Intrusion Detection for Marine Meteorological Sensor Network

X Su, G Zhang, M Zhang, B Ye… - 2022 IEEE Intl Conf on …, 2022 - ieeexplore.ieee.org
The rapid development of intelligent devices and wireless communication has greatly
promoted the intelligence of the maritime Internet of Things (MIoT) in recent years, and the …

Rekayasa Fitur Berbasis Machine Learning untuk Mendeteksi Serangan DDoS

MN Faiz, O Somantri… - Jurnal Nasional Teknik …, 2022 - journal.ugm.ac.id
Distributed network attacks, also known as distributed denial of service (DDoS) are a major
threat and problem for internet security. DDoS is an attack on a network aiming to disable …

Deep Convolutional Neural Network for Active Intrusion Detection and Protect data from Passive Intrusion by Pascal Triangle

AS Alqahtani - Wireless Personal Communications, 2024 - Springer
Active and passive intrusion are the two types of intrusion. The active intrusion attempts to
modify the data and the passive intrusion observes the data and replica. This intrusion …

New principles of finding and removing elements of mathematical model for reducing computational and time complexity

Y Matviychuk, N Kryvinska… - … Journal of Grid …, 2023 - inderscienceonline.com
The original principle of removing elements of a mathematical model based on its
parametric identification of neural network is proposed in the paper. The essence of …

[PDF][PDF] Machine learning-based feature engineering to detect ddos attacks

MN Faiz, O Somantri… - Jurnal Nasional Teknik …, 2022 - scholar.archive.org
Distributed network attacks, also known as distributed denial of service (DDoS) are a major
threat and problem for internet security. DDoS is an attack on a network aiming to disable …

Pattern Augmented Lightweight Convolutional Neural Network for Intrusion Detection System

YE Tadesse, YJ Choi - Electronics, 2024 - mdpi.com
As the world increasingly becomes more interconnected, the demand for safety and security
is ever-increasing, particularly for industrial networks. This has prompted numerous …

Leveraging feature subset selection with deer hunting optimizer based deep learning for anomaly detection in secure cloud environment

VS Bai, M Punithavalli - Multimedia Tools and Applications, 2024 - Springer
Cloud computing (CC) was extremely implemented by the application service providers
(ASP) and enterprises for reducing either operational or capital expenditures. Services and …

DeepRoughNetID: A Robust Framework for Network Anomaly Intrusion Detection with High Detection Rates

M Nalini, B Yamini, P Sinthia - IETE Journal of Research, 2024 - Taylor & Francis
Network security faces challenges, including reduced true positives, increased false
positives, and inadequate anomaly detection efficacy. This paper introduces the …

Intrusion Detection Techniques in Internet of Things: A Bird's Eye View

M Gautam, S Ahuja, A Kumar - 2024 11th International …, 2024 - ieeexplore.ieee.org
With many gaps and shortcomings in the field of IoT security, no matter how simple you think
it is on your side what goes inside an intrusion detection system technique to detect attacks …

A survey on 802.11 MAC industrial standards, architecture, supporting emergency traffic and security: Future directions

SK Memon, M Hanafi Ahmad Hijazi, K Nisar… - Journal of Industrial …, 2022 - ray.yorksj.ac.uk
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …