A review of recent approaches on wrapper feature selection for intrusion detection

J Maldonado, MC Riff, B Neveu - Expert Systems with Applications, 2022 - Elsevier
In this paper, we present a review of recent advances in wrapper feature selection
techniques for attack detection and classification, applied in intrusion detection area. Due to …

Deep federated learning enhanced secure POI microservices for cyber-physical systems

Z Guo, K Yu, Z Lv, KKR Choo, P Shi… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
An essential consideration in cyber-physical systems (CPS) is the ability to support secure
communication services, such as points of interest (POI) microservices. Existing approaches …

Advances in Machine Learning for Sensing and Condition Monitoring

SI Ao, L Gelman, HR Karimi, M Tiboni - Applied Sciences, 2022 - mdpi.com
In order to overcome the complexities encountered in sensing devices with data collection,
transmission, storage and analysis toward condition monitoring, estimation and control …

Intrusion detection system in wireless sensor network using conditional generative adversarial network

T Sood, S Prakash, S Sharma, A Singh… - Wireless Personal …, 2022 - Springer
Wireless communication networks have much data to sense, process, and transmit. It tends
to develop a security mechanism to care for these needs for such modern-day systems. An …

AnoGLA: An efficient scheme to improve network anomaly detection

Q Ding, J Li - Journal of Information Security and Applications, 2022 - Elsevier
With increasingly cyber-attacks and intrusion techniques, the threat of network security has
become more and more serious. However, existing solutions are no longer sufficient in …

Performance improvement of intrusion detection system for detecting attacks on internet of things and edge of things

YK Saheed - Artificial Intelligence for Cloud and Edge Computing, 2022 - Springer
Edge computing (EC) is a computing methodology that is distributed in nature that brings
data storage and computation closer to the place where it is to be used to accelerate …

An Intelligent RPL attack detection using machine learning-based intrusion detection system for Internet of Things

T Raghavendra, M Anand, M Selvi… - Procedia Computer …, 2022 - Elsevier
Abstract The Internet of Things (IoT) is an important and a major key component to support
human life. Sensors are the sensing devices that play an important role in IoT to detect …

Design of intelligent parking management system based on ARM and wireless sensor network

Z Xiang, J Pan - Mobile Information Systems, 2022 - Wiley Online Library
Motor vehicles are changing the way people live, but they are also putting a huge strain on
urban traffic. In the majority of major cities, parking has become the number one problem for …

An adapting soft computing model for intrusion detection system

HIH Alsaadi, RM ALmuttari, ON Ucan… - Computational …, 2022 - Wiley Online Library
Network security in smart cities has become a key problem in the rapid development of
computer networks over the past few years. Intrusion detection systems play a fundamental …

[Retracted] Analysis of Insurance Marketing Planning Based on BD‐Guided Decision Tree Classification Algorithm

J Long - Security and Communication Networks, 2022 - Wiley Online Library
The emergence and development of Chinese insurance companies are affected by their
own unique national conditions. The modern marketing concept lags behind, lacks the …