Intrusion detection system (IDS) has been developed to protect the resources in the network from different types of threats. Existing IDS methods can be classified as either anomaly …
SM Kasongo - IEEE Access, 2021 - ieeexplore.ieee.org
The evolution of the Internet and cloud-based technologies have empowered several organizations with the capacity to implement large-scale Internet of Things (IoT)-based …
N Moustafa, J Slay, G Creech - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
The prevalence of interconnected appliances and ubiquitous computing face serious threats from the hostile activities of network attackers. Conventional Intrusion Detection Systems …
Currently, expert systems and applied machine learning algorithms are widely used to automate network intrusion detection. In critical infrastructure applications of communication …
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic increase of network data and placed a high computation complexity across various …
N Yadav, S Pande, A Khamparia… - … and Mobile Computing, 2022 - Wiley Online Library
The Internet of Things (IoT) cyberattacks of fully integrated servers, applications, and communications networks are increasing at exponential speed. As problems caused by the …
M Belouch, S El Hadaj, M Idhammad - Procedia Computer Science, 2018 - Elsevier
Nowadays, network intrusion is considered as one of the major concerns in network communications. Thus, the developed network intrusion detection systems aim to identify …
Cyber-attacks and unauthorized application usage have increased due to the extensive use of Internet services and applications over computer networks, posing a threat to the service's …
A Guezzaz, S Benkirane, M Azrour… - Security and …, 2021 - Wiley Online Library
Due to the recent advancements in the Internet of things (IoT) and cloud computing technologies and growing number of devices connected to the Internet, the security and …