M Ma, G Yang, J He, W Fang - Applied Soft Computing, 2024 - Elsevier
Given the continual evolution of new network attack methodologies, defenders face the imperative of constantly upgrading security defenses. Current security technologies, albeit …
H Huang, T Li, B Li, W Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The evolving unknown cyberattacks, compounded by the widespread emerging technologies (say 5G, Internet of Things, etc.), have rapidly expanded the cyber threat …
M Badr, B Khaled - Informatica, 2024 - informatica.si
Abstract Artificial Immune Recognition System (AIRS) offers a promising meta-heuristic approach inspired by the human immune system for classification tasks. However …
Denial of service (DOS) attack is a serious threat in the cloud which causes unavailability of cloud services to genuine users. Firewalls alone are not able to detect DOS attack because …