H Lin, C Wu, M Masdari - Computers and Electrical Engineering, 2022 - Elsevier
Anomaly intrusion detection systems are a class of intrusion detection systems that do not rely on the security attacks' signatures and focus on finding unknown malicious behaviors …
X Ma, W Shi - IEEE Transactions on Network Science and …, 2020 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) play a vital role in securing today's Data-Centric Networks. In a dynamic environment such as the Internet of Things (IoT), which is vulnerable …
In recent years the use of renewable energy including wind energy has risen dramatically. Because of the increasing development of wind power production, improvement of the …
Mobile device manufacturers are rapidly producing miscellaneous Android versions worldwide. Simultaneously, cyber criminals are executing malicious actions, such as …
A Karami - Expert Systems with Applications, 2018 - Elsevier
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and visualization techniques has considerably become an important research topic to protect …
In recent years, mobile devices are ubiquitous. They are employed for purposes beyond merely making phone calls. Among the mobile operating systems, Android is the most …
Network security and data security is gaining vital importance as the usage of applications on computer networks evolving now-a-days. Tremendous increase of data usage on real …
Malware is a blanket term for Trojan, viruses, spyware, worms, and other files that are purposely created to harm computers, mobile devices, or computer networks. Malware …
The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain …