Advancing cybersecurity: a comprehensive review of AI-driven detection techniques

AH Salem, SM Azzam, OE Emam, AA Abohany - Journal of Big Data, 2024 - Springer
As the number and cleverness of cyber-attacks keep increasing rapidly, it's more important
than ever to have good ways to detect and prevent them. Recognizing cyber threats quickly …

Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm

S Fraihat, S Makhadmeh, M Awad, MA Al-Betar… - Internet of Things, 2023 - Elsevier
With the rapid expansion of Internet of Things (IoT) networks, the need for robust security
measures to detect and report potential threats is becoming more urgent. In this paper, we …

[HTML][HTML] Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security

NO Aljehane, HA Mengash, MM Eltahir… - Alexandria Engineering …, 2024 - Elsevier
Network security is essential to our daily communications and networks. Cybersecurity
researchers initiate the significance of emerging proficient network intrusion detection …

Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection

D Zegarra Rodriguez, O Daniel Okey, SS Maidin… - Plos one, 2023 - journals.plos.org
Recent years have witnessed an in-depth proliferation of the Internet of Things (IoT) and
Industrial Internet of Things (IIoT) systems linked to Industry 4.0 technology. The increasing …

A hybrid meta-heuristics algorithm: Xgboost-based approach for ids in iot

S Bajpai, K Sharma, BK Chaurasia - SN Computer Science, 2024 - Springer
In recent years, the importance of the Internet of Things (IoT) and its applications has
increased. IoT networks are diverse, allowing for various real-time applications and making …

Passive rule-based approach to detect sinkhole attack in RPL-based Internet of Things networks

S Al-Sarawi, M Anbar, BA Alabsi, MA Aladaileh… - IEEE …, 2023 - ieeexplore.ieee.org
An Internet of Things (IoT) refers to a network of smart devices that enable data collection
and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless …

Leveraging metaheuristics for feature selection with machine learning classification for malicious packet detection in computer networks

A Shanbhag, S Vincent, SBB Gowda, OP Kumar… - IEEE …, 2024 - ieeexplore.ieee.org
Robust Intrusion Detection Systems (IDS) are increasingly necessary in the age of big data
due to the growing volume, velocity, and variety of data generated by modern networks …

AI-driven improvement of monthly average rainfall forecasting in Mecca using grid search optimization for LSTM networks

F Alqahtani - Journal of Water and Climate Change, 2024 - iwaponline.com
Predicting the average monthly rainfall in Mecca is crucial for sustainable development,
resource management, and infrastructure protection in the region. This study aims to …

Enhanced Intrusion Detection Using Stacked FT-Transformer Architecture.

SP Praveen, T Bikku, P Muthukumar… - … of Cybersecurity & …, 2024 - search.ebscohost.com
The function of network intrusion detection systems (NIDS) in protecting networks from
cyberattacks is crucial. Many of the more conventional techniques rely on signature-based …

A multiscale approach for network intrusion detection based on variance–covariance subspace distance and EQL v2

T Liu, Y Fu, K Wang, X Duan, Q Wu - Computers & Security, 2025 - Elsevier
As an important network defense approach, network intrusion detection is mainly used to
identify anomaly traffic behavior. However, dominant network intrusion detection …