A review of rule learning-based intrusion detection systems and their prospects in smart grids

Q Liu, V Hagenmeyer, HB Keller - IEEE Access, 2021 - ieeexplore.ieee.org
Intrusion detection systems (IDS) are commonly categorized into misuse based, anomaly
based and specification based IDS. Both misuse based IDS and anomaly based IDS are …

Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection

H Zhang, JL Li, XM Liu, C Dong - Future Generation Computer Systems, 2021 - Elsevier
A robust network intrusion detection system (NIDS) plays an important role in cyberspace
security for protecting confidential systems from potential threats. In real world network, there …

A review on type-2 fuzzy neural networks for system identification

J Tavoosi, A Mohammadzadeh, K Jermsittiparsert - Soft computing, 2021 - Springer
In many engineering problems, the systems dynamics are uncertain, and then, the accurate
dynamic modeling is required. Type-2 fuzzy neural networks (T2F-NNs) are extensively …

A spectrogram image-based network anomaly detection system using deep convolutional neural network

AS Khan, Z Ahmad, J Abdullah, F Ahmad - IEEE access, 2021 - ieeexplore.ieee.org
The dynamics of computer networks have changed rapidly over the past few years due to a
tremendous increase in the volume of the connected devices and the corresponding …

A Gaussian process regression approach to predict the k-barrier coverage probability for intrusion detection in wireless sensor networks

A Singh, J Nagar, S Sharma, V Kotiyal - Expert Systems with Applications, 2021 - Elsevier
Abstract Sensors in a Wireless Sensor Network (WSN) sense, process, and transmit
information simultaneously. They mainly find applications in agriculture monitoring …

An energy efficient clustered gravitational and fuzzy based routing algorithm in WSNs

M Selvi, SVN Santhosh Kumar, S Ganapathy… - Wireless Personal …, 2021 - Springer
Wireless sensor networks consist of many tiny sensor nodes which are deployed in various
geographical locations for sensing the normal spectacles and also to transmit the collected …

A security-and privacy-preserving approach based on data disturbance for collaborative edge computing in social IoT systems

P Zhang, Y Wang, N Kumar, C Jiang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Internet of things (IoT) has certainly become one of the hottest technology frameworks of
the year. It is deep in many industries, affecting people's lives in all directions. The rapid …

Machine learning based deep job exploration and secure transactions in virtual private cloud systems

S Rajasoundaran, AV Prabu, S Routray… - Computers & …, 2021 - Elsevier
Abstract Virtual Private Cloud (VPC) is an emerging cloud environment used to provide
more secure data communication. VPC provides authentic communication channel for …

Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks

SVN Santhosh Kumar, Y Palanichamy, M Selvi… - Wireless …, 2021 - Springer
Abstract Wireless Sensor Networks (WSNs) is a collection of tiny distributed sensor nodes
that have been used to sense the physical parameters of the environment where it has been …

Performance evaluation of machine learning techniques for DOS detection in wireless sensor network

L Alsulaiman, S Al-Ahmadi - arXiv preprint arXiv:2104.01963, 2021 - arxiv.org
The nature of Wireless Sensor Networks (WSN) and the widespread of using WSN introduce
many security threats and attacks. An effective Intrusion Detection System (IDS) should be …