A survey on intrusion detection systems for fog and cloud computing

V Chang, L Golightly, P Modesti, QA Xu, LMT Doan… - Future Internet, 2022 - mdpi.com
The rapid advancement of internet technologies has dramatically increased the number of
connected devices. This has created a huge attack surface that requires the deployment of …

Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model

S Aljawarneh, M Aldwairi, MB Yassein - Journal of Computational Science, 2018 - Elsevier
Efficiently detecting network intrusions requires the gathering of sensitive information. This
means that one has to collect large amounts of network transactions including high details of …

Adoption of cloud computing as innovation in the organization

L Golightly, V Chang, QA Xu, X Gao… - International Journal of …, 2022 - journals.sagepub.com
Over the years, there has been a heavy reliance on cloud computing as IT has innovated
through time. In recent times cloud computing has grown monumentally. Many organizations …

A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection

V Hajisalem, S Babaie - Computer Networks, 2018 - Elsevier
Due to the widespread use of the internet, computer systems are prone to information theft
that has led to the emergence of Intrusion Detection Systems (IDSs). Various approaches …

Comparing and analyzing applications of intelligent techniques in cyberattack detection

P Dixit, R Kohli, A Acevedo-Duque… - Security and …, 2021 - Wiley Online Library
Now a day's advancement in technology increases the use of automation, mobility, smart
devices, and application over the Internet that can create serious problems for protection …

Application of intrusion detection technology in network safety based on machine learning

W Fang, X Tan, D Wilbur - Safety Science, 2020 - Elsevier
As an important means to ensure network safety, intrusion detection technology can be
much more efficient by introducing machine learning. The present paper proposes a …

Ensemble based approach for intrusion detection using extra tree classifier

BS Bhati, CS Rai - … Computing in Engineering: Select Proceedings of …, 2020 - Springer
With the swift growth of Internet technology, various types of attacks and intrusions are taking
place over the Internet. Intrusion Detection Systems (IDS) are widely used to detect attacks …

Intrusion detection in smart city hospitals using ensemble classifiers

T Saba - 2020 13th International Conference on Developments …, 2020 - ieeexplore.ieee.org
The idea of Internet of Medical Things (IOMT) is used as health intelligence in the smart
hospital to assist medical staff for diagnosis and patient care. Smart hospitals play an …

Nearest neighbors based density peaks approach to intrusion detection

L Li, H Zhang, H Peng, Y Yang - Chaos, Solitons & Fractals, 2018 - Elsevier
Intrusion detection systems are very important for network security. However, traditional
intrusion detection systems can not identify new type of network intrusion for example zero …

Particle swarm optimization based swarm intelligence for active learning improvement: Application on medical data classification

N Zemmal, N Azizi, M Sellami, S Cheriguene… - Cognitive …, 2020 - Springer
Semi-supervised learning targets the common situation where labeled data are scarce but
unlabeled data are abundant. It uses unlabeled data to help supervised learning tasks. In …