A balanced communication-avoiding support vector machine decision tree method for smart intrusion detection systems

A Al-Saleh - Scientific Reports, 2023 - nature.com
Abstract The Internet of Things field has created many challenges for network architectures.
Ensuring cyberspace security is the primary goal of intrusion detection systems (IDSs). Due …

ROAST-IoT: a novel range-optimized attention convolutional scattered technique for intrusion detection in IoT networks

A Mahalingam, G Perumal, G Subburayalu, M Albathan… - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) has significantly benefited several businesses, but because of
the volume and complexity of IoT systems, there are also new security issues. Intrusion …

Artificial Intelligence-Based Intrusion Detection and Prevention in Edge-Assisted SDWSN With Modified Honeycomb Structure

J Kipongo, TG Swart, E Esenogho - IEEE access, 2023 - ieeexplore.ieee.org
The software-defined wireless sensor network (SDWSN) has the potential to improve
flexibility, scalability, and network performance, but security and quality of service (QoS) are …

Performance evaluation of sensor deployment strategies in WSNs towards IoT

I Alablani, M Alenazi - 2019 IEEE/ACS 16th International …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is an advanced technology that will have a significant impact on our
day-to-day lives. Wireless sensor networks (WSN) form a basic element used within the IoT …

Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks

I Almomani, A Alromi - Sensors, 2020 - mdpi.com
Applying Software Engineering (SE) processes is vital to critical and complex systems
including security and networking systems. Nowadays, Wireless Sensor Networks (WSNs) …

Optimizing cybersecurity attack detection in computer networks: A comparative analysis of bio-inspired optimization algorithms using the CSE-CIC-IDS 2018 dataset

H Najafi Mohsenabad, MA Tut - Applied Sciences, 2024 - mdpi.com
In computer network security, the escalating use of computer networks and the
corresponding increase in cyberattacks have propelled Intrusion Detection Systems (IDSs) …

Intrusion detection via optimal tuned LSTM model with trust and risk level evaluation

RB Kagade, N Vijayaraj - International Journal of Bio …, 2024 - inderscienceonline.com
Different heterogeneous wireless sensor networks (WSNs) linked with the cloud platform
make up a sensor cloud framework. The optimal cluster head (CH) is chosen from among …

Feature selection for intrusion detection system in a cluster-based heterogeneous wireless sensor network

O Osanaiye, O Ogundile, F Aina… - … Series: Electronics and …, 2019 - casopisi.junis.ni.ac.rs
Wireless sensor network (WSN) has become one of the most promising networking solutions
with exciting new applications for the near future. Notwithstanding the resource constrain of …

Attack detection using evolutionary computation

M Stehlik, V Matyas, A Stetsko - Computational Intelligence in Wireless …, 2017 - Springer
Wireless sensor networks (WSNs) are often deployed in open and potentially hostile
environments. An attacker can easily capture the sensor nodes or replace them with …

A deep reinforcement learning based intrusion detection system (drl-ids) for securing wireless sensor networks and internet of things

H Benaddi, K Ibrahimi, A Benslimane… - Wireless Internet: 12th EAI …, 2020 - Springer
Many modern infrastructures incorporate a number of sensors and actuators interconnected
via wireless links using Wireless Sensor Network (WSN) and Internet of Things (IoT) …