The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a …
Machine learning and deep learning techniques are widely used to evaluate intrusion detection systems (IDS) capable of rapidly and automatically recognizing and classifying …
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …
V Hnamte, J Hussain - Telematics and Informatics Reports, 2023 - Elsevier
Intrusion detection systems (IDS) play a critical role in safeguarding computer networks against unauthorized access and malicious activities. However, traditional IDS approaches …
In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices …
MA Bouke, A Abdullah, SH ALshatebi… - Microprocessors and …, 2023 - Elsevier
Cyber security has recently garnered enormous attention due to the popularity of the Internet of Things (IoT), intelligent devices' rapid growth, and a vast number of real-life applications …
The Internet of Things (IoT) continues to attract attention in the context of computational resource growth. Various disciplines and fields have begun to employ IoT integration …
As a result of the widespread adoption of the Internet of Things, there are now hundreds of millions of connected devices, increasing the likelihood that they may be vulnerable to …
L Chen, Z Wang, R Huo, T Huang - Algorithms, 2023 - mdpi.com
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and …