A survey of intrusion detection systems in wireless sensor networks
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
Machine learning based intrusion detection system
A Halimaa, K Sundarakantham - 2019 3rd International …, 2019 - ieeexplore.ieee.org
In order to examine malicious activity that occurs in a network or a system, intrusion
detection system is used. Intrusion Detection is software or a device that scans a system or a …
detection system is used. Intrusion Detection is software or a device that scans a system or a …
CyberTEA: a technical and economic approach for cybersecurity planning and investment
It is essential to look at cybersecurity not only as a technical problem but also from
economic, societal, and legal perspectives. Companies need to pay more attention to …
economic, societal, and legal perspectives. Companies need to pay more attention to …
Detecting web attacks using multi-stage log analysis
M Moh, S Pininti, S Doddapaneni… - 2016 IEEE 6th …, 2016 - ieeexplore.ieee.org
Web-based applications have gained universal acceptance in every sector of lives,
including social, commercial, government, and academic communities. Even with the recent …
including social, commercial, government, and academic communities. Even with the recent …
A continuous change detection mechanism to identify anomalies in ECG signals for WBAN-based healthcare environments
The developments and applications of wireless body area networks (WBANs) for healthcare
and remote monitoring have brought a revolution in the medical research field. Numerous …
and remote monitoring have brought a revolution in the medical research field. Numerous …
SecGrid: a visual system for the analysis and ML-based classification of cyberattack traffic
Due to the increasing number of cyberattacks and respective predictions for the upcoming
years with even larger numbers of occurrences, companies are becoming aware not only …
years with even larger numbers of occurrences, companies are becoming aware not only …
An internal intrusion detection and protection system by using data mining and forensic techniques
Currently, most computer systems use user IDs and passwords as the login patterns to
authenticate users. However, many people share their login patterns with coworkers and …
authenticate users. However, many people share their login patterns with coworkers and …
Hybrid DNN-BiLSTM-aided intrusion detection and trust-clustering and routing-based intrusion prevention system in VANET
This paper focuses on develo** an intrusion prevention and detection Vehicular Ad Hoc
Network system by expert systems. The node data are composed of online sources. The …
Network system by expert systems. The node data are composed of online sources. The …
A Survey on Automatic Abnormalities Monitoring System for Log Files using Machine Learning.
Attacks on a system's security are growing increasingly common since cyber criminals make
a living out of system flaw exploitation. There is revenue loss and serious business and …
a living out of system flaw exploitation. There is revenue loss and serious business and …
[HTML][HTML] Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks
The rapid emergence of 5G technology brings new cybersecurity challenges that hold
significant implications for our economy, society, and environment. Among these challenges …
significant implications for our economy, society, and environment. Among these challenges …