[HTML][HTML] A computationally efficient method for assessing the impact of an active viral cyber threat on a high-availability cluster

A Altameem, M Al-Ma'aitah, V Kovtun… - Egyptian Informatics …, 2023 - Elsevier
The field of computer science, like its sub-field of cyber threat modelling, is rapidly evolving.
The prerequisites for key changes can be summarized as follows: cyber threats are evolving; …

A Novel Approach to Network Intrusion Detection with LR Stacking Model

M Jarin, ASMM Rahaman - The International Conference on Artificial …, 2023 - Springer
IDS is one of the most researched subjects of network security. Single-classifier IDS tends to
fail in many scenarios where ensemble or hybrid approaches have been adopted. In the …