Abstract Denial of Service (DoS) attack represents until now a relevant problem in Internet- based contexts. In fact, it is both difficult to recognize and to counteract. Along with the …
KM Abuali, L Nissirat… - … and Mobile Computing, 2023 - Wiley Online Library
As social media use increases, the number of users has risen also. This has increased the volume of data carried over the network, making it more important to secure users' data and …
HN Bhor, M Kalla - Computational Intelligence, 2022 - Wiley Online Library
Abstract Internet of Things (IoT) is a trending domain and has acquired much interest for various kinds of civilian applications. The purpose of IoT is to make objects accessible and …
As computing services are increasingly cloud-based, corporations are investing in cloud- based security measures. The Security-as-a-Service (SECaaS) paradigm allows customers …
N Kumar, U Kumar - Multimedia Tools and Applications, 2022 - Springer
Abstract Network Intrusion Detection (NID) is an important domain of research and as the network traffic is growing enormously, new challenges are emerging forth in terms of quality …
This paper Smart Intrusion Detection System (IDS), is a contribution to efforts towards detecting intrusion and malicious activities on Android phone. The goal of this paper is to …
OS POPOỌLA - Available at SSRN 4532805, 2023 - papers.ssrn.com
The metrics for the costs of managing data and information are fundamentally a function of the breadth and depth of the use of data and information, and invariably the degree of the …
ES Escriche, J Nyberg, Y Kim… - 2024 IEEE Conference on …, 2024 - ieeexplore.ieee.org
The increasing frequency and complexity of cyberattacks against critical digital infrastructures require novel methods that can detect intrusions in a timely manner. Recent …
An experiment to study the entropy method for an anomaly detection system has been performed. The study has been conducted using real data generated from the distributed …