IH Ji, JH Lee, MJ Kang, WJ Park, SH Jeon, JT Seo - Sensors, 2024 - mdpi.com
As cyber-attacks increase in unencrypted communication environments such as the traditional Internet, protected communication channels based on cryptographic protocols …
S Masood, A Zafar - International Journal of Information Technology, 2024 - Springer
This study presents a new intrusion detection system (IDS) for Wireless Ad hoc Networks, leveraging graph neural networks (GNN). Overcoming the challenges faced by traditional …
S Lagraa, M Husák, H Seba, S Vuppala, R State… - International Journal of …, 2024 - Springer
This survey paper provides a comprehensive overview of recent research and development in network security that uses graphs and graph-based data representation and analytics …
The wide adoption of encrypted traffic brings challenges to network management. Previous studies propose different approaches to tackle this problem. However, most of them still …
G Wu, X Wang, Q Lu, H Zhang - Expert Systems with Applications, 2024 - Elsevier
A botnet is a group of hijacked devices that conduct various cyberattacks, which is one of the most dangerous threats on the internet. Individuals or organizations can effectively detect …
Software-defined Networking (SDN) is a transformative approach for addressing the limitations of legacy networks due to decoupling of control planes from data planes. It offers …
Intrusion detection is a form of anomalous activity detection in communication network traffic. Continual learning (CL) approaches to the intrusion detection task accumulate old …
Threats on computer networks have been increasing rapidly, and irresponsible parties are always trying to exploit vulnerabilities in the network to do various dangerous things. One …
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in …