The rapid development of Information and Communication Technology and the growing number of devices connected to the Internet make the Internet of Things (IoT) as a promising …
In today's cyber world, the demand for the internet is increasing day by day, increasing the concern of network security. The aim of an Intrusion Detection System (IDS) is to provide …
Abstract The Internet of Things (IoT) refers to the collection of all those devices that could connect to the Internet to collect and share data. The introduction of varied devices …
The openness of the World Wide Web (Web) has become more exposed to cyber-attacks. An attacker performs the cyber-attacks on Web using malware Uniform Resource Locators …
A Sarkar, HS Sharma, MM Singh - International Journal of Information …, 2023 - Springer
An efficient machine learning (ML) ensemble technique for categorizing Intrusion Detection (ID) is proposed in this study. The tuning of the ML model's parameters is a critical topic …
Abstract Internet of Things (IoT) has become a pivotal technology for connecting various physical things or devices to the internet. Despite the potential advantages, security in IoT …
Routing protocol for Low power and lossy network (RPL) is a standardized optimal protocol for routing in Internet of Things (IoT). The constrained wireless sensor network in IoT is …
With the evolution of internet, network security has emerged as one of the key areas of research. Network security is to safeguard the privacy, availability and integrity of the system …
AM Chandrasekhar, K Raghuveer - Computer Networks & …, 2013 - Springer
Intrusion detection is not yet a perfect technology. This has given data mining the opportunity to make several important contributions to the field of intrusion detection. In this paper, we …