A multimodal hybrid parallel network intrusion detection model

S Shi, D Han, M Cui - Connection Science, 2023 - Taylor & Francis
With the rapid growth of Internet data traffic, the means of malicious attack become more
diversified. The single modal intrusion detection model cannot fully exploit the rich feature …

Trustworthy Artificial Intelligence Methods for Users' Physical and Environmental Security: A Comprehensive Review

S Szymoniak, F Depta, Ł Karbowiak, M Kubanek - Applied Sciences, 2023 - mdpi.com
Artificial Intelligence is an indispensable element of the modern world, constantly evolving
and contributing to the emergence of new technologies. We meet it in everyday applications …

Application of artificial intelligence to network forensics: Survey, challenges and future directions

S Rizvi, M Scanlon, J Mcgibney, J Sheppard - Ieee Access, 2022 - ieeexplore.ieee.org
Network forensics focuses on the identification and investigation of internal and external
network attacks, the reverse engineering of network protocols, and the uninstrumented …

TCN enhanced novel malicious traffic detection for IoT devices

L Xin, L Ziang, Z Yingli, Z Wenqiang, L Dong… - Connection …, 2022 - Taylor & Francis
With the development of IoT technology, more and more IoT devices are connected to the
network. Due to the hardware constraints of IoT devices themselves, it is difficult for …

Deep and hybrid learning of MRI diagnosis for early detection of the progression stages in Alzheimer's disease

I Abunadi - Connection Science, 2022 - Taylor & Francis
Alzheimer's, or so-called dementia, is one of the types of diseases that affects brain cells and
causes memory loss, difficulty in thinking, and forgetfulness. Thus far, there is no effective …

Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model

M Bakro, RR Kumar, M Husain, Z Ashraf, A Ali… - IEEE …, 2024 - ieeexplore.ieee.org
The adoption of cloud computing has become increasingly widespread across various
domains. However, the inherent security vulnerabilities of cloud computing pose significant …

Threat analysis model to control IoT network routing attacks through deep learning approach

K Janani, S Ramamoorthy - Connection Science, 2022 - Taylor & Francis
Most of the recent research has focused on the Internet of Things (IoT) and its applications.
The open interface and network connectivity of the interconnected systems under the IoT …

A feedback semi-supervised learning with meta-gradient for intrusion detection

S Cai, D Han, D Li - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
The widespread popularity of the Internet of human life has been accompanied by a
significant increase in the cost of protecting private data from malicious attacks. Researchers …

Red fox optimizer based feature selection with optimal deep learning based Intrusion detection for network security

S Sunkara, T Suresh, V Sathiyasuntharam - International Journal of …, 2023 - Springer
In recent times, increasing severity and complication of security assaults on computer
networks are simulated security researchers to incorporate various machine learning …

CTDM: Cryptocurrency abnormal transaction detection method with spatio-temporal and global representation

L Xiao, D Han, D Li, W Liang, C Yang, KC Li… - Soft Computing, 2023 - Springer
With the rapid advances in computing and networking technologies, there have led to the
creation of a novel and booming set of payment services, known as cryptocurrencies or …