[HTML][HTML] An analysis of artificial intelligence techniques in surveillance video anomaly detection: A comprehensive survey

E Şengönül, R Samet, Q Abu Al-Haija, A Alqahtani… - Applied Sciences, 2023 - mdpi.com
Surveillance cameras have recently been utilized to provide physical security services
globally in diverse private and public spaces. The number of cameras has been increasing …

Analysis of Extreme Learning Machines (ELMs) for intelligent intrusion detection systems: A survey

QA Al-Haija, S Altamimi, M AlWadi - Expert Systems with Applications, 2024 - Elsevier
The ever-increasing interconnectedness of our world, fueled by technological
advancements across industries, has made network security a paramount concern. This …

[HTML][HTML] Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree

S Dalal, UK Lilhore, N Faujdar, S Simaiya… - Journal of Cloud …, 2023 - Springer
Billions of gadgets are already online, making the IoT an essential aspect of daily life.
However, the interconnected nature of IoT devices also leaves them open to cyber threats …

[HTML][HTML] Deep Neural Decision Forest (DNDF): A Novel Approach for Enhancing Intrusion Detection Systems in Network Traffic Analysis

FS Alrayes, M Zakariah, M Driss, W Boulila - Sensors, 2023 - mdpi.com
Intrusion detection systems, also known as IDSs, are widely regarded as one of the most
essential components of an organization's network security. This is because IDSs serve as …

[HTML][HTML] Multimodel Collaboration to Combat Malicious Domain Fluxing

Y Nie, S Liu, C Qian, C Deng, X Li, Z Wang, X Kuang - Electronics, 2023 - mdpi.com
This paper proposes a novel domain-generation-algorithm detection framework based on
statistical learning that integrates the detection capabilities of multiple heterogeneous …

AdamW+: Machine Learning Framework to Detect Domain Generation Algorithms for Malware

A Javed, I Rashid, S Tahir, S Saeed… - IEEE …, 2024 - ieeexplore.ieee.org
Advanced Persistent Threats commonly use Domain Generation Algorithms to evade
advanced detection methods to establish communication with their command and control …

A systematic review: Detecting phishing websites using data mining models

D Jibat, S Jamjoom, QA Al-Haija… - Intelligent and …, 2023 - ieeexplore.ieee.org
As internet technology use is on the rise globally, phishing constitutes a considerable share
of the threats that may attack individuals and organizations, leading to significant losses from …

Investigating the Practicality of DNS-Based Authentication for Securing Wireless Networks

OS Kulkarni, J Khurana, GN Mamatha… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
The security of Wi-Fi networks is a crucial situation for community directors. DNS-based total
authentication is frequently mentioned as an opportunity for traditional username and …

Analyzing and Developing the Security of DNS-Based Authentication in Wireless Sensor Network

UC Sharma, JRR Kumar, M Kumari… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
Analyzing and developing the safety of DNS-based total Authentication in Wireless Sensor
Networks (WSNs) is a critical research vicinity that is being actively pursued. While …

An Investigation into the Effectiveness of DNS-Based Authentication for Wireless Networks

A Katyal, R Pandian, R Sharma… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
the security of Wi-Fi networks is turning into an increasing number, significant with the
growth of Wi-Fi technology. To prevent malicious entities from connecting to the network …