OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems

SSN Chintapalli, SP Singh, J Frnda, PB Divakarachari… - Heliyon, 2024 - cell.com
Abstract Currently, the Internet of Things (IoT) generates a huge amount of traffic data in
communication and information technology. The diversification and integration of IoT …

GSOOA-1DDRSN: Network traffic anomaly detection based on deep residual shrinkage networks

F Zuo, D Zhang, L Li, Q He, J Deng - Heliyon, 2024 - cell.com
One of the critical technologies to ensure cyberspace security is network traffic anomaly
detection, which detects malicious attacks by analyzing and identifying network traffic …

Innovative IoT Threat Detection: Weighted Variational Autoencoder-Based Hunter Prey Search Algorithm for Strengthening Cybersecurity

S Alshmrany - IETE Journal of Research, 2024 - Taylor & Francis
Cybersecurity threat detection in the Internet of Things (IoT) identifies and mitigates risks
associated with connected devices. The IoT devices are vulnerable to attacks as they do not …

The Effectiveness of a Comprehensive threat Mitigation Framework in NETWORKING: A Multi-Layered Approach to Cyber Security

H Balisane, E Egho-Promise, E Lyada… - … Research Journal of …, 2024 - clok.uclan.ac.uk
The rapidly evolving landscape of cyber threats necessitates robust and adaptable
strategies to safeguard networking. This study explores the development and evaluation of a …

TOWARDS IMPROVED THREAT MITIGATION IN DIGITAL ENVIRONMENTS: A COMPREHENSIVE FRAMEWORK FOR CYBERSECURITY ENHANCEMENT

H Balisane, EI Egho-Promise, E Lyada… - International Journal of …, 2024 - clok.uclan.ac.uk
In today's digital landscape, cybersecurity has become a critical concern due to the
increasing sophistication of cyber threats. Traditional cybersecurity measures are often …

Data Security and Privacy Concerns in Drone Operations

SR Sindiramutty, NZ Jhanjhi, CE Tan… - … Issues and Challenges …, 2024 - igi-global.com
The widespread use of drones across various industries is leading to significant
transformations. However, the resulting concerns about data security and privacy are quite …

[PDF][PDF] Intrusion detection system in cloud computing by utilizing VTR-HLSTM based on deep learning

VW Thirumaran, N Joseph… - Indonesian Journal of …, 2024 - pdfs.semanticscholar.org
Cloud computing (CC) is a rapidly developing IT approach with intrusion detection system
being a crucial tool for safeguarding virtual networks and machines from potential threats …