S Tareen, SU Bazai, S Ullah, R Ullah… - 2022 3rd …, 2022 - ieeexplore.ieee.org
The digital world is becoming increasingly interconnected and cyberattacks such as phishing are becoming more common. Fraudulent emails and bogus websites are used to …
Abstract Wireless Sensor Networks (WSN) offers an extensive array of possibilities and finds application to nearly every wake of human lifetime. Two of the methods are intrusion …
YP Tsang, CH Wu, N Dong - IEEE Transactions on Engineering …, 2023 - ieeexplore.ieee.org
Blockchain has facilitated the emergence of automation and decentralization concepts, leading to significant organizational and operational changes in businesses, eg …
The Android operating system, without showing signs of diminishing, has experienced unprecedented popularity and continues to thrive with a significant user base. Its notable …
The vulnerabilities of the Internet of Things (IoTs) in general and the Internet of Mobile Things (IoMTs) in particular motivate researchers to equip them with security systems …
L Yu, L Xu, X Jiang - Applied Sciences, 2023 - mdpi.com
The increasing prevalence of unknown-type attacks on the Internet highlights the importance of developing efficient intrusion detection systems. While machine learning-based …
J Saikam, K Ch - International Journal of Information Security, 2024 - Springer
Over the past ten years, there has been a significant increase in computer network intrusions, partly due to a thriving black market for cybercrime and the availability of …
D Manivannan - Journal of Network and Computer Applications, 2024 - Elsevier
The significant advancements in sensors and other resource-constrained devices, capable of collecting data and communicating wirelessly, are poised to revolutionize numerous …
S Bhaskara, SS Rathore - International Journal of Information Security, 2023 - Springer
Intrusion detection systems (IDSs) are employed at various levels in the network to either detect or prevent an intrusion that could cause irrecoverable data damage in IoT …