S Kumar, S Gupta, S Arora - Ieee Access, 2021 - ieeexplore.ieee.org
Network threats and hazards are evolving at a high-speed rate in recent years. Many mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as …
OH Abdulganiyu, T Ait Tchakoucht… - International journal of …, 2023 - Springer
With the recent increase in internet usage, the number of important, sensitive, confidential individual and corporate data passing through internet has increasingly grown. With gaps in …
The enormous increase in the use of the Internet in daily life has provided an opportunity for the intruder attempt to compromise the security principles of availability, confidentiality, and …
The World Wide Web has evolved from a system for serving an interconnected set of static documents to what is now a powerful, versatile, and large platform for application delivery …
The rapid growth of the Internet and communications has resulted in a huge increase in transmitted data. These data are coveted by attackers and they continuously create novel …
S Prasad, MV Srinath… - Indian Journal of …, 2015 - pdfs.semanticscholar.org
Organization's crucial data are highly endangered due to several security attacks and threats. Intrusion is one among such type of threat. Intrusions are efforts that attempt to elude …
M Bijone - American Journal of Information Systems, 2016 - academia.edu
With the growth of the Internet and its potential, more and more people are getting connected to the Internet every day to take advantage of the e-Commerce. On one side, the …
SU Khan, F Eusufzai, M Azharuddin Redwan… - … artificial intelligence for …, 2022 - Springer
Cybersecurity has become major progress in the digital era. Contraction is an important component of the cyber analysts' management of information technology, as several …
The identification of network attacks which target information and communication systems has been a focus of the research community for years. Network intrusion detection is a …