A critical review on the implementation of static data sampling techniques to detect network attacks

S Hajj, R El Sibai, JB Abdo, J Demerjian… - IEEE …, 2021 - ieeexplore.ieee.org
Given that Internet traffic speed and volume are growing at a rapid pace, monitoring the
network in a real-time manner has introduced several issues in terms of computing and …

Knowledge graph reasoning for cyber attack detection

E Gilliard, J Liu, AA Aliyu - IET Communications, 2024 - Wiley Online Library
In today's digital landscape, cybercriminals are constantly evolving their tactics, making it
challenging for traditional cybersecurity methods to keep up. To address this issue, this …

[PDF][PDF] Towards Robust IDSs: An Integrated Approach of Hybrid Feature Selection and Machine Learning

M Al-Omari, QA Al-Haija - Journal of Internet Services and Information …, 2024 - jisis.org
Due to the rapid growth of technology, the urgency for effective cybersecurity systems has
become increasingly critical, notably within the paradigm of the Internet of Things (IoT) and …

Optimizing neural networks using spider monkey optimization algorithm for intrusion detection system

D Kumari, A Sinha, S Dutta, P Pranav - Scientific Reports, 2024 - nature.com
The constantly changing nature of cyber threats presents unprecedented difficulties for
people, institutions, and governments across the globe. Cyber threats are a major concern in …

Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges

ZK Maseer, QK Kadhim, B Al‐Bander, R Yusof… - IET …, 2024 - Wiley Online Library
Intrusion detection systems built on artificial intelligence (AI) are presented as latent
mechanisms for actively detecting fresh attacks over a complex network. The authors used a …

Machine Learning Based Intrusion Detection System

R Udayakumar, D Balakrishnan… - 2023 3rd …, 2023 - ieeexplore.ieee.org
In today's digital landscape, the increasing frequency and sophistication of cyberattacks
have highlighted the necessity for robust intrusion detection systems (IDS) to safe-guard …

A Survey on Intrusion Detection and Prevention Systems

N Gupta, V Jindal, P Bedi - SN Computer Science, 2023 - Springer
In the digital world, malicious activities that violate the confidentiality, integrity, or availability
of data and devices are known as intrusions. An intrusion detection system (IDS) analyses …

Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems

B Isong, O Kgote, A Abu-Mahfouz - Electronics, 2024 - mdpi.com
The swift explosion of Internet of Things (IoT) devices has brought about a new era of
interconnectivity and ease of use while simultaneously presenting significant security …

A new feature selection algorithm based on fuzzy-pathfinder optimization

A Zandvakili, N Mansouri, MM Javidi - Neural Computing and Applications, 2024 - Springer
Data mining and machine learning require feature selection because features can
dramatically improve model performance. In contrast, there are no polynomial solutions for …

[PDF][PDF] An optimized deep learning approach for improving airline services

S Ouf - Comput. Mater. Contin, 2023 - cdn.techscience.cn
The aviation industry is one of the most competitive markets. The most common approach for
airline service providers is to improve passenger satisfaction. Passenger satisfaction in the …