IoT trust and reputation: a survey and taxonomy

M Aaqib, A Ali, L Chen, O Nibouche - Journal of Cloud Computing, 2023 - Springer
IoT is one of the fastest-growing technologies and it is estimated that more than a billion
devices would be utilised across the globe by the end of 2030. To maximise the capability of …

A blockchain-assisted security management framework for collaborative intrusion detection in smart cities

W Li, C Stidsen, T Adam - Computers and Electrical Engineering, 2023 - Elsevier
Aiming to safeguard a decentralized setup such as smart cities, collaborative intrusion
detection system (CIDS) has become a mainstream security mechanism to protect different …

Bae: Anomaly detection algorithm based on clustering and autoencoder

D Wang, M Nie, D Chen - Mathematics, 2023 - mdpi.com
In this paper, we propose an outlier-detection algorithm for detecting network traffic
anomalies based on a clustering algorithm and an autoencoder model. The BIRCH …

Email spam detection using hierarchical attention hybrid deep learning method

S Zavrak, S Yilmaz - Expert Systems with Applications, 2023 - Elsevier
Email is one of the most widely used ways to communicate, with millions of people and
businesses relying on it to communicate and share knowledge and information on a daily …

Insider Threat Detection Based On Heterogeneous Graph Neural Network

T Tian, Y Gong, B Jiang, J Liu… - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
As one of the most challenging threats in cyberspace, insider threats frequently lead to
substantial losses for enterprises. Recently, there are many studies focus on user behavior …

Securing 5G Positioning via Zero Trust Architecture

RY Adam, W Meng - … Conference on Artificial Intelligence Security and …, 2023 - Springer
Abstract 5G is the future, regardless of what mobile network technology succeeds it,
whatever comes will be built upon the 5G technology. The 5G positioning system in its part …

A Stream-Based Approach to Intrusion Detection

S Hallé - CyberSecurity in a DevOps Environment: From …, 2023 - Springer
Integrating security in the development and operation of information systems is the
cornerstone of SecDevOps. From an operational perspective, one of the key activities for …

[PDF][PDF] Analysis and detection of insider attacks using behaviour rule based architecture in enterprise multitenancy

SK Henge, A Upadhyay, AK Saini, N Mishra, D Sharma… - researchgate.net
© Analysis and detection of insider attacks using behaviour rule based architecture in
enterprise multitenancy Santosh Kumar He Page 1 © Analysis and detection of insider …

[引用][C] Network Session Intrusion Detection by EBPNN Forest and Modified BGO

A Das, S Sharma - 2023