N Mohamed - Cogent Engineering, 2023 - Taylor & Francis
This paper provides a comprehensive survey of the state-of-the-art use of Artificial Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper …
Y Lyu, Y Feng, K Sakurai - Information, 2023 - mdpi.com
Cyber attack detection technology plays a vital role today, since cyber attacks have been causing great harm and loss to organizations and individuals. Feature selection is a …
X Hu, W Gao, G Cheng, R Li, Y Zhou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Early and accurate detection of network intrusions is crucial to ensure network security and stability. Existing network intrusion detection methods mainly use conventional machine …
The rapid growth of online music education has led to increased security risks from cyber intrusions. This paper proposes public cloud networks oriented deep neural networks for …
A Thakkar, R Lohiya - Archives of Computational Methods in Engineering, 2023 - Springer
Research in the field of Intrusion Detection is focused on developing an efficient strategy that can identify network attacks. One of the important strategies is to supervise the network …
Abstract Machine Learning techniques for network-based intrusion detection are widely adopted in the scientific literature. Besides being highly variable, network traffic behavior …
A Momand, SU Jan, N Ramzan - Journal of Sensors, 2023 - Wiley Online Library
Recently, intrusion detection systems (IDS) have become an essential part of most organisations' security architecture due to the rise in frequency and severity of network …
A Imanbayev, S Tynymbayev, R Odarchenko… - Sensors, 2022 - mdpi.com
The introduction of fifth generation mobile networks is underway all over the world which makes many people think about the security of the network from any hacking. Over the past …
Home networks increasingly support important networked applications with limited professional network administration support, while sophisticated attacks pose enormous …