An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection

MA Khan, N Iqbal, H Jamil, DH Kim - Journal of Network and Computer …, 2023 - Elsevier
Traditional ML based IDS cannot handle high-speed and ever-evolving attacks.
Furthermore, these traditional IDS face several common challenges, such as processing …

A lightweight IoT intrusion detection model based on improved BERT-of-Theseus

Z Wang, J Li, S Yang, X Luo, D Li… - Expert Systems with …, 2024 - Elsevier
The proliferation of Internet of Things (IoT) technology has resulted in an increase in security
vulnerabilities associated with the interconnectivity of IoT devices. As a result, there is a …

Scalable anomaly-based intrusion detection for secure Internet of Things using generative adversarial networks in fog environment

W Yao, H Shi, H Zhao - Journal of Network and Computer Applications, 2023 - Elsevier
The data generated exponentially by a massive number of devices in the Internet of Things
(IoT) are extremely high-dimensional, large-scale, non-labeled, which poses great …

A novel cyber security model using deep transfer learning

Ü Çavuşoğlu, D Akgun, S Hizal - Arabian Journal for Science and …, 2024 - Springer
Preventing attackers from interrupting or totally stopping critical services in cloud systems is
a vital and challenging task. Today, machine learning-based algorithms and models are …

IoT based smart home automation using blockchain and deep learning models

M Umer, S Sadiq, RM Alhebshi, MF Sabir… - PeerJ Computer …, 2023 - peerj.com
For the past few years, the concept of the smart house has gained popularity. The major
challenges concerning a smart home include data security, privacy issues, authentication …

Graph Anomaly Detection with Graph Convolutional Networks.

AA Mir, MF Zuhairi, SM Musa - International Journal of …, 2023 - search.ebscohost.com
Anomaly detection in network data is a critical task in various domains, and graph-based
approaches, particularly Graph Convolutional Networks (GCNs), have gained significant …

XAI Driven Intelligent IoMT Secure Data Management Framework

W Liu, F Zhao, L Nkenyereye, S Rani… - IEEE Journal of …, 2024 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) has transformed traditional healthcare systems by
enabling real-time monitoring, remote diagnostics, and data-driven treatment. However …

Hourly Network Anomaly Detection on HTTP Using Exponential Random Graph Models and Autoregressive Moving Average

R Li, M Tsikerdekis - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Network anomaly detection solutions can analyze a network's data volume by protocol over
time and can detect many kinds of cyberattacks such as exfiltration. We use exponential …

[HTML][HTML] Proactive computer network monitoring based on homogeneous deep neural ensemble

R Shikhaliyev, L Sukhostat - Results in Control and Optimization, 2023 - Elsevier
Computer networks are getting more complex these days. A computer network failure can
result in the loss of important data, disruption of network services and applications, and …

[PDF][PDF] Efficient and Secure IoT Based Smart Home Automation UsingMulti-Model Learning and Blockchain Technology.

N Alturki, R Alharthi, M Umer, O Saidani… - … in Engineering & …, 2024 - cdn.techscience.cn
The concept of smart houses has grown in prominence in recent years. Major challenges
linked to smart homes are identification theft, data safety, automated decision-making for IoT …