Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives

D Javaheri, S Gorgin, JA Lee, M Masdari - Information Sciences, 2023 - Elsevier
Nowadays, cybersecurity challenges and their ever-growing complexity are the main
concerns for various information technology-driven organizations and companies. Although …

A survey on data-driven network intrusion detection

D Chou, M Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …

Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection

M Tubishat, N Idris, L Shuib, MAM Abushariah… - Expert Systems with …, 2020 - Elsevier
Many fields such as data science, data mining suffered from the rapid growth of data volume
and high data dimensionality. The main problems which are faced by these fields include …

An improved deep reinforcement learning routing technique for collision-free VANET

P Upadhyay, V Marriboina, SJ Goyal, S Kumar… - Scientific Reports, 2023 - nature.com
Abstract Vehicular Adhoc Networks (VANETs) is an emerging field that employs a wireless
local area network (WLAN) characterized by an ad-hoc topology. Vehicular Ad Hoc …

Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges

S Pundir, M Wazid, DP Singh, AK Das… - IEEE …, 2019 - ieeexplore.ieee.org
As we all know that the technology is projected to be next to humans very soon because of
its holistic growth. Now-a-days, we see a lot of applications that are making our lives …

A survey and taxonomy of the fuzzy signature-based intrusion detection systems

M Masdari, H Khezri - Applied Soft Computing, 2020 - Elsevier
Organizations that benefit from information technologies are vulnerable to various attacks
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …

A systematic review of quality of service in wireless sensor networks using machine learning: Recent trend and future vision

M Pundir, JK Sandhu - Journal of Network and Computer Applications, 2021 - Elsevier
Abstract Wireless Sensor Network (WSN) is used in different research areas such as military,
industry, healthcare, agriculture, Internet of Things (IoT), transportation, and smart cities. The …

Chaotic binary group search optimizer for feature selection

L Abualigah, A Diabat - Expert Systems with Applications, 2022 - Elsevier
Feature selection (FS) is recognized as one of the majority public and challenging problems
in the Machine Learning domain. FS can be examined as an optimization problem that …

A review of cyber-ranges and test-beds: Current and future trends

E Ukwandu, MAB Farah, H Hindy, D Brosset… - Sensors, 2020 - mdpi.com
Cyber situational awareness has been proven to be of value in forming a comprehensive
understanding of threats and vulnerabilities within organisations, as the degree of exposure …

Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap

M Wazid, AK Das, S Shetty, P Gope… - IEEE …, 2020 - ieeexplore.ieee.org
5G mobile communication systems promote the mobile network to not only interconnect
people, but also interconnect and control the machine and other devices. 5G-enabled …