[HTML][HTML] A survey of deep learning-based intrusion detection in automotive applications

B Lampe, W Meng - Expert Systems with Applications, 2023 - Elsevier
Modern automobiles depend on internal vehicle networks (IVNs) to control systems from the
anti-lock brakes to the transmission to the locks on the doors. Many IVNs, particularly the …

A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis

S Muneer, U Farooq, A Athar… - Journal of …, 2024 - Wiley Online Library
Intrusion detection (ID) is critical in securing computer networks against various malicious
attacks. Recent advancements in machine learning (ML), deep learning (DL), federated …

Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures

IA Kandhro, SM Alanazi, F Ali, A Kehar, K Fatima… - IEEE …, 2023 - ieeexplore.ieee.org
Computer viruses, malicious, and other hostile attacks can affect a computer network.
Intrusion detection is a key component of network security as an active defence technology …

Performance analysis of enterprise cloud computing: a review

HS Malallah, R Qashi, LM Abdulrahman… - Journal of Applied …, 2023 - jastt.org
Cloud computing has swiftly established itself as the norm in its field as a result of the
advantages described above. In an attempt to reduce the amount of time spent on …

RETRACTED ARTICLE: FSO-LSTM IDS: hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks

AS Alqahtani - The Journal of Supercomputing, 2022 - Springer
Abstract The Internet of Things (IoT) has achieved exponential growth worldwide. Although
the IoT is used by millions of users, these networks are handicapped by attacks such as …

[PDF][PDF] SQL injection attacks prevention system technology

FQ Kareem, SY Ameen, AA Salih… - Asian Journal of …, 2021 - researchgate.net
The vulnerabilities in most web applications enable hackers to gain access to confidential
and private information. Structured query injection poses a significant threat to web …

[PDF][PDF] A Responsible AI Development for Sustainable Enterprises: A Review of Integrating Ethical AI with IoT and Enterprise Systems

Z Abdulqader, DM Abdulqader… - Journal of Information …, 2024 - researchgate.net
In the midst of the rapid advancement of technology that is now taking place, the disciplines
of processing and algorithms have arisen as very important areas of research and practical …

[PDF][PDF] Secure data transfer over internet using image steganography

DM Abdullah, SY Ameen, N Omar… - Asian Journal of …, 2021 - researchgate.net
Whether it's for work or personal well-being, keeping secrets or private information has
become part of our everyday existence. Therefore, several researchers acquire an entire …

Hybrid feature selection and BWTDO enabled DeepCNN-TL for intrusion detection in fuzzy cloud computing

MG Raj, SK Pani - Soft Computing, 2023 - Springer
Abstract Intrusion Detection Systems (IDS) are used to detect malevolent threats and to
reinstate a secure state for the network, in the cloud environment. Cloud based IDS having …

[PDF][PDF] Reliable communications for vehicular networks

HR Ismael, SY Ameen, SF Kak, HM Yasin… - Asian Journal of …, 2021 - academia.edu
Vehicular communications, referring to information exchange among vehicles, and
infrastructures. It has attracted a lot of attentions recently due to its great potential to support …