A review on challenges and future research directions for machine learning-based intrusion detection system

A Thakkar, R Lohiya - Archives of Computational Methods in Engineering, 2023 - Springer
Research in the field of Intrusion Detection is focused on developing an efficient strategy that
can identify network attacks. One of the important strategies is to supervise the network …

Advancing database security: a comprehensive systematic mapping study of potential challenges

A Iqbal, SU Khan, M Niazi, M Humayun, NU Sama… - Wireless …, 2024 - Springer
The value of data to a company means that it must be protected. When it comes to
safeguarding their local and worldwide databases, businesses face a number of challenges …

Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection

S Dwivedi, M Vardhan, S Tripathi - Cluster Computing, 2021 - Springer
Intrusion detection is one of the most crucial activities for security infrastructures in network
environments, and it is widely used to detect, identify and track malicious threats. A common …

A prospective approach to detect advanced persistent threats: Utilizing hybrid optimization technique

I Kumari, M Lee - Heliyon, 2023 - cell.com
Abstract Advanced Persistent Threat (APT) attacks pose significant challenges for AI models
in detecting and mitigating sophisticated and highly effective cyber threats. This research …

[HTML][HTML] ClusteredLog: Optimizing Log Structures for Efficient Data Recovery and Integrity Management in Database Systems

MS Ahmad, BN Panda - Electronics, 2024 - mdpi.com
In modern database systems, efficient log management is crucial for ensuring data integrity
and facilitating swift recovery from potential data corruption or system failures. Traditional log …

[PDF][PDF] Influence maximization in social networks using role-based embedding.

X Gu, Z Wang, X Chen, P Lu, Y Du… - … & Heterogeneous Media, 2023 - researchgate.net
Influence maximization (IM), a central issue in optimizing information diffusion on social
platforms, aims to spread posts or comments more widely, rapidly, and efficiently. Existing …

An integrated IDS using ICA-based feature selection and SVM classification method

RO Ogundokun, S Misra, AO Bajeh, UO Okoro… - Illumination of Artificial …, 2022 - Springer
The continuous development of computer networks has created serious worries about
vulnerability and security. Network administrators have embraced Intrusion Detection …

A real-time matrix iterative optimization algorithm of booking elevator group and numerical simulation formed by multi-sensor combination

W Chen, B Zheng, J Liu, L Li, X Ren - Electronics, 2021 - mdpi.com
Elevators are an essential indoor transportation tool in high-rise buildings. The world is
advocating the design concept of safety, energy-saving, and intelligence. We focus on …

[PDF][PDF] Multilevel Database Decomposition Framework

F Baiardi, C Comella, V Sammartino - ITASEC: Italian Conference of …, 2024 - ceur-ws.org
Abstract The Multilevel Database Decomposition Framework is a strategy to enhance
system robustness and minimize the impact of data breaches. The framework prioritizes …

Satisfying Least Privilege Through Database Decomposition

F Baiardi, C Comella… - 2024 20th International …, 2024 - ieeexplore.ieee.org
The Multilevel Database Decomposition Framework aims to enhance the robustness and
minimize data leakage of intrusions into healthcare databases. To this purpose, the …