Multi-attribute decision-making for intrusion detection systems: A systematic review

A Alamleh, OS Albahri, AA Zaidan… - … Journal of Information …, 2023 - World Scientific
Intrusion detection systems (IDSs) employ sophisticated security techniques to detect
malicious activities on hosts and/or networks. IDSs have been utilized to ensure the security …

Real-time security warning and ecu identification for in-vehicle networks

H Wei, Q Ai, W Zhao, Y Zhang - IEEE Sensors Journal, 2023 - ieeexplore.ieee.org
Vehicle intelligence and networking have manifested the significance of the embedded
controller area network (CAN) bus. However, the lack of message encryption and identity …

MS‐ADS: Multistage Spectrogram image‐based Anomaly Detection System for IoT security

Z Ahmad, AS Khan, K Zen… - Transactions on Emerging …, 2023 - Wiley Online Library
The innovative computing idea of Internet‐of‐Things (IoT) architecture has gained
tremendous popularity over the last decade, resulting in an exponential increase in the …

On evaluation of network intrusion detection systems: Statistical analysis of CIDDS-001 dataset using machine learning techniques

A Verma, V Ranga - Authorea Preprints, 2023 - techrxiv.org
In the era of digital revolution, a huge amount of data is being generated from different
networks on a daily basis. Security of this data is of utmost importance. Intrusion Detection …

Performance evaluation of learning models for intrusion detection system using feature selection

B Kaushik, R Sharma, K Dhama, A Chadha… - Journal of Computer …, 2023 - Springer
As computer malware is enlarging with time, the evolution of enhanced intrusion detection
systems (IDSs) has become critical. As a result, there is a necessity to create an effective …

Improving collaborative intrusion detection system using blockchain and pluggable authentication modules for sustainable smart city

RK Gupta, V Chawla, RK Pateriya, PK Shukla… - Sustainability, 2023 - mdpi.com
The threat of cyber-attacks is ever increasing in today's society. There is a clear need for
better and more effective defensive tools. Intrusion detection can be defined as the detection …

[PDF][PDF] Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic.

A Almomani, I Akour, AM Manasrah… - … Automation & Soft …, 2023 - researchgate.net
The exponential growth of Internet and network usage has necessitated heightened security
measures to protect against data and network breaches. Intrusions, executed through …

Outlier based intrusion detection in databases for user behaviour analysis using weighted sequential pattern mining

I Singh, R Jindal - International Journal of Machine Learning and …, 2023 - Springer
With the rise of traffic over wide networks, particularly the internet, and the cloud-based
transactions and interactions, database security is important for any organisation. The …

An Enhancing Network Security: A Stacked Ensemble Intrusion Detection System for Effective Threat Mitigation

N Vullam, D Roja, NM Rao, SS Vellela… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Modern cyber security relies heavily on intrusion detection in network traffic to quickly
identify and mitigate security threats. Conventional intrusion detection systems frequently …

Quantization-aware Neural Architectural Search for Intrusion Detection

RY Acharya, LL Jeune, N Mentens, F Ganji… - arXiv preprint arXiv …, 2023 - arxiv.org
Deploying machine learning-based intrusion detection systems (IDSs) on hardware devices
is challenging due to their limited computational resources, power consumption, and …