An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions

S Anwar, J Mohamad Zain, MF Zolkipli, Z Inayat… - algorithms, 2017 - mdpi.com
In the past few decades, the rise in attacks on communication devices in networks has
resulted in a reduction of network functionality, throughput, and performance. To detect and …

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

Open-world network intrusion detection

V Rimmer, A Nadeem, S Verwer… - Security and artificial …, 2022 - Springer
This chapter contributes to the ongoing discussion of strengthening security by applying AI
techniques in the scope of intrusion detection. The focus is set on open-world detection of …

A decision methodology for managing operational efficiency and information disclosure risk in healthcare processes

X Bai, R Gopal, M Nunez, D Zhdanov - Decision support systems, 2014 - Elsevier
This paper addresses two critical challenges faced by healthcare organizations: significant
personnel shortages and mandates to safeguard patient safety and information security. We …

A cost-sensitive multi-criteria quadratic programming model for imbalanced data

X Chao, Y Peng - Journal of the Operational Research Society, 2018 - Taylor & Francis
Abstract Multiple Criteria Quadratic Programming (MCQP), a mathematical programming-
based classification method, has been developed recently and proved to be effective and …

A Systematic Mapping Study on Intrusion Response Systems

A Rezapour, M GhasemiGol, D Takabi - IEEE Access, 2024 - ieeexplore.ieee.org
With the increasing frequency and sophistication of network attacks, network administrators
are facing tremendous challenges in making fast and optimum decisions during critical …

An optimal metric-aware response selection strategy for intrusion response systems

N Herold, M Wachs, SA Posselt, G Carle - Foundations and Practice of …, 2017 - Springer
Due to the ever increasing number and variety of security incidents, incident management is
an important and challenging aspect of operating indispensable services. Self-protection …

Incident handling systems with automated intrusion response

N Herold - 2017 - mediatum.ub.tum.de
Incident handling, consisting of intrusion detection, alert processing and intrusion response,
increases the resilience of IT systems under attack. Instead of providing a holistic solution …

The Triad of Risk-Related Behaviors (TriRB): a three-dimensional model of cyber risk taking

N Ben-Asher, J Meyer - Human factors, 2018 - journals.sagepub.com
Objective: We identify three risk-related behaviors in coping with cyber threats—the
exposure to risk a person chooses, use of security features, and responses to security …