Enhancing the Efficiency of a Cybersecurity Operations Center Using Biomimetic Algorithms Empowered by Deep Q-Learning

R Olivares, O Salinas, C Ravelo, R Soto, B Crawford - Biomimetics, 2024 - mdpi.com
In the complex and dynamic landscape of cyber threats, organizations require sophisticated
strategies for managing Cybersecurity Operations Centers and deploying Security …

Enhancing the Efficiency of a Cyber SOC Using Biomimetic Algorithms Empowered by Deep Q–Learning

R Olivares, O Salinas, C Ravelo, R Soto, B Crawford - 2024 - preprints.org
Given the landscape of intricate and constantly evolving cyber threats, organizations
demand refined strategies to deploy a Security Information and Event Management to …

A Secure data-driven algorithm against malicious intrusion signals in mobile communication networks

Y Yu, M Baza, A Rasheed - 2024 - researchsquare.com
Intrusion signals in mobile communication networks are often disguised as normal
communication signals to attack, which is highly covert. This makes it difficult to be …

irpSSHa: Identifying and Reporting SSH Brute Force Attackers

R Mukherjee - Available at SSRN 5038715, 2024 - papers.ssrn.com
Abstract The Secure Shell (SSH) protocol is crucial for secure remote access to hosts, yet
remains susceptible to brute force attacks, where adversaries attempt unauthorized access …

An Advanced design of Intrusion Detection System using Machine learning Architecture

A Gandhar, P Priyadarshi… - Library Progress …, 2024 - bpasjournals.com
The Internet is advancing over the years, computer networks and its applications are having
an exponential growth. An increased chances of getting attacked and major risk of potential …