The rise of “malware”: Bibliometric analysis of malware study

MF Ab Razak, NB Anuar, R Salleh, A Firdaus - Journal of Network and …, 2016 - Elsevier
Malicious software (malware) is a computer program designed to create harmful and
undesirable effects. It considered as one of the many dangerous threats for Internet users …

IDERES: Intrusion detection and response system using machine learning and attack graphs

JR Rose, M Swann, KP Grammatikakis, I Koufos… - Journal of Systems …, 2022 - Elsevier
The rapid increase in the use of IoT devices brings many benefits to the digital society,
ranging from improved efficiency to higher productivity. However, the limited resources and …

A POMDP approach to the dynamic defense of large-scale cyber networks

E Miehling, M Rasouli… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
We investigate the problem of optimally mitigating the progression of an adversary through a
network in real-time, decreasing the probability of it reaching its goal (s), while minimizing …

A multi-layer classification approach for intrusion detection in iot networks based on deep learning

R Qaddoura, A M. Al-Zoubi, H Faris, I Almomani - Sensors, 2021 - mdpi.com
The security of IoT networks is an important concern to researchers and business owners,
which is taken into careful consideration due to its direct impact on the availability of the …

A network intrusion detection method based on stacked autoencoder and LSTM

Y Yan, L Qi, J Wang, Y Lin… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Nowadays, network intrusions have brought greater impact in a large scale. Intrusion
Detection Systems (IDS) have been a recent research hotspot for both the industry and the …

Adaptive clustering-based malicious traffic classification at the network edge

AF Diallo, P Patras - IEEE INFOCOM 2021-IEEE Conference …, 2021 - ieeexplore.ieee.org
The rapid uptake of digital services and Internet of Things (IoT) technology gives rise to
unprecedented numbers and diversification of cyber attacks, with which commonly-used rule …

A survey on game-theoretic approaches for intrusion detection and response optimization

C Kiennert, Z Ismail, H Debar, J Leneutre - ACM Computing Surveys …, 2018 - dl.acm.org
Intrusion Detection Systems (IDS) are key components for securing critical infrastructures,
capable of detecting malicious activities on networks or hosts. However, the efficiency of an …

Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection

P Parrend, J Navarro, F Guigou, A Deruyver… - EURASIP Journal on …, 2018 - Springer
Behind firewalls, more and more cybersecurity attacks are specifically targeted to the very
network where they are taking place. This review proposes a comprehensive framework for …

A novel anomaly-based intrusion detection model using psogwo-optimized bp neural network and ga-based feature selection

S Sheikhi, P Kostakos - Sensors, 2022 - mdpi.com
Intrusion detection systems (IDS) are crucial for network security because they enable
detection of and response to malicious traffic. However, as next-generation communications …

Source redundancy management and host intrusion detection in wireless sensor networks

V Singh, G Sharma, RC Poonia… - Recent Advances in …, 2021 - ingentaconnect.com
Background: Intrusion Detection System (IDS) is a Software application which gives the
facility to monitor the traffic of network, event or activities on network and finds out any …