Research trends in network-based intrusion detection systems: A review

S Kumar, S Gupta, S Arora - Ieee Access, 2021 - ieeexplore.ieee.org
Network threats and hazards are evolving at a high-speed rate in recent years. Many
mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as …

A highly accurate deep learning based approach for developing wireless sensor network middleware

RA Alshinina, KM Elleithy - IEEE Access, 2018 - ieeexplore.ieee.org
Despite the popularity of wireless sensor networks (WSNs) in a wide range of applications,
security problems associated with them have not been completely resolved. Middleware is …

[PDF][PDF] An efficient hybrid classifier model for anomaly intrusion detection system

AA Shah, MK Ehsan, K Ishaq, Z Ali, MS Farooq - IJCSNS, 2018 - academia.edu
Ensuring security has always been a challenging problem for both customized network
solutions and information systems. Intrusion Detection System (IDS) is playing a very …

Deep learning based hybrid security model in wireless sensor network

NM Saravana Kumar, E Suryaprabha… - Wireless Personal …, 2023 - Springer
Spatial positioning of the sensor nodes in the Wireless Sensor Networks (WSN) promotes
remote monitoring of assets or target area in terms of regulating various environmental …

A hands-off approach to network intrusion detection

Y Ling, M Rosti, G Swanson - 2016 IEEE Systems and …, 2016 - ieeexplore.ieee.org
Networks are inherently vulnerable to attack and we need dynamic detection methods to find
the evergrowing number and types of attacks. We assume that the access pattern of an …

Roc Curve Based Muti_Objective Pso For Outlier Detection Using Hybrid Dragon Fly Optimization.

B Angelin, A Geetha - Turkish Online Journal of Qualitative …, 2021 - search.ebscohost.com
Outlier detection is a fundamental advance in the information mining measure. Its principle
reason to eliminate the contrary information from the first information. This cycle helps in the …

[PDF][PDF] Distributed Intelligent Intrusion Detection System

MJ Joselin, MAM Yasin, MM Ashiq - researchgate.net
The branch of security barriers of the computer system has been always a better concern in
the information technology era. The intrusions and attacks seem to come from different …

A critical analysis on intrusion detection techniques

S Wange, SK Sahu, A Mishra - International Journal of …, 2016 - search.proquest.com
An intrusion detection system (IDS) is an application platform that records system fuss for
malicious activities and management of these activities. It is a malicious attack identification …