[PDF][PDF] A survey of cyber security approaches for attack detection prediction and prevention

AE Ibor, FA Oladeji, OB Okunoye - International Journal of …, 2018 - researchgate.net
The expanding threat landscape has come with a plethora of consequences for most
organizations and individuals. This is witnessed in the high volume of cyber-attacks …

A review of machine learning solutions to denial-of-services attacks in wireless sensor networks

S Gunduz, B Arslan, M Demirci - 2015 IEEE 14th International …, 2015 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are used in various fields where remote data collection is
necessary, such as environment and habitat monitoring, military applications, smart homes …

Predicting optimum parameters of a protective spur dike using soft computing methodologies–A comparative study

H Basser, H Karami, S Shamshirband… - Computers & …, 2014 - Elsevier
This study proposes a new approach for determining the optimum parameters of a protective
spur dike to control scour around existing spur dikes. Several parameters of a protective …

Intrusion detection system in wireless sensor networks: A comprehensive review

S Duhan, P Khandnor - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
In today's era security is one of the main concern in every field also in wireless sensor
networks. Resource limitation is main concern of sensor nodes in wireless sensor networks …

A comprehensive review and meta-analysis on applications of machine learning techniques in intrusion detection

M Chattopadhyay, R Sen, S Gupta - Australasian Journal of …, 2018 - journal.acs.org.au
Securing a machine from various cyber-attacks has been of serious concern for researchers,
statutory bodies such as governments, business organizations and users in both wired and …

[Retracted] Temporal Logic‐Based Artificial Immune System for Intrusion Detection

X Chen, J Pang - Wireless Communications and Mobile …, 2022 - Wiley Online Library
Artificial immune system has made many contributions to network security areas, but there
are still problems of insufficient detection range and high time cost. This paper presents a …

An effective game theoretic static load balancing applied to distributed computing

H Siar, K Kiani, AT Chronopoulos - Cluster Computing, 2015 - Springer
In this paper an algorithm has been proposed to balance the loads in a distributed
computing system based on game theory which models the load balancing problem as a …

Ensemble learning mechanisms for threat detection: a survey

R Arul, RS Moorthy, AK Bashir - Machine Learning and Cognitive …, 2019 - igi-global.com
Technology evolution in the network security space has been through many dramatic
changes recently. Enhancements in the field of telecommunication systems invite fruitful …

A differential game model of intrusion detection system in cloud computing

Z Li, H Xu, Y Liu - International Journal of Distributed Sensor …, 2017 - journals.sagepub.com
The multi-mesh distributed and open structure of cloud computing is more weak and
vulnerable to security threats. Intrusion detection system should be incorporated in cloud …

Efficient Dynamic Framework to Secure MQTT to Detect Distributed DoS Using Meta-Empirical Clustering

V Thirupathi, K Sagar - … , Networking and IoT: Proceedings of 5th ICICC …, 2022 - Springer
The development of IoT plays a significant role for the development of new wireless
communication. As Message Queuing Telemetry Transport (MQTT) with certain constraints …