A review on spreading and forensics analysis of windows-based ransomware

NM Chayal, A Saxena, R Khan - Annals of Data Science, 2024 - Springer
Ransomware is one of the most advanced malware which uses high computer resources
and services to encrypt system data once it infects a system and causes large financial data …

A review on application of GANs in cybersecurity domain

A Arora, Shantanu - IETE Technical Review, 2022 - Taylor & Francis
Cybersecurity is essential to protect the tremendous increase in data stored on servers and
its transmission on networks. The techniques used to detect threats and preserve data need …

A hybrid machine learning method for increasing the performance of network intrusion detection systems

AA Megantara, T Ahmad - Journal of Big Data, 2021 - Springer
The internet has grown enormously for many years. It is not just connecting computer
networks but also a group of devices worldwide involving big data. The internet provides an …

Empirical evaluation of noise influence on supervised machine learning algorithms using intrusion detection datasets

KM Al-Gethami, MT Al-Akhras… - Security and …, 2021 - Wiley Online Library
Optimizing the detection of intrusions is becoming more crucial due to the continuously
rising rates and ferocity of cyber threats and attacks. One of the popular methods to optimize …

Node-based QoS-aware security framework for sinkhole attacks in mobile ad-hoc networks

BM Esiefarienrhe, T Phakathi, F Lugayizi - Telecom, 2022 - mdpi.com
Most networks strive to provide good security and an acceptable level of performance.
Quality of service (QoS) plays an important role in the performance of a network. Mobile ad …

Deep learning-based intrusion system for vehicular ad hoc networks

L Fei, Z Jiayan, S Jiaqi, E Szczerbicki - CMC-Computers Materials & …, 2020 - mostwiedzy.pl
The increasing use of the Internet with vehicles has made travel more convenient. However,
hackers can attack intelligent vehicles through various technical loopholes, resulting in a …

A measurement approach for inline intrusion detection of heartbleed-like attacks in iot frameworks

A Amodei, D Capriglione, G Cerro… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Cyber security is one of the most crucial aspects of the Internet of Things (IoT). Among the
possible threats, great interest is today paid toward the possible capturing of information …

An Improved Big Data Analytics Architecture for Intruder Classification Using Machine Learning

M Babar, S Kaleem, A Sohail, M Asim… - Security and …, 2023 - Wiley Online Library
The approval of retrieving information on the Internet originates several network securities
matters. Intrusion recognition is a critical study in network security to spot unauthorized …

Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)

T Widodo, AS Aji - JISKA (Jurnal Informatika Sunan Kalijaga), 2022 - ejournal.uin-suka.ac.id
Salah satu media untuk mengamankan komputer adalah menerapkan teknologi Intrusion
Detection System (IDS). IDS merupakan sistem deteksi dini jika terjadi serangan jaringan …

Dependable integration concepts for human-centric ai-based systems

G Macher, S Akarmazyan, E Armengaud… - … Safety, Reliability, and …, 2021 - Springer
The rising demand for adaptive, cloud-based and AI-based systems is calling for an upgrade
of the associated dependability concepts. That demands instantiation of dependability …