Nowadays, network technologies are essential for transferring and storing various information of users, companies, and industries. However, the growth of the information …
Cyber-security systems, which protect networks and computers against cyber attacks, are becoming common due to increasing threats and government regulation. At the same time …
R Singh, H Kumar, RK Singla, RR Ketti - Online Information Review, 2017 - emerald.com
Purpose The paper addresses various cyber threats and their effects on the internet. A review of the literature on intrusion detection systems (IDSs) as a means of mitigating …
Insider threat is a prominent cyber-security danger faced by organizations and companies. In this research, we study and evaluate an insider threat detection workflow using …
K Saleem, GM Alabduljabbar, N Alrowais… - IEEE …, 2020 - ieeexplore.ieee.org
Every IPv6-enabled device connected and communicating over the Internet forms the Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform …
BM Rahal, A Santos, M Nogueira - IEEE Access, 2020 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks disrupt servers, services and the network, overloading the target resources and denying normal traffic. In order to defend from this …
With the increase in available data from computer systems and their security threats, interest in anomaly detection has increased as well in recent years. The need to diagnose faults and …
A Srivastava, A Kumar - Innovations in Computer Science and Engineering …, 2022 - Springer
The Internet was initially accustomed to transmitting packets of data between users and data sources using a specified IP address. The Internet of things (IoT) is the concept of everyday …
The current surge of attention around artificial intelligence will hopefully lead to seeking solutions that help increase efficiency, quality and designer productivity for both hardware …