K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐ changing battlefield over who can innovate over the other. While security analysts are …
Cloud computing is currently the most cost-effective means of providing commercial and consumer IT services online. However, it is prone to new flaws. An economic denial of …
There are an increasing number of Internet of Things (IoT) devices connected to the network these days, and due to the advancement in technology, the security threads and …
A Alsaleh, W Binsaeedan - IEEE Access, 2021 - ieeexplore.ieee.org
Network security plays a critical role in our lives because of the threats and attacks to which we are exposed, which are increasing daily; these attacks result in a need to develop …
O Aouedi, K Piamrat, G Muller… - ICC 2022-IEEE …, 2022 - ieeexplore.ieee.org
With the increasing development of 5G/Beyond 5G and network softwarization techniques, we have more flexibility and agility in the network. This can be exploited by Machine …
W Yao, L Hu, Y Hou, X Li - Sensors, 2023 - mdpi.com
Network intrusion detection technology is key to cybersecurity regarding the Internet of Things (IoT). The traditional intrusion detection system targeting Binary or Multi …
Currently, the use of machine learning models for developing intrusion detection systems is a technology trend which improvement has been proven. These intelligent systems are …
Industrial Control Systems (ICSs) have entered an era of modernization enabled by the recent progress in Information Technologies (IT), particularly the Industrial Internet of Things …
The rapid growth of Internet technologies and further dependence on online services, increase the demand for keeping these networks and data secure. The protection of online …