[HTML][HTML] The comparison of cybersecurity datasets

A Alshaibi, M Al-Ani, A Al-Azzawi, A Konev… - Data, 2022 - mdpi.com
Almost all industrial internet of things (IIoT) attacks happen at the data transmission layer
according to a majority of the sources. In IIoT, different machine learning (ML) and deep …

A deep learning approach for intrusion detection in Internet of Things using focal loss function

AS Dina, AB Siddique, D Manivannan - Internet of Things, 2023 - Elsevier
Abstract Internet of Things (IoT) is likely to revolutionize healthcare, energy, education,
transportation, manufacturing, military, agriculture, and other industries. However, for the …

A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities

KS Gill, A Sharma, S Saxena - Archives of Computational Methods in …, 2024 - Springer
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …

[PDF][PDF] An intrusion detection system for sdn using machine learning

G Logeswari, S Bose, T Anitha - Intelligent Automation & …, 2023 - pdfs.semanticscholar.org
Software Defined Networking (SDN) has emerged as a promising and exciting option for the
future growth of the internet. SDN has increased the flexibility and transparency of the …

Energy consumption of on-device machine learning models for IoT intrusion detection

N Tekin, A Acar, A Aris, AS Uluagac, VC Gungor - Internet of Things, 2023 - Elsevier
Abstract Recently, Smart Home Systems (SHSs) have gained enormous popularity with the
rapid development of the Internet of Things (IoT) technologies. Besides offering many …

Effect of balancing data using synthetic data on the performance of machine learning classifiers for intrusion detection in computer networks

AS Dina, AB Siddique, D Manivannan - IEEE Access, 2022 - ieeexplore.ieee.org
Attacks on computer networks have increased significantly in recent days, due in part to the
availability of sophisticated tools for launching such attacks as well as the thriving …

Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures

IA Kandhro, SM Alanazi, F Ali, A Kehar, K Fatima… - IEEE …, 2023 - ieeexplore.ieee.org
Computer viruses, malicious, and other hostile attacks can affect a computer network.
Intrusion detection is a key component of network security as an active defence technology …

A Deep Learning‐Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks

M Naveed, F Arif, SM Usman, A Anwar… - Wireless …, 2022 - Wiley Online Library
An intrusion detection system, often known as an IDS, is extremely important for preventing
attacks on a network, violating network policies, and gaining unauthorized access to a …

Analysis of cutting-edge technologies for enterprise information system and management

BB Gupta, A Gaurav, PK Panigrahi… - Enterprise Information …, 2023 - Taylor & Francis
In the digital age, businesses collect vast amounts of data, but often lack the knowledge and
tools to fully utilize it. This paper analyzes current information management practices across …

[HTML][HTML] AdStop: Efficient flow-based mobile adware detection using machine learning

MM Alani, AI Awad - Computers & Security, 2022 - Elsevier
In recent years, mobile devices have become commonly used not only for voice
communications but also to play a major role in our daily activities. Accordingly, the number …