A hybrid machine learning model for detecting cybersecurity threats in IoT applications

M Usoh, P Asuquo, S Ozuomba, B Stephen… - International Journal of …, 2023 - Springer
The introduction of the Internet of Things has led to the connectivity of millions of devices
with less human interaction. This demand in connectivity has resulted in a surge in network …

Deep-efficient-guard: securing wireless ad hoc networks via graph neural network

S Masood, A Zafar - International Journal of Information Technology, 2024 - Springer
This study presents a new intrusion detection system (IDS) for Wireless Ad hoc Networks,
leveraging graph neural networks (GNN). Overcoming the challenges faced by traditional …

Od-ids2022: generating a new offensive defensive intrusion detection dataset for machine learning-based attack classification

ND Patel, BM Mehtre, R Wankar - International Journal of Information …, 2023 - Springer
In network defence, intrusion detection is crucial to identify malicious activities such as
attacks, intrusions, and malware. Intrusion Detection Systems (IDSs) are mandatory for …

[HTML][HTML] An ensemble-based machine learning approach for cyber-attacks detection in wireless sensor networks

S Ismail, Z El Mrabet, H Reza - Applied Sciences, 2022 - mdpi.com
Wireless Sensor Networks (WSNs) are the key underlying technology of the Internet of
Things (IoT); however, these networks are energy constrained. Security has become a major …

A fully streaming big data framework for cyber security based on optimized deep learning algorithm

N Hussen, SM Elghamrawy, M Salem… - IEEE …, 2023 - ieeexplore.ieee.org
Real-time deep learning faces the challenge of balancing accuracy and time, especially in
cybersecurity where intrusion detection is crucial. Traditional deep learning techniques have …

Metaheuristic link prediction (MLP) using AI based ACO-GA optimization model for solving vehicle routing problem

JKC Revanna, NYB Al-Nakash - International Journal of Information …, 2023 - Springer
Delivering goods is crucial to the supply chain industry because it directly affects package
delivery, a crucial aspect of real-time vehicle movement on which most e-commerce …

Providing and evaluating a comprehensive model for detecting fraudulent electronic payment card transactions with a two-level filter based on flow processing in big …

H Banirostam, T Banirostam, MM Pedram… - International Journal of …, 2023 - Springer
Previous research on fraud detection modeling is often based on a single algorithm,
optimizing categories and clusters to find fraudulent patterns that they have provided …

Optimizing flexural strength of fused deposition modelling using supervised machine learning algorithms

VS Jatti, AV Jatti, A Mishra, RD Dhabale… - International Journal of …, 2023 - Springer
Due to its distinct production paradigm, additive manufacturing (AM) is positioned to bring
about a revolution. It presents the possibility of on-demand, decentralized, and mass …

Detection of botnet in IoT network through machine learning based optimized feature importance via ensemble models

SM din, R Sharma, F Rizvi, N Sharma - International Journal of Information …, 2024 - Springer
The number of cyberattacks has grown along with the expansion of the Internet of Things
(IoT), which necessitates detection of cyberattacks on IoT devices. Different machine …

Ensemble adaptive online machine learning in data stream: a case study in cyber intrusion detection system

K Roshan, A Zafar - International Journal of Information Technology, 2024 - Springer
Adaptive online machine learning using data streams is an emerging research area in which
algorithms learn dynamically from live data and update regularly for future predictions. On …