Towards fuzzy anomaly detection-based security: a comprehensive review

M Masdari, H Khezri - Fuzzy Optimization and Decision Making, 2021 - Springer
In the data security context, anomaly detection is a branch of intrusion detection that can
detect emerging intrusions and security attacks. A number of anomaly detection systems …

[PDF][PDF] Cyber-Security Audit for Smart Grid Networks: An Optimized Detection Technique Based on Bayesian Deep Learning.

AN Ndife, Y Mensin, W Rakwichian… - J. Internet Serv. Inf …, 2022 - researchgate.net
Security of computers, networks and their communication protocols are vital in smart grid
technology operation and its management. This paper discusses a proposed Bayesian …

Anomaly-based intrusion detection systems for mobile ad hoc networks: A practical comprehension

SR Valiveti, A Manglani, T Desai - International Journal of Systems …, 2021 - igi-global.com
Ad hoc networks are used in heterogeneous environments like tactical military applications,
where no centrally coordinated infrastructure is available. The network is required to perform …

[PDF][PDF] The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set.

RH Dong, DF Wu, QY Zhang - Int. J. Netw. Secur., 2017 - academia.edu
The intrusion detection methods used in the industrial control network generally have a
higher false positive rate. Considering this issue and improving the detection performance of …

[HTML][HTML] HYBRID NETWORK INTRUSION DETECTION SYSTEMS: A SYSTEMATIC REVIEW

A Seiba, G Abdul-Salaam, Y Missah… - Scientific and practical …, 2023 - journal.scsa.ge
Network Security has become a major concern to governments, businesses and individuals
all over the world as cybercriminals continuously attack networks and cause harm to …

Survey on Deep learning based Network Intrusion Detection and Prevention Systems

MAT Padmasiri, VVV Ganepola, R Herath… - 2020 - 192.248.104.6
Where world is moving towards digitalization, it is crucial that network intrusions detection
and prevention is addresses in ordered to create a secured network. This paper covers why …

Website Security Assessment for Xizang Universities Using ANFIS-PSO Model

X Guo, P Zhou, Q Zhang - 2021 7th International Conference …, 2021 - ieeexplore.ieee.org
Due to the different methods of network security risk assessment, there are large differences
in results. Many of universities in Xizang areas cannot combine IDS alert information with …