A survey of intrusion detection systems in wireless sensor networks

I Butun, SD Morgera, R Sankar - IEEE communications surveys …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …

Machine learning based intrusion detection system

A Halimaa, K Sundarakantham - 2019 3rd International …, 2019 - ieeexplore.ieee.org
In order to examine malicious activity that occurs in a network or a system, intrusion
detection system is used. Intrusion Detection is software or a device that scans a system or a …

CyberTEA: a technical and economic approach for cybersecurity planning and investment

MF Franco, LZ Granville, B Stiller - NOMS 2023-2023 IEEE/IFIP …, 2023 - ieeexplore.ieee.org
It is essential to look at cybersecurity not only as a technical problem but also from
economic, societal, and legal perspectives. Companies need to pay more attention to …

Detecting web attacks using multi-stage log analysis

M Moh, S Pininti, S Doddapaneni… - 2016 IEEE 6th …, 2016 - ieeexplore.ieee.org
Web-based applications have gained universal acceptance in every sector of lives,
including social, commercial, government, and academic communities. Even with the recent …

A continuous change detection mechanism to identify anomalies in ECG signals for WBAN-based healthcare environments

FA Khan, NAH Haldar, A Ali, M Iftikhar, TA Zia… - IEEE …, 2017 - ieeexplore.ieee.org
The developments and applications of wireless body area networks (WBANs) for healthcare
and remote monitoring have brought a revolution in the medical research field. Numerous …

SecGrid: a visual system for the analysis and ML-based classification of cyberattack traffic

M Franco, J Von der Assen, L Boillat… - 2021 IEEE 46th …, 2021 - ieeexplore.ieee.org
Due to the increasing number of cyberattacks and respective predictions for the upcoming
years with even larger numbers of occurrences, companies are becoming aware not only …

An internal intrusion detection and protection system by using data mining and forensic techniques

FY Leu, KL Tsai, YT Hsiao, CT Yang - IEEE Systems Journal, 2015 - ieeexplore.ieee.org
Currently, most computer systems use user IDs and passwords as the login patterns to
authenticate users. However, many people share their login patterns with coworkers and …

Hybrid DNN-BiLSTM-aided intrusion detection and trust-clustering and routing-based intrusion prevention system in VANET

PV Sontakke, NB Chopade - Journal of Control and Decision, 2023 - Taylor & Francis
This paper focuses on develo** an intrusion prevention and detection Vehicular Ad Hoc
Network system by expert systems. The node data are composed of online sources. The …

A Survey on Automatic Abnormalities Monitoring System for Log Files using Machine Learning.

S Ranga, M Guptha, MS Hema - Turkish Online Journal of …, 2021 - search.ebscohost.com
Attacks on a system's security are growing increasingly common since cyber criminals make
a living out of system flaw exploitation. There is revenue loss and serious business and …

[HTML][HTML] Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks

A Bozorgchenani, CC Zarakovitis, SF Chien, TO Ting… - Computer Networks, 2023 - Elsevier
The rapid emergence of 5G technology brings new cybersecurity challenges that hold
significant implications for our economy, society, and environment. Among these challenges …