An intrusion detection and prevention system in cloud computing: A systematic review

A Patel, M Taghavi, K Bakhtiyari, JC Júnior - Journal of network and …, 2013 - Elsevier
The distributed and open structure of cloud computing and services becomes an attractive
target for potential cyber-attacks by intruders. The traditional Intrusion Detection and …

Intrusion response systems: Foundations, design, and challenges

Z Inayat, A Gani, NB Anuar, MK Khan… - Journal of Network and …, 2016 - Elsevier
In the last few decades, various network attacks have emerged. This phenomenon requires
serious consideration to address its extensive consequences. To overcome the effects of …

Evaluation of machine learning classifiers for mobile malware detection

FA Narudin, A Feizollah, NB Anuar, A Gani - Soft Computing, 2016 - Springer
Mobile devices have become a significant part of people's lives, leading to an increasing
number of users involved with such technology. The rising number of users invites hackers …

Adaptive neuro-fuzzy maximal power extraction of wind turbine with continuously variable transmission

D Petković, Ž Ćojbašić, V Nikolić, S Shamshirband… - Energy, 2014 - Elsevier
In recent years the use of renewable energy including wind energy has risen dramatically.
Because of the increasing development of wind power production, improvement of the …

Discriminative multinomial naive bayes for network intrusion detection

M Panda, A Abraham, MR Patra - 2010 Sixth International …, 2010 - ieeexplore.ieee.org
This paper applies discriminative multinomial Naïve Bayes with various filtering analysis in
order to build a network intrusion detection system. For our experimental analysis, we used …

Discovering optimal features using static analysis and a genetic search based method for Android malware detection

A Firdaus, NB Anuar, A Karim, MFA Razak - Frontiers of Information …, 2018 - Springer
Mobile device manufacturers are rapidly producing miscellaneous Android versions
worldwide. Simultaneously, cyber criminals are executing malicious actions, such as …

An analysis of supervised tree based classifiers for intrusion detection system

S Thaseen, CA Kumar - 2013 international conference on …, 2013 - ieeexplore.ieee.org
Due to increase in intrusion incidents over internet, many network intrusion detection
systems are developed to prevent network attacks. Data mining, pattern recognition and …

A study of machine learning classifiers for anomaly-based mobile botnet detection

A Feizollah, NB Anuar, R Salleh… - Malaysian Journal of …, 2013 - adum.um.edu.my
In recent years, mobile devices are ubiquitous. They are employed for purposes beyond
merely making phone calls. Among the mobile operating systems, Android is the most …

A border-based approach for hiding sensitive frequent itemsets

X Sun, PS Yu - Fifth IEEE International Conference on Data …, 2005 - ieeexplore.ieee.org
Sharing data among organizations often leads to mutual benefit. Recent technology in data
mining has enabled efficient extraction of knowledge from large databases. This, however …

Taxonomy of intrusion risk assessment and response system

A Shameli-Sendi, M Cheriet, A Hamou-Lhadj - Computers & Security, 2014 - Elsevier
In recent years, we have seen notable changes in the way attackers infiltrate computer
systems compromising their functionality. Research in intrusion detection systems aims to …