Y Zhou, G Cheng, S Jiang, M Dai - Computer networks, 2020 - Elsevier
Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in the protected systems …
Feature selection plays a vital role in building machine learning models. Irrelevant features in data affect the accuracy of the model and increase the training time needed to build the …
The salp swarm algorithm (SSA) is a well-known optimization algorithm that is increasingly being utilized to solve many sorts of optimization problems. However, SSA may converge to …
In the context of 6G technology, the Internet of Everything aims to create a vast network that connects both humans and devices across multiple dimensions. The integration of smart …
In the recent days all the digital devices including devices used in Healthcare, Personal Digital Assistance etc. are connected to the network, consequently data is exposed to …
D Protić, M Stanković, R Prodanović, I Vulić… - Electronics, 2023 - mdpi.com
Anomaly-based intrusion detection systems identify the computer network behavior which deviates from the statistical model of typical network behavior. Binary classifiers based on …
YK Saheed - Illumination of artificial intelligence in cybersecurity and …, 2022 - Springer
Network intrusion detection system are significant features that contribute to the enterprises and organization network success. In the past decade, Intrusion Detection system (IDS) …
J Wu, W Wang, L Huang, F Zhang - Applied Soft Computing, 2022 - Elsevier
Traditional network intrusion detection systems cannot identify new burgeoning invasive activities due to the inconspicuous features of malicious behaviors and the enormous …
The increased use of urban technologies in smart cities brings new challenges and issues. Cyber security has become increasingly important as many critical components of …