,
transportation, and production facilities against cyber attacks is the issue on which states …

[PDF][PDF] A review of security methods in light fidelity technology

MM Msallam, R Samet - Proc Eng Technol Int, 2024 - core.ac.uk
Abstract Light fidelity (Li-Fi) technology is a communication technology using visible light. Li-
Fi technology solves the problem of radio frequency bandwidth shortage in wireless fidelity …

Adaptive weighted kernel support vector machine-based circle search approach for intrusion detection in IoT environments

C Geetha, SD Johnson, AS Oliver, D Lekha - Signal, Image and Video …, 2024 - Springer
Abstract Nowadays, the Internet of Things (IoT) is considered a globally implemented
technology in automated network structures. However, the procedures utilized in IoT devices …