Towards data security assessments using an IDS security model for cyber-physical smart cities

AK Sangaiah, A Javadpour, P Pinto - Information Sciences, 2023 - Elsevier
Technology has enabled many devices to exchange huge amounts of data and
communicate with each other as Edge Intelligence in Smart Cities (EISC), as a result of rapid …

[PDF][PDF] A fusion of feature extraction and feature selection technique for network intrusion detection

Y Hamid, M Sugumaran, L Journaux - International Journal of …, 2016 - academia.edu
With varied and widespread attacks on information systems, intrusion detection systems
(IDS) have become an indispensable part of security policy for protecting data. IDS monitor …

An intelligent tree-based intrusion detection model for cyber security

M Al-Omari, M Rawashdeh, F Qutaishat… - Journal of Network and …, 2021 - Springer
The widespread use of the Internet of Things and distributed heterogeneous devices has
shed light on the implementation of efficient and reliable intrusion detection systems. These …

Building an effective approach toward intrusion detection using ensemble feature selection

AK Shukla, P Singh - International Journal of Information Security and …, 2019 - igi-global.com
The duplicate and insignificant features present in the data set to cause a long-term problem
in the classification of network or web traffic. The insignificant features not only decrease the …

An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods

M Alkasassbeh - arXiv preprint arXiv:1712.09623, 2017 - arxiv.org
Despite the great developments in information technology, particularly the Internet, computer
networks, global information exchange, and its positive impact in all areas of daily life, it has …

A multi-level correlation-based feature selection for intrusion detection

M Prasad, RK Gupta, S Tripathi - Arabian Journal for Science and …, 2022 - Springer
Intrusions (or threats) have been considerably increased due to the rapid growth in Internet
and network technologies. Nowadays, the world is moving more toward a digital world in this …

An integrated intrusion detection system using correlation‐based attribute selection and artificial neural network

I Sumaiya Thaseen, J Saira Banu… - Transactions on …, 2021 - Wiley Online Library
Serious concerns regarding vulnerability and security have been raised as a result of the
constant growth of computer networks. Intrusion detection systems (IDS) have been adopted …

A novel network security algorithm based on improved support vector machine from smart city perspective

X Zou, J Cao, Q Guo, T Wen - Computers & Electrical Engineering, 2018 - Elsevier
Computer generated security concerns have become more modern and complex. Intrusion
detection (ID) is a practical issue in the field of computer security whose primary objective is …

Decision tree with Pearson correlation-based recursive feature elimination model for attack detection in IoT environment

A Padmashree, M Krishnamoorthi - Information Technology and Control, 2022 - itc.ktu.lt
The industrial revolution in recent years made massive uses of Internet of Things (IoT)
applications like smart cities' growth. This leads to automation in real-time applications to …

Analyzing the impact of cyber security related attributes for intrusion detection systems

A Alharbi, AH Seh, W Alosaimi, H Alyami, A Agrawal… - Sustainability, 2021 - mdpi.com
Machine learning (ML) is one of the dominating technologies practiced in both the industrial
and academic domains throughout the world. ML algorithms can examine the threats and …