Intrusion detection using machine learning for risk mitigation in IoT‐enabled smart irrigation in smart farming

A Raghuvanshi, UK Singh, GS Sajja… - Journal of Food …, 2022 - Wiley Online Library
The majority of countries rely largely on agriculture for employment. Irrigation accounts for a
sizable amount of water use. Crop irrigation is an important step in crop yield prediction …

A novel intrusion detection model for a massive network using convolutional neural networks

K Wu, Z Chen, W Li - Ieee Access, 2018 - ieeexplore.ieee.org
More and more network traffic data have brought great challenge to traditional intrusion
detection system. The detection performance is tightly related to selected features and …

[PDF][PDF] A fuzzy logic based defense mechanism against distributed denial of service attack in cloud computing environment

NCSN Iyengar, A Banerjee… - International journal of …, 2014 - researchgate.net
Cloud defines a new age of computing solution that provides services to customers with its
unique features of agility and multi-tenancy. As the critical resources are hosted at cloud …

A fuzzy logic-based method to avert intrusions in wireless sensor networks using WSN-DS dataset

N Singh, D Virmani, XZ Gao - International Journal of Computational …, 2020 - World Scientific
Intrusion is one of the biggest problems in wireless sensor networks. Because of the
evolution in wired and wireless mechanization, various archetypes are used for …

Explainable AI for Cybersecurity

SR Sindiramutty, CE Tan, SP Lau… - … in Explainable AI …, 2024 - igi-global.com
In recent years, the utilization of AI in the field of cybersecurity has become more
widespread. Black-box AI models pose a significant challenge in terms of interpretability and …

A network intrusion detection approach using variant of convolution neural network

AK Verma, P Kaushik… - … on Communication and …, 2019 - ieeexplore.ieee.org
Intrusion detection system (IDS) is a preventing measure against different harmful cyber-
attacks. It has a key role in securing our information and communication technology system …

[PDF][PDF] A new intrusion detection system based on soft computing techniques using neuro-fuzzy classifier for packet dropping attack in manets

A Chaudhary, VN Tiwari, A Kumar - International Journal of …, 2016 - ijns.jalaxy.com.tw
Due to the advancement in communication technologies, mobile ad hoc networks are very
attractive in terms of communication because mobile nodes can communicate without the …

Various Soft Computing Based Techniques for Developing Intrusion Detection Management System

GS Sajjaa, H Pallathadka, M Naved… - ECS …, 2022 - iopscience.iop.org
Protecting networks and data requires an effective Intrusion Detection System (IDS).
Contextual knowledge processing may be used to identify attacks that are specific to certain …

[PDF][PDF] Performance evaluation of j48 and bayes algorithms for intrusion detection system

U Bashir, M Chachoo - International Journal of Network Security & Its …, 2017 - academia.edu
Recent advances in the field of Artificial Intelligence has urged many security experts to
follow this novel area. Extensive work has already been done, and much more efforts are …

Identification and analysis of log4j vulnerability

H Gupta, A Chaudhary, A Kumar - 2022 11th International …, 2022 - ieeexplore.ieee.org
Java is still regarded as one of the most powerful programming languages available,
because of its security and platform independence. It's hard to manage logs manually so to …