Intrusion detection system for CubeSats: a survey

O Driouch, S Bah, Z Guennoun - 2023 International Wireless …, 2023 - ieeexplore.ieee.org
The impressive growth in the number of CubeSats projects carried out over the past decade
gives rise to a new segment in the space industry. Whether academic, military or …

Assessing the Impact of a Supervised Classification Filter on Flow-based Hybrid Network Anomaly Detection

D Macko, P Goldschmidt, P Pištek, D Chudá - arXiv preprint arXiv …, 2023 - arxiv.org
Constant evolution and the emergence of new cyberattacks require the development of
advanced techniques for defense. This paper aims to measure the impact of a supervised …

[PDF][PDF] A Comprehensive Review of Dimensionality Reduction Techniques for Real-time Network Intrusion Detection with Applications in Cybersecurity.

R Gondhalekar, R Chattamvelli - Defence Science Journal, 2024 - researchgate.net
This paper reviews popular signature and anomaly-based intrusion detection systems (IDS).
Dimensionality reduction techniques (DRT) are used to increase the efficiency of such …

Intrusion Detection Using Artificial Intelligence Techniques

ZH Salim, SO Hasoon - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
The rising frequency of cyberattacks emphasizes the vital necessity for resilient Intrusion
Detection Systems (IDS) to safeguard computer networks, focusing on the application of …

[PDF][PDF] Anomaly Detection in Graphs for Knowledge Discovery and Data Quality Enhancement

A Senaratne - 2024 - researchgate.net
Anomaly detection is the process of discovering unusual or rare patterns in data that are
significantly different from the rest of the observations in a dataset. The importance of the …

THE ADJUSTED HISTOGRAM-BASED OUTLIER SCORE-AHBOS

U Binzat, E Yıldıztepe - Mugla Journal of Science and Technology, 2023 - dergipark.org.tr
Histogram is a commonly used tool for visualizing data distribution. It has also been used in
semi-supervised and unsupervised anomaly detection tasks. The histogram-based outlier …

UAD-DPN: An Unknown Attack Detection Method for Encrypted Traffic Based on Deep Prototype Network

C Liangchen, GAO Shu, LIU Baoxu, Z JIANG… - 2023 - researchsquare.com
Intrusion detection systems (IDS) are well-known means of quickly detecting attacks, which
can effectively detect known attacks available during training. However, when the system …

Comparing Boosting and Bagging Algorithms for Image Classification

C Chaudhary, A Gupta… - … on Optimization Computing …, 2024 - ieeexplore.ieee.org
Boosting and bagging are famous ensembles gaining knowledge of algorithms for photo
classes. Each algorithm depends upon combining a couple of classifiers to enhance …

Machine Learning per Intrusion Detection in IoT: Una Recensione dello Stato dell'Arte

M ANTONUTTI - thesis.unipd.it
L'internet of things (IoT) è un campo tecnologico in rapida crescita, con applicazioni in settori
come la domotica, l'agricoltura, l'automazione industriale, la sanità e molti altri ancora …

[PDF][PDF] Impact Assessment of Artificial Intelligence on Cybersecurity: A Review of the Existing Literature

S Vaid - publication.iift.ac.in
ARTIFICIAL Intelligence (AI) has significantly evolved, reshaping the technological
landscape. Since its conceptualization in the mid-20th century, AI has grown from being a …