A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions

A Thakkar, R Lohiya - Artificial Intelligence Review, 2022 - Springer
With the increase in the usage of the Internet, a large amount of information is exchanged
between different communicating devices. The data should be communicated securely …

[HTML][HTML] A systematic literature review of blockchain cyber security

PJ Taylor, T Dargahi, A Dehghantanha… - Digital Communications …, 2020 - Elsevier
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has
(slowly) become one of the most frequently discussed methods for securing data storage …

Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset

SM Kasongo, Y Sun - Journal of Big Data, 2020 - Springer
Computer networks intrusion detection systems (IDSs) and intrusion prevention systems
(IPSs) are critical aspects that contribute to the success of an organization. Over the past …

Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection …

RA Disha, S Waheed - Cybersecurity, 2022 - Springer
To protect the network, resources, and sensitive data, the intrusion detection system (IDS)
has become a fundamental component of organizations that prevents cybercriminal …

Flowguard: An intelligent edge defense mechanism against IoT DDoS attacks

Y Jia, F Zhong, A Alrawais, B Gong… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices are getting more and more popular in recent years and IoT
networks play an important role in the industry as well as people's activities. On the one …

Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection

F Salo, AB Nassif, A Essex - Computer networks, 2019 - Elsevier
Handling redundant and irrelevant features in high-dimension datasets has caused a long-
term challenge for network anomaly detection. Eliminating such features with spectral …

Text feature extraction based on deep learning: a review

H Liang, X Sun, Y Sun, Y Gao - EURASIP journal on wireless …, 2017 - Springer
Selection of text feature item is a basic and important matter for text mining and information
retrieval. Traditional methods of feature extraction require handcrafted features. To hand …

Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …

From cloud to fog computing: A review and a conceptual live VM migration framework

O Osanaiye, S Chen, Z Yan, R Lu, KKR Choo… - IEEE …, 2017 - ieeexplore.ieee.org
Fog computing, an extension of cloud computing services to the edge of the network to
decrease latency and network congestion, is a relatively recent research trend. Although …