A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions

A Thakkar, R Lohiya - Artificial Intelligence Review, 2022 - Springer
With the increase in the usage of the Internet, a large amount of information is exchanged
between different communicating devices. The data should be communicated securely …

Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree

Z Azam, MM Islam, MN Huda - IEEE Access, 2023 - ieeexplore.ieee.org
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …

A new intelligent multilayer framework for insider threat detection

MN Al-Mhiqani, R Ahmad, ZZ Abidin… - Computers & Electrical …, 2022 - Elsevier
In several earlier studies, machine learning (ML) has been widely used for building insider
threat detection systems. However, the selection of the most appropriate ML classification …

Deep CNN and geometric features-based gastrointestinal tract diseases detection and classification from wireless capsule endoscopy images

M Sharif, M Attique Khan, M Rashid… - … of Experimental & …, 2021 - Taylor & Francis
Gastrointestinal tract (GIT) infections such as ulcers, bleeding, polyps, Crohn's disease and
cancer are quite familiar today worldwide. Wireless capsule endoscopy (WCE) is an efficient …

A survey on security issues in services communication of Microservices‐enabled fog applications

D Yu, Y Jin, Y Zhang, X Zheng - Concurrency and Computation …, 2019 - Wiley Online Library
Fog computing is used as a popular extension of cloud computing for a variety of emerging
applications. To incorporate various design choices and customized policies in fog …

DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation

M Aamir, SMA Zaidi - International Journal of Information Security, 2019 - Springer
This paper applies an organized flow of feature engineering and machine learning to detect
distributed denial-of-service (DDoS) attacks. Feature engineering has a focus to obtain the …

RETRACTED ARTICLE: Invariant packet feature with network conditions for efficient low rate attack detection in multimedia networks for improved QoS

M Suchithra, M Baskar, J Ramkumar… - Journal of ambient …, 2021 - Springer
The problem of low rate attack detection has been well studied in different situations.
However the methods suffer to achieve higher performance in low rate attack detection. The …

Root exploit detection and features optimization: mobile device and blockchain based medical data management

A Firdaus, NB Anuar, MFA Razak, IAT Hashem… - Journal of medical …, 2018 - Springer
The increasing demand for Android mobile devices and blockchain has motivated malware
creators to develop mobile malware to compromise the blockchain. Although the blockchain …

Low-rate DoS attack detection using PSD based entropy and machine learning

N Zhang, F Jaafar, Y Malik - 2019 6th IEEE International …, 2019 - ieeexplore.ieee.org
The Distributed Denial of Service attack is one of the most common attacks and it is hard to
mitigate, however, it has become more difficult while dealing with the Low-rate DoS (LDoS) …

A self-supervised anomaly detection algorithm with interpretability

Z Wu, X Yang, X Wei, P Yuan, Y Zhang, J Bai - Expert Systems with …, 2024 - Elsevier
Identifying the abnormal samples from a data set and determining their type are two key
tasks of anomaly detection. However, the existing anomaly detection algorithms are …