Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review

J Kaur, U Garg, G Bathla - Artificial Intelligence Review, 2023 - Springer
With the rising demand for E-commerce, Social Networking websites, it has become
essential to develop security protocols over the World Wide Web that can provide security …

[HTML][HTML] Artificial Intelligence Enabled Project Management: A Systematic Literature Review

I Taboada, A Daneshpajouh, N Toledo, T de Vass - Applied Sciences, 2023 - mdpi.com
In the Industry 5.0 era, companies are leveraging the potential of cutting-edge technologies
such as artificial intelligence for more efficient and green human-centric production. In a …

Fusion of statistical importance for feature selection in Deep Neural Network-based Intrusion Detection System

A Thakkar, R Lohiya - Information Fusion, 2023 - Elsevier
Abstract Intrusion Detection System (IDS) is an essential part of network as it contributes
towards securing the network against various vulnerabilities and threats. Over the past …

[HTML][HTML] A novel deep learning-based intrusion detection system for IOT networks

A Awajan - Computers, 2023 - mdpi.com
The impressive growth rate of the Internet of Things (IoT) has drawn the attention of
cybercriminals more than ever. The growing number of cyber-attacks on IoT devices and …

Attack classification of imbalanced intrusion data for IoT network using ensemble learning-based deep neural network

A Thakkar, R Lohiya - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
With the increase in popularity of Internet of Things (IoT) and the rise in interconnected
devices, the need to foster effective security mechanism to handle vulnerabilities and risks in …

[HTML][HTML] IMIDS: An intelligent intrusion detection system against cyber threats in IoT

KH Le, MH Nguyen, TD Tran, ND Tran - Electronics, 2022 - mdpi.com
The increasing popularity of the Internet of Things (IoT) has significantly impacted our daily
lives in the past few years. On one hand, it brings convenience, simplicity, and efficiency for …

A new intrusion detection system based on Moth–Flame Optimizer algorithm

M Alazab, RA Khurma, A Awajan… - Expert Systems with …, 2022 - Elsevier
This study relies on using a Moth–Flame Optimization (MFO) method as a search algorithm
and a Decision Tree (DT) as an evaluation algorithm to generate an efficient feature subset …

[HTML][HTML] A survey on feature selection techniques based on filtering methods for cyber attack detection

Y Lyu, Y Feng, K Sakurai - Information, 2023 - mdpi.com
Cyber attack detection technology plays a vital role today, since cyber attacks have been
causing great harm and loss to organizations and individuals. Feature selection is a …

A systematic and comprehensive survey of recent advances in intrusion detection systems using machine learning: deep learning, datasets, and attack taxonomy

A Momand, SU Jan, N Ramzan - Journal of Sensors, 2023 - Wiley Online Library
Recently, intrusion detection systems (IDS) have become an essential part of most
organisations' security architecture due to the rise in frequency and severity of network …

[HTML][HTML] Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods

K Samunnisa, GSV Kumar, K Madhavi - Measurement: Sensors, 2023 - Elsevier
Cloud Computing is popular nowadays due to its storage and data access services. Security
and privacy are prime concerns when network threats increase. Cloud computing offers …