As our professional, social, and financial existences become increasingly digitized and as our government, healthcare, and military infrastructures rely more on computer technologies …
To protect the network, resources, and sensitive data, the intrusion detection system (IDS) has become a fundamental component of organizations that prevents cybercriminal …
SS Dhaliwal, AA Nahid, R Abbas - Information, 2018 - mdpi.com
As the world is on the verge of venturing into fifth-generation communication technology and embracing concepts such as virtualization and cloudification, the most crucial aspect …
Flow-based data sets are necessary for evaluating network-based intrusion detection systems (NIDS). In this work, we propose a novel methodology for generating realistic flow …
With a plethora of new connections, features, and services introduced, the 5th generation (5G) wireless technology reflects the development of mobile communication networks and is …
W Zhong, N Yu, C Ai - Big Data Mining and Analytics, 2020 - ieeexplore.ieee.org
With vast amounts of data being generated daily and the ever increasing interconnectivity of the world's internet infrastructures, a machine learning based Intrusion Detection Systems …
In contrast to previous surveys, the present work is not focused on reviewing the datasets used in the network security field. The fact is that many of the available public labeled …
P Torres, C Catania, S Garcia… - 2016 IEEE biennial …, 2016 - ieeexplore.ieee.org
A Botnet can be conceived as a group of compromised computers which can be controlled remotely to execute coordinated attacks or commit fraudulent acts. The fact that Botnets keep …
K Gai, M Qiu, L Tao, Y Zhu - Security and communication …, 2016 - Wiley Online Library
Mobile cloud computing is applied in multiple industries to obtain cloud‐based services by leveraging mobile technologies. With the development of the wireless networks, defending …