Enhancing Intrusion Detection Systems Using a Deep Learning and Data Augmentation Approach

R Mohammad, F Saeed, AA Almazroi, FS Alsubaei… - Systems, 2024 - mdpi.com
Cybersecurity relies heavily on the effectiveness of intrusion detection systems (IDSs) in
securing business communication because they play a pivotal role as the first line of …

A wormhole attack detection algorithm integrated with the node trust optimization model in WSNs

Z Teng, C Du, M Li, H Zhang, W Zhu - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
The openness of Wireless Sensor Networks (WSNs) layout makes them vulnerable to
attacks. One of the most threatening attacks is the wormhole attack. The wormhole attack is …

Multi-objective seagull optimization algorithm with deep learning-enabled vulnerability detection for secure cloud environments

M Aljebreen, MA Alohali, H Mahgoub, SS Aljameel… - Sensors, 2023 - mdpi.com
Cloud computing (CC) is an internet-enabled environment that provides computing services
such as networking, databases, and servers to clients and organizations in a cost-effective …

[PDF][PDF] A comparative analysis for designing security mechanism for resource-constrained internet of things devices

S Vashisth, A Goyal - 2024 - publications.scrs.in
In today's digital age, the rise of Internet of Things (IoT) devices has remarkably transformed
technological interactions, offering unprecedented convenience and efficiency across …

Intrusion detection system (IDS) for security enhancement in wireless sensing applications

B Bhushan - … and Communication Engineering: Proceedings of the …, 2022 - Springer
Intrusion detection has been defined as the system to identify the anomalous, incorrect, or
inappropriate moving attackers. Moreover, intrusion detection system (IDS) when used …

Evaluation of Network Security Grade Protection Combined With Deep Learning for Intrusion Detection

S Lin, C Feng, T Jiang, H Jing - IEEE Access, 2023 - ieeexplore.ieee.org
Using deep learning models, we predict information system security indicators and obtain
corresponding security evaluation scores. The scores of these predicted security evaluation …

Machine Learning-Based Attack Detection for Wireless Sensor Network Security Using Hidden Markov Models

AR Affane M, H Satori, Y Boutazart, A Ezzine… - Wireless Personal …, 2024 - Springer
Abstract The progress of Wireless Sensor Networks (WSNs) technologies has introduced a
greater susceptibility of sensors and networks to being victims of distributed attacks. These …

Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks.

CD McDermott, A Petrovski - … journal of computer …, 2017 - rgu-repository.worktribe.com
Wireless Sensor Networks (WSNs) have become a key technology for the IoT and despite
obvious benefits, challenges still exist regarding security. As more devices are connected to …

Vulnerability management in IIoT-based systems: What, why and how

G Yadav, K Paul, P Gauravaram - Secure and Trusted Cyber Physical …, 2022 - Springer
Abstract Industrial Control Systems (ICS) are characterized by large numbers of tightly
integrated, interdependent, and heterogeneous components in a network. They act as a …

Investigation of threats, vulnerabilities, attacks, and approaches in wireless sensor networks

P Chaya, NP KS - Handbook of Research on Evolving Designs and …, 2022 - igi-global.com
Wireless sensor networks (WSN) have emerged as significant technology that has been
adopted in various research fields to monitor the physical environments and collect …