K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐ changing battlefield over who can innovate over the other. While security analysts are …
A Assiri - Computers, Materials & Continua, 2021 - cdn.techscience.cn
Anomaly classification based on network traffic features is an important task to monitor and detect network intrusion attacks. Network-based intrusion detection systems (NIDSs) using …
T Zhang, D Han, MD Marino, L Wang, KC Li - Wireless Personal …, 2022 - Springer
As security threats are increasingly diversified, a critical problem in Wireless Sensor Network environments (WSNs) is detecting anomalies. WSNs are affected by several limitations, such …
Quick increase in web and system advancements has prompted significant increase in number of attacks and intrusions. Identification and prevention of these attacks has turned …
A Singh, V Bhandari… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Intrusion detection is the process of analyzing the network packets to identify if the packet is legitimate or anomalous. The major challenges involved in this domain includes the huge …
S Raj, KN Singh, NK Gupta, R Nigam… - … and Smart Systems …, 2021 - ieeexplore.ieee.org
These days, intrusion detection system (IDS) is the most arising pattern in our general public. This basically screen network traffic and will alarm the organization chairman of any …
K Liang, Z Xiukai, O Krakhmalev - SoftwareX, 2023 - Elsevier
SLSL-QPSO is a software that can find the optimal value of a function. It improves over the Quantum-behaved Particle Swarm Optimization (QPSO) algorithms by leveraging the …
N Mishra, S Mishra - EAI Endorsed Transactions on Internet of …, 2024 - publications.eai.eu
Intrusion detection systems are mainly prevalent proclivity within our culture today. Interference exposure systems function as countermeasures to identify web-based …
The rapid evolution of technology and the proliferation of interconnected systems have given rise to an alarming increase in cyber threats. In this context, Intrusion Detection Systems …