AI-based modeling: techniques, applications and research issues towards automation, intelligent and smart systems

IH Sarker - SN Computer Science, 2022 - Springer
Artificial intelligence (AI) is a leading technology of the current age of the Fourth Industrial
Revolution (Industry 4.0 or 4IR), with the capability of incorporating human behavior and …

Intrusion detection and prevention in fog based IoT environments: A systematic literature review

CA de Souza, CB Westphall, RB Machado, L Loffi… - Computer Networks, 2022 - Elsevier
Abstract Currently, the Internet of Things is spreading in all areas that apply computing
resources. An important ally of the IoT is fog computing. It extends cloud computing and …

Optimized machine learning-based intrusion detection system for fog and edge computing environment

OA Alzubi, JA Alzubi, M Alazab, A Alrabea, A Awajan… - Electronics, 2022 - mdpi.com
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the
cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited …

Fractionation of dyes/salts using loose nanofiltration membranes: Insight from machine learning prediction

N Baig, J Usman, SI Abba, M Benaafi… - Journal of Cleaner …, 2023 - Elsevier
Wastewater (WW) served as the crucial indicator for sustainable development, human
health, and the ecosystem. Nanofiltration (NF) membranes are efficient in contaminants, dye …

[HTML][HTML] An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection

IH Hassan, M Abdullahi, MM Aliyu, SA Yusuf… - Intelligent Systems with …, 2022 - Elsevier
The growth within the Internet and communications areas have led to a massive surge in the
dimension of network and data. Consequently, several new threats are being created and …

A systematic literature review for network intrusion detection system (IDS)

OH Abdulganiyu, T Ait Tchakoucht… - International Journal of …, 2023 - Springer
With the recent increase in internet usage, the number of important, sensitive, confidential
individual and corporate data passing through internet has increasingly grown. With gaps in …

Multi‐aspects AI‐based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview

IH Sarker - Security and Privacy, 2023 - Wiley Online Library
Due to the rising dependency on digital technology, cybersecurity has emerged as a more
prominent field of research and application that typically focuses on securing devices …

Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment

A Binbusayyis - Expert Systems with Applications, 2024 - Elsevier
Fog computing (FC) extends cloud technology by providing services, storage, and network
interaction between data centers and end devices. By putting storage and processing closer …

Hyper clustering model for dynamic network intrusion detection

AS Alfoudi, MR Aziz, ZAA Alyasseri… - IET …, 2022 - Wiley Online Library
Abstract Generally, the existing Intrusion Detection Systems (IDS) solutions suffer from low
detection accuracy for some attack types compared with the overall detection accuracy of …

Stacking ensemble approach for DDoS attack detection in software-defined cyber–physical systems

R Mall, K Abhishek, S Manimurugan, A Shankar… - Computers and …, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks are common and increasing in
frequency. It renders the service inaccessible to legitimate users and degrades network …