MG Yaseen, AS Albahri - Mesopotamian Journal of Big Data, 2023 - mesopotamian.press
This study provides a comprehensive analysis of the dynamic amalgamation of intrusion detection and big data, revealing trends and patterns within cybersecurity research. The …
To enhance the universal adaptability of the Real-Time deployment of Industry 5.0, various machine learning-based cyber threat detection models are given in the literature. Most of the …
Z Zhang, S Kong, T Xiao, A Yang - Symmetry, 2024 - mdpi.com
The problems of asymmetry in information features and redundant features in datasets, and the asymmetry of network traffic distribution in the field of network intrusion detection, have …
I Salah, K Jouini, CA Pachon, O Korbaa - Cluster Computing, 2024 - Springer
Combating fake news is a crucial endeavor, yet the complexity of the task requires multifaceted approaches that transcend singular technological solutions. Traditional fact …
Traditional intrusion detection methods often fail to meet the unique security requirements of IoT applications, raising serious security concerns due to the rapid expansion of the Internet …
K Jouini, CA Pachon, O Korbaa - 2024 - researchsquare.com
Combating fake news is a crucial endeavor, yet the complexity of the task requires multifaceted approaches that transcend singular technological solutions. Traditional fact …