A comprehensive survey on network anomaly detection

G Fernandes, JJPC Rodrigues, LF Carvalho… - Telecommunication …, 2019 - Springer
Nowadays, there is a huge and growing concern about security in information and
communication technology among the scientific community because any attack or anomaly …

Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms

S Pamarthi, R Narmadha - International Journal of Intelligent …, 2022 - emerald.com
Purpose Nowadays, more interest is found among the researchers in MANETs in practical
and theoretical areas and their performance under various environments. WSNs have …

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing

O Osanaiye, H Cai, KKR Choo… - EURASIP Journal on …, 2016 - Springer
Widespread adoption of cloud computing has increased the attractiveness of such services
to cybercriminals. Distributed denial of service (DDoS) attacks targeting the cloud's …

Evaluation of machine learning classifiers for mobile malware detection

FA Narudin, A Feizollah, NB Anuar, A Gani - Soft Computing, 2016 - Springer
Mobile devices have become a significant part of people's lives, leading to an increasing
number of users involved with such technology. The rising number of users invites hackers …

A survey of big data management: Taxonomy and state-of-the-art

A Siddiqa, IAT Hashem, I Yaqoob, M Marjani… - Journal of Network and …, 2016 - Elsevier
The rapid growth of emerging applications and the evolution of cloud computing
technologies have significantly enhanced the capability to generate vast amounts of data …

Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks

S Velliangiri, P Karthikeyan… - Journal of Experimental & …, 2021 - Taylor & Francis
Cloud computing services provide a wide range of resource pool for maintaining a large
amount of data. Cloud services are commonly used as the private or public data forum …

RPL attack detection and prevention in the Internet of Things networks using a GRU based deep learning

S Cakir, S Toklu, N Yalcin - IEEE Access, 2020 - ieeexplore.ieee.org
Cyberattacks targeting Internet of Things (IoT), have increased significantly, over the past
decade, with the spread of internet-connected smart devices and applications. Routing …

Denial of service defence for resource availability in wireless sensor networks

OA Osanaiye, AS Alfa, GP Hancke - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless sensor networks (WSN) over the years have become one of the most promising
networking solutions with exciting new applications for the near future. Its deployment has …

Compression header analyzer intrusion detection system (CHA-IDS) for 6LoWPAN communication protocol

MN Napiah, MYIB Idris, R Ramli, I Ahmedy - IEEE Access, 2018 - ieeexplore.ieee.org
Prior 6LoWPAN intrusion detection system (IDS) utilized several features to detect various
malicious activities. However, these IDS methods only detect specific attack but fails when …

Smart Spider Monkey Optimization (SSMO) for Energy‐Based Cluster‐Head Selection Adapted for Biomedical Engineering Applications

P Ajay, B Nagaraj, J Jaya - Contrast Media & Molecular …, 2022 - Wiley Online Library
Using energy efficiency to increase the life and sustainability of wireless sensor networks
(WSNs) for biomedical applications is still a challenge. Clustering has boosted energy …