Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks

M Safaldin, M Otair, L Abualigah - Journal of ambient intelligence and …, 2021 - Springer
Intrusion in wireless sensor networks (WSNs) aims to degrade or even eliminating the
capability of these networks to provide its functions. In this paper, an enhanced intrusion …

A taxonomy of supervised learning for idss in scada environments

J Suaboot, A Fahad, Z Tari, J Grundy… - ACM Computing …, 2020 - dl.acm.org
Supervisory Control and Data Acquisition (SCADA) systems play an important role in
monitoring industrial processes such as electric power distribution, transport systems, water …

A network intrusion detection method based on semantic Re-encoding and deep learning

Z Wu, J Wang, L Hu, Z Zhang, H Wu - Journal of Network and Computer …, 2020 - Elsevier
In recent years, with the increase of human activities in cyberspace, intrusion events, such
as network penetration, detection and attack, tend to be frequent and hidden. The traditional …

An enhanced optimization based algorithm for intrusion detection in SCADA network

S Shitharth - Computers & Security, 2017 - Elsevier
Abstract Supervisory Control and Data Acquisition (SCADA) systems are widely used in
many applications including power transmission and distribution for situational awareness …

MARK-ELM: application of a novel multiple kernel learning framework for improving the robustness of network intrusion detection

JM Fossaceca, TA Mazzuchi, S Sarkani - Expert Systems with Applications, 2015 - Elsevier
Detection of cyber-based attacks on computer networks continues to be a relevant and
challenging area of research. Daily reports of incidents appear in public media including …

A graphical and qualitative review of literature on ai-based cyber-threat intelligence (cti) in banking sector

ER Ndukwe, B Baridam - European Journal of Engineering and …, 2023 - ej-eng.org
Cyber threats have become a threat to the banking industry, and resulting in the business
attempting to implement artificial intelligence strategies while build resilient cyber-defense …

[PDF][PDF] Analysis of host-based and network-based intrusion detection system

AP Singh, MD Singh - … Journal of Computer Network and Information …, 2014 - mecs-press.org
Intrusion-detection systems (IDS) aim at detecting attacks against computer systems and
networks or, in general, against information systems. Its basic aim is to protect the system …

[PDF][PDF] Intrusion detection techniques in wireless sensor network using data mining algorithms: comparative evaluation based on attacks detection

Y El Mourabit, A Bouirden… - International …, 2015 - pdfs.semanticscholar.org
Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and
characterized by constrained resources, WSN suffers from several attacks, intrusion and …

A data fusion based data aggregation and sensing technique for fault detection in wireless sensor networks

S Gavel, R Charitha, P Biswas, AS Raghuvanshi - Computing, 2021 - Springer
Abstract Wireless Sensor Networks (WSNs) are networks formed using a large number of
low-cost sensor nodes that have limited energy sources, limited processing capability, low …

Data representation for CNN based internet traffic classification: a comparative study

O Salman, IH Elhajj, A Kayssi, A Chehab - Multimedia Tools and …, 2021 - Springer
It has been well established that the Internet of Things will bring an expansion in traffic
volume and types. This will bring new challenges in terms of Quality of Service (QoS) and …