Towards artificial neural network based intrusion detection with enhanced hyperparameter tuning

AN Calugar, W Meng, H Zhang - GLOBECOM 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
Due to the development of complex communication paradigms and the rise in the number of
inter-connected digital devices, intrusion detection system (IDS) has become one basic and …

A multi-layer encryption with AES and Twofish encryption algorithm for smart assistant security

S Neelakandan, S Velmurugan, M Prakash… - Digital Image …, 2024 - taylorfrancis.com
By managing Internet of Things devices, smart home automation solutions enable
consumers to transform their homes into smart homes. Smartphone apps enable users to …

Enhancing challenge-based collaborative intrusion detection against insider attacks using spatial correlation

W Li, W Meng, J Parra-Arnau… - 2021 IEEE Conference …, 2021 - ieeexplore.ieee.org
With cyber-attacks becoming more complicated and the networks increasingly
interconnected, there has been a move towards using collaborative intrusion detection …

Collaborative fog computing architecture for privacy-preserving data aggregation

H Qusa, J Tarazi - 2021 IEEE World AI IoT Congress (AIIoT), 2021 - ieeexplore.ieee.org
The increased digitization of several critical infrastructure services on Internet like home
banking, online payments, etc. exposes them to a range of sophisticated information security …

Methods for applying of scheme of packet filtering rules

Y Bakhodir, N Nurbek, Z Odiljon - International Journal of Innovative …, 2019 - elibrary.ru
This article is devoted to research methods for applying of scheme of packet filtering rules.
The scheme of the Firewall is developed on corporate network to allow protect the network …

IDS intelligent configuration scheme against advanced adaptive attacks

Z Xia, J Tan, K Gu, X Li, W Jia - IEEE Transactions on Network …, 2020 - ieeexplore.ieee.org
Currently it becomes more difficult for a single intrusion detection system (IDS) to detect
complex attacks. Based on some cooperative intrusion detection mechanisms, multiple IDSs …

DVF-fog: distributed virtual firewall in fog computing based on risk analysis

F Kamoun-Abid, A Meddeb-Makhlouf… - … Journal of Sensor …, 2019 - inderscienceonline.com
To eliminate network saturation during data exchanges, fog computing is deployed as the
technology that benefits from both cloud computing and internet of things (IoT) paradigms …

Detecting Post Editing of Multimedia Images using Transfer Learning and Fine Tuning

S Jonker, M Jelstrup, W Meng, B Lampe - ACM Transactions on …, 2024 - dl.acm.org
In the domain of general image forgery detection, a myriad of different classification
solutions have been developed to distinguish a “tampered” image from a “pristine” image. In …

Towards securing challenge-based collaborative intrusion detection networks via message verification

W Li, W Meng, Y Wang, J Han, J Li - Information Security Practice and …, 2018 - Springer
With the increasing number of Internet-of-Things (IoT) devices, intrusion detection systems
(IDSs) have been widely deployed in a distributed or collaborative setting, in which a …

[PDF][PDF] Designing consensus algorithm for collaborative signature-based intrusion detection system

EA Winanto, MY Idris, D Stiawan… - Indones J. Electr. Eng …, 2021 - academia.edu
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the
reliability of nodes to provide IDS attack signatures. Each node in the network is responsible …