Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman… - Electronics, 2020 - mdpi.com
Cyberttacks are becoming increasingly sophisticated, necessitating the efficient intrusion
detection mechanisms to monitor computer resources and generate reports on anomalous …

A low-level hybrid intrusion detection system based on hardware performance counters

A Khraisat, I Gondal, P Vamplew… - Trust, Security and …, 2022 - taylorfrancis.com
Traditionally, Intrusion Detection Systems (IDSs) rely on computer program behaviors at
operating systems' level to detect malware. Most of these techniques use high semantic …

Hybrid Intrusion Detection System for Wireless Networks

MA Agalit, A Sadiqui, Y Khamlichi… - WITS 2020: Proceedings of …, 2022 - Springer
Local wireless networks (WLAN) are vulnerable to various types of security threats ranging
from session hijacking to denial of service (DoS), and password attacks, to name a few. They …

[图书][B] Risk analysis of the discoverability of personal data used for primary and secondary authentication

KE Richards - 2017 - search.proquest.com
Personal data are frequently leveraged to create passwords for password based
authentication systems. Personal data are also used in secondary authentication systems …

A Hybrid Framework for Effective Intrusion Detection System in Wireless Networks

V Priyalakshmi, R Devi - 2024 IEEE International Conference …, 2024 - ieeexplore.ieee.org
Communication technologies have evolved into new dimensions capable of providing data
access to consumers at will and at high transfer rates. A novel hybrid scheme of IDS has …

[PDF][PDF] Intelligent Zero-Day Intrusion Detection Framework for Internet of Things

A Khraisat - core.ac.uk
Zero-day intrusion detection system faces serious challenges as hundreds of thousands of
new instances of malware are being created every day to cause harm or damage to the …

[PDF][PDF] Botnets: An Unsolvable Problem?

RF McDowell, AM Colarik - Proceedings of the International …, 2017 - andrewcolarik.com
Botnets, large numbers of infected machines used to conduct malicious activity, are posing a
great threat to the Internet. As the numbers of infected machines increases, the risk for both …