Blockchain-inspired collaborative cyber-attacks detection for securing metaverse

A Zainudin, MAP Putra, RN Alief, R Akter… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The heterogeneous connections in metaverse environments pose vulnerabilities to cyber-
attacks. To prevent and mitigate malicious network activities in a distributed metaverse …

[HTML][HTML] Chaotic tumbleweed optimization algorithm with stacked deep learning based cyberattack detection in industrial CPS environment

A Alruban, FS Alrayes, F Kouki, FA Alotaibi… - Alexandria Engineering …, 2023 - Elsevier
Cyberattacks on cyber-physical systems (CPS) have led to severe concerns, and then it is
most significant to identify the attacks in the initial phase. But, there are major problems that …

Federated Learning for Privacy Preserving Intrusion Detection in Software Defined Networks

M Raza, MJ Saeed, MB Riaz, MA Sattar - IEEE Access, 2024 - ieeexplore.ieee.org
Software-defined networking (SDN) is an innovative network technology. It changed the
world of computer networking by providing solutions to many challenges. SDN provides …

Multi-class intrusion detection system in SDN based on hybrid BiLSTM model

M Cui, J Chen, X Qiu, W Lv, H Qin, X Zhang - Cluster Computing, 2024 - Springer
Software-defined networking (SDN) is a new network paradigm, which is highly decoupled
compared to traditional networks, and makes it easier to operate by separating the data and …

Using Feature Selection Enhancement to Evaluate Attack Detection in the Internet of Things Environment

K Harahsheh, R Al-Naimat, CH Chen - Electronics, 2024 - mdpi.com
The rapid evolution of technology has given rise to a connected world where billions of
devices interact seamlessly, forming what is known as the Internet of Things (IoT). While the …

5G-SIID: an intelligent hybrid DDoS intrusion detector for 5G IoT networks

S Sadhwani, A Mathur, R Muthalagu… - International Journal of …, 2024 - Springer
The constrained resources of Internet of Things (IoT) devices make them susceptible to
Distributed Denial-of-Service (DDoS) attacks that disrupt service availability by …

Extended Fuzzy Neutrosophic Classifier for Accurate Intrusion Detection and Classification

M Elhoseny, M Abdel-salam… - International Journal of …, 2024 - americaspg.com
Intrusion Detection is crucial in contemporary cybersecurity landscapes to proactively thwart
and identify possible threats. The risk of data breaches, malicious activities, and …

EX-DFL: An Explainable Deep Federated-based Intrusion Detection System for Industrial IoT

D Attique, W Hao, W Ping, D Javeed… - 2024 21st International …, 2024 - ieeexplore.ieee.org
With the escalating volume of sensitive data trans-mitted in Industrial Internet of Things
(1IoT) infrastructures, securing data produced by various IloT devices has become …

TLFed: Federated Learning-based 1D-CNN-LSTM Transmission Line Fault Location and Classification in Smart Grids

PM Custodio, MAP Putra, JM Lee… - … Conference on Artificial …, 2024 - ieeexplore.ieee.org
Transmission lines experience the most faults out of all elements in the smart grid.
Identifying the type of fault and where it occurs allow for faster response time and higher …

Blockchain-aided Collaborative Threat Detection for Securing Digital Twin-based IIoT Networks

A Zainudin, MAP Putra, RN Alief… - ICC 2024-IEEE …, 2024 - ieeexplore.ieee.org
The distributed and heterogeneous connections in the digital twin (DT)-based industrial
Internet of Things (IIoT) are vulnerable to cyber-attacks and malicious activities. This study …