[HTML][HTML] Classification and comparison of ad hoc networks: A review

R Agrawal, N Faujdar, CAT Romero, O Sharma… - Egyptian Informatics …, 2023 - Elsevier
The study of ad hoc networks and their different varieties, including wireless sensor
networks, wireless mesh networks, and mobile ad hoc networks, is discussed in this paper …

lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning

C Hazman, A Guezzaz, S Benkirane, M Azrour - Cluster Computing, 2023 - Springer
Smart cities are being enabled all around the world by Internet of Things (IoT) applications.
A smart city idea necessitates the integration of information and communication …

Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures

IA Kandhro, SM Alanazi, F Ali, A Kehar, K Fatima… - IEEE …, 2023 - ieeexplore.ieee.org
Computer viruses, malicious, and other hostile attacks can affect a computer network.
Intrusion detection is a key component of network security as an active defence technology …

Defending the digital Frontier: IDPS and the battle against Cyber threat

H Azam, MI Dulloo, MH Majeed, JPH Wan, LT Xin… - 2023 - preprints.org
The ever-evolving landscape of technology continually drives the demand for more robust
and secure systems. Intrusion Detection and Prevention Systems (IPS) play a pivotal role in …

MCAD: a machine learning based cyberattacks detector in software-defined networking (SDN) for healthcare systems

LM Halman, MJF Alenazi - IEEE Access, 2023 - ieeexplore.ieee.org
The healthcare sector deals with sensitive and significant data that must be protected
against illegitimate users. Software-defined networks (SDNs) are widely used in healthcare …

A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications

Y Kumar, V Kumar - Wireless Personal Communications, 2023 - Springer
The significance of wireless networks is expanding very rapidly, and their increasing
pervasiveness makes them a vital component of the activities involved in living in the …

Risk Management and Cybersecurity in Transportation and Warehousing

A Khan, NZ Jhanjhi, HAHBH Omar… - … Measures for Logistics …, 2024 - igi-global.com
Transportation and warehousing are vital components of logistics corporations. Their
continuous uninterrupted functioning is of paramount significance for the enterprises …

Detecting cyber threats with a Graph-Based NIDPS

BOT Wen, N Syahriza, NCW Xian, NG Wei… - … Measures for Logistics …, 2024 - igi-global.com
This chapter explores the topic of a novel network-based intrusion detection system (NIDPS)
that utilises the concept of graph theory to detect and prevent incoming threats. With …

Heterogeneous Data-Aware Federated Learning for Intrusion Detection Systems via Meta-sampling in Artificial Intelligence of Things

W Han, J Peng, J Yu, J Kang, J Lu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) integrated with machine learning (ML) techniques have
proven to be effective defenses against the increasing cybersecurity attacks in the Artificial …

Explainable AI for Cybersecurity

SR Sindiramutty, CE Tan, SP Lau… - … in Explainable AI …, 2024 - igi-global.com
In recent years, the utilization of AI in the field of cybersecurity has become more
widespread. Black-box AI models pose a significant challenge in terms of interpretability and …