An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons

WAHM Ghanem, A Jantan, SAA Ghaleb… - IEEE Access, 2020 - ieeexplore.ieee.org
One of the most persistent challenges concerning network security is to build a model
capable of detecting intrusions in network systems. The issue has been extensively …

A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm

WAHM Ghanem, A Jantan - Neural Computing and Applications, 2020 - Springer
The most pressing issue in network security is the establishment of an approach that is
capable of detecting violations in computer systems and networks. There have been several …

Training a neural network for cyberattack classification applications using hybridization of an artificial bee colony and monarch butterfly optimization

WAHM Ghanem, A Jantan - Neural Processing Letters, 2020 - Springer
Arguably the most recurring issue concerning network security is building an approach that
is capable of detecting intrusions into network systems. This issue has been addressed in …

Smart vulnerability assessment for scientific cyberinfrastructure: An unsupervised graph embedding approach

S Ullman, S Samtani, B Lazarine, H Zhu… - … on Intelligence and …, 2020 - ieeexplore.ieee.org
The accelerated growth of computing technologies has provided interdisciplinary teams a
platform for producing innovative research at an unprecedented speed. Advanced scientific …

A holistic IoT device classification approach through spatial & temporal behaviors modelling

Y Aun, YM Khaw, ML Gan - Telecommunication Systems, 2022 - Springer
Traffic management is becoming increasingly complex due to the increasing diversity of IoT
platforms and protocols supported by heterogeneous devices. Recently, device …

MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization

JH Jafarian, A Niakanlahiji - Computers & Security, 2023 - Elsevier
Advanced and persistent multi-staged intrusion attacks are usually conducted by elite well-
resourced cyber threat actors with the goal of bypassing the defense-in-depth and zoning …

[PDF][PDF] Privacy and security concerns in electronic commerce websites in Ghana: a survey study

I Baako, S Umar, P Gidisu - International Journal of Computer …, 2019 - mecs-press.net
This paper examines the privacy and security issues on electronic commerce websites in
Ghana. Ghana is reported to have an Internet users‟ rate of 27.8% and a mobile Internet …

[PDF][PDF] NEW APPROACH TO IMPROVE ANOMALY DETECTION USING A NEURAL NETWORK OPTIMIZED BY HYBRID ABC AND PSO ALGORITHMS.

WAHM Ghanem, A Jantan - Pakistan Journal of Statistics, 2018 - researchgate.net
Intrusion detection is one of the most significant concerns in network safety. Improvements
have been proposed from various perspectives. One such proposal is improving the …

Swarm intelligence and neural network for data classification

WAHM Ghanem, A Jantan - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Classification process is one of the most important operations implemented on the huge
data warehouses in order to classify the data. Availability of huge amounts of data increased …

[PDF][PDF] Framework for Cybersecurity Centers to Mass Scan Networks.

WM Eid, S Atawneh, M Al-Akhras - Intelligent Automation & Soft …, 2020 - cdn.techscience.cn
The huge number of devices available in cyberspace and the increasing number of security
vulnerabilities discovered daily have added many difficulties in keeping track of security …