L Yi, M Yin, M Darbandi - Transactions on Emerging …, 2023 - Wiley Online Library
Fog computing has arisen to complement cloud computing, offering a cost‐effective architecture to power the Internet of things. Fog computing is a network computing and …
Internet of Medical Things (IoMT) is becoming ubiquitous with a proliferation of smart medical devices and applications used in smart hospitals, smart-home based care, and …
The growing use of the Internet with its vulnerabilities has necessitated the adoption of Intrusion Detection Systems (IDS) to assure security. IDSs are protective systems that detect …
Detecting intrusions from the supervisory control and data acquisition (SCADA) systems is one of the most essential and challenging processes in recent times. Most of the …
A Imanbayev, S Tynymbayev, R Odarchenko… - Sensors, 2022 - mdpi.com
The introduction of fifth generation mobile networks is underway all over the world which makes many people think about the security of the network from any hacking. Over the past …
AK Sangaiah, A Javadpour, P Pinto - Information Sciences, 2023 - Elsevier
Technology has enabled many devices to exchange huge amounts of data and communicate with each other as Edge Intelligence in Smart Cities (EISC), as a result of rapid …
Various machine learning algorithms have been applied to network intrusion classification problems, including both binary and multi-class classifications. Despite the existence of …
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as …
Intrusion Detection System (IDS) dataset is crucial to detect lateral movement of cyber- attacks. IDS dataset will help to train the IDS classifier model to achieve earliest detection. A …