Intrusion Detection Techniques in Social Media Cloud: Review and Future Directions

KM Abuali, L Nissirat… - … and Mobile Computing, 2023 - Wiley Online Library
As social media use increases, the number of users has risen also. This has increased the
volume of data carried over the network, making it more important to secure users' data and …

[PDF][PDF] Intrusion detection model using naive bayes and deep learning technique.

M Tabash, M Abd Allah, B Tawfik - Int. Arab J. Inf. Technol., 2020 - iajit.org
The increase of security threats and hacking the computer networks are one of the most
dangerous issues should treat in these days. Intrusion Detection Systems (IDSs), are the …

Fuzzy min–max neural network and particle swarm optimization based intrusion detection system

C Azad, VK Jha - Microsystem Technologies, 2017 - Springer
To maintain the integrity, availability, reliability of the data and services available on web
requires a strong network security framework, in such consequence IDS based on data …

Advancing Network Security with AI: SVM-Based Deep Learning for Intrusion Detection

KM Abuali, L Nissirat, A Al-Samawi - Sensors, 2023 - mdpi.com
With the rapid growth of social media networks and internet accessibility, most businesses
are becoming vulnerable to a wide range of threats and attacks. Thus, intrusion detection …

A data reduction strategy and its application on scan and backscatter detection using rule-based classifiers

V Herrera-Semenets, OA Pérez-García… - Expert Systems with …, 2018 - Elsevier
In the last few years, the telecommunications scenario has experienced an increase in the
volume of information generated, as well as in the execution of malicious activities. In order …

Decision tree and genetic algorithm based intrusion detection system

C Azad, VK Jha - Proceeding of the second international conference on …, 2019 - Springer
Today's computer network security systems like IDS, firewall, access control, etc., are not yet
100% trusted, Still they are suffering from the high classification error. Therefore, there is …

Data dimensionality reduction (DDR) scheme for intrusion detection system using ensemble and standalone classifiers

A Bansal, S Kaur - Advances in Computing and Data Sciences: Third …, 2019 - Springer
The growth in IT sector is touching new pinnacles day by day, and hence the number of
devices that are connected through Internet have increased tremendously, resulting into Big …

[引用][C] An experimental evaluation of bayesian classifiers applied to intrusion detection

NM Mir, S Khan, MA Butt, M Zaman - Indian Journal of Science and Technology, 2016

[引用][C] Comparative analysis of data mining tools and techniques for information retrieval

A Verma, I Kaur, I Singh - Indian Journal of Science and Technology, 2016

[引用][C] A Comparative Study on MMDBM Classifier Incorporating Various Sorting Procedure

P Ganesan, S Sundar - Indian Journal of Science and Technology, 2015