A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cyber security solutions
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence
methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement …
methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement …
A systematic review on hybrid intrusion detection system
As computer networks keep growing at a high rate, achieving confidentiality, integrity, and
availability of the information system is essential. Intrusion detection systems (IDSs) have …
availability of the information system is essential. Intrusion detection systems (IDSs) have …
A novel feature selection approach to classify intrusion attacks in network communications
The fast development of communication technologies and computer systems brings several
challenges from a security point of view. The increasing number of IoT devices as well as …
challenges from a security point of view. The increasing number of IoT devices as well as …
[HTML][HTML] Hybrid Learning Model for intrusion detection system: A combination of parametric and non-parametric classifiers
The growing digital transformation has increased the need for effective intrusion detection
systems. Traditional intrusion detection systems face challenges in accurately classifying …
systems. Traditional intrusion detection systems face challenges in accurately classifying …
Anomaly intrusion detection using machine learning-IG-R based on NSL-KDD dataset
Cybersecurity is challenging for security guards because of the rising quantity, variety, and
frequency of attacks and malicious activities in cyberspace. Intrusion attacks are among the …
frequency of attacks and malicious activities in cyberspace. Intrusion attacks are among the …
[PDF][PDF] Increasing the performance of intrusion detection models developed using machine learning method with preprocessing applied to the dataset
EG İlgün, R Samet - Journal of the Faculty of Engineering and …, 2024 - scholar.archive.org
Increasing the performance of intrusion detection models developed using machine
learning method with preprocessing applied to t Page 1 Journal of the Faculty of …
learning method with preprocessing applied to t Page 1 Journal of the Faculty of …
Network traffic virtualization using wireshark and google maps
S Arvind, S Arvind, VK Silveri, G Potey… - 2023 International …, 2023 - ieeexplore.ieee.org
Security analysts have the knowledge necessary to identify the types of traffic that are
present in a network, identify instances of abnormally high traffic, and identify the network …
present in a network, identify instances of abnormally high traffic, and identify the network …
Autoencoder-based intrusion detection in critical infrastructures
Securing critical infrastructure systems such as electricity, energy, health, management,
transportation, and production facilities against cyber attacks is the issue on which states …
transportation, and production facilities against cyber attacks is the issue on which states …
[PDF][PDF] A review of security methods in light fidelity technology
Abstract Light fidelity (Li-Fi) technology is a communication technology using visible light. Li-
Fi technology solves the problem of radio frequency bandwidth shortage in wireless fidelity …
Fi technology solves the problem of radio frequency bandwidth shortage in wireless fidelity …
Adaptive weighted kernel support vector machine-based circle search approach for intrusion detection in IoT environments
C Geetha, SD Johnson, AS Oliver, D Lekha - Signal, Image and Video …, 2024 - Springer
Abstract Nowadays, the Internet of Things (IoT) is considered a globally implemented
technology in automated network structures. However, the procedures utilized in IoT devices …
technology in automated network structures. However, the procedures utilized in IoT devices …