Multi-attribute decision-making for intrusion detection systems: A systematic review

A Alamleh, OS Albahri, AA Zaidan… - … Journal of Information …, 2023 - World Scientific
Intrusion detection systems (IDSs) employ sophisticated security techniques to detect
malicious activities on hosts and/or networks. IDSs have been utilized to ensure the security …

M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning

AV Turukmane, R Devendiran - Computers & Security, 2024 - Elsevier
The intrusions are increasing daily, so there is a huge amount of privacy violations, financial
loss, illegal transferring of information, etc. Various forms of intrusion occur in networks, such …

[PDF][PDF] Cyber security analysis and evaluation for intrusion detection systems

YB Abushark, AI Khan, F Alsolami… - Comput. Mater …, 2022 - cdn.techscience.cn
Machine learning is a technique that is widely employed in both the academic and industrial
sectors all over the world. Machine learning algorithms that are intuitive can analyse risks …

Efficiency evaluation of cyber security based on EBM-DEA model

C Wang, F Yang, TMN Vo - The Eurasia Proceedings of Science …, 2022 - epstem.net
Cyber security aims to protect against the unlawful use of systems, networks, and
technologies by lowering the likelihood of cyberattacks and thwarting their execution. The …

Intelligent system for data protection in higher education institutions: A systematic review

VG Rodriguez-Ahuanari… - … on Smart Internet of …, 2022 - ieeexplore.ieee.org
The study aimed to know how the smart system improves data protection in higher education
institutions through a systematic review between the years 2017 to 2022. It allowed …

An optimization model for appraising intrusion-detection systems for network security communications: Applications, challenges, and solutions

M Abdel-Basset, A Gamal, KM Sallam, I Elgendi… - Sensors, 2022 - mdpi.com
Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of
intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The …

Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS

W Alhakami - Plos one, 2024 - journals.plos.org
The persistent evolution of cyber threats has given rise to Gen V Multi-Vector Attacks,
complex and sophisticated strategies that challenge traditional security measures. This …

[PDF][PDF] REVS: A Vulnerability Ranking Tool for Enterprise Security.

I Forain, R de Oliveira Albuquerque… - ICEIS (2), 2022 - ppee.unb.br
Information security incidents currently affect organizations worldwide. In 2021, thousands of
companies suffered cyber attacks, resulting in billions of dollars in losses. Most of these …

Cyber Security Criteria: Fuzzy AHP approach

D Simjanović, N Vesić, B Ranđelović… - 2023 - researchrepository.mi.sanu.ac.rs
One of the main Cyber security's task is to ensure the real time protection of information and
networks. In the last decade the number of cyber security attacks and its frequency has …

Intelligent Systems for Cyber Defence-An Architecture Framework for Cyber Defence Using Artificial Intelligence

PCPO Trilho - 2022 - search.proquest.com
One of the biggest concerns with the internet activity nowadays has to do with the increase
of cybercrime. Cybercrime is one of the biggest threats for every organization in the world …