SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network

AA Ahmed, MF Mohammed - Journal of Computational Science, 2018 - Elsevier
Sensitive information can be exposed to critical risks when communicated through computer
networks. The ability of cybercriminals to hide their intention to attack obstructs existing …

Investigation approach for network attack intention recognition

AA Ahmed - Digital Forensics and Forensic Investigations …, 2020 - igi-global.com
Sensitive information has critical risks when transmitted through computer networks. Existing
protection systems still have limitations with treating network information with sufficient …

[PDF][PDF] Attack Intention Recognition: A Review.

AA Ahmed, NAK Zaman - Int. J. Netw. Secur., 2017 - academia.edu
Sensitive information faces critical risks when it is transmitted through computer networks.
Existing protection systems are still limited in their capacities to ensure network information …

Network forensics based on fuzzy logic and expert system

N Liao, S Tian, T Wang - Computer Communications, 2009 - Elsevier
Network forensics is a research area that finds the malicious users by collecting and
analyzing the intrusion or infringement evidence of computer crimes such as hacking. In the …

An approach on cyber threat intelligence using recurrent neural network

U Sakthivelu, CNS Vinoth Kumar - ICT Infrastructure and Computing …, 2022 - Springer
The term cyber threat intelligence refers to evidence-based knowledge that has been
collected, processed, and analyzed to understand about the threat existing or emerging …

Vulnerable network analysis using war driving and security intelligence

S Gupta, BS Chaudhari… - … conference on inventive …, 2016 - ieeexplore.ieee.org
Wireless network is growing explosively not only in the corporate environment but also at the
consumer space. If the network is left open and unsecured, anyone can not only use the …

An enhanced network security using machine learning and behavioral analysis

MG Haricharan, SP Govind… - … for Advancement in …, 2023 - ieeexplore.ieee.org
With the advancement of the internet over the years, the number of attacks over the internet
has also increased. A powerful intrusion detection system (IDS) is required to ensure the …

Intelligent techniques for detecting network attacks: review and research directions

M Aljabri, SS Aljameel, RMA Mohammad, SH Almotiri… - Sensors, 2021 - mdpi.com
The significant growth in the use of the Internet and the rapid development of network
technologies are associated with an increased risk of network attacks. Network attacks refer …

DETECTION OF CYBER ATTACK IN NETWORK USING MACHINE LEARNING TECHNIQUES

P Uyyala - Journal of interdisciplinary cycle research, 2022 - hcommons.org
Contrasted with the past, improvements in PC and correspondence innovations have given
broad and propelled changes. The use of new innovations give incredible advantages to …

Network attack classification using LSTM with XGBoost feature selection

R Poornima, M Elangovan… - Journal of Intelligent & …, 2022 - content.iospress.com
The evolving new and modern technologies raise the risks in the network which will be
affected by several attacks and thus give rise to developing efficient network attack detection …