We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 658 results
  1. Analysis and Implementation of Normalisation Techniques on KDD’99 Data Set for IDS and IPS

    The rapid expansion of the Internet, numerous types of network attacks have emerged, making the ability to identify aberrant behaviour and accurately...
    Conference paper 2023
  2. Intrusion Classification and Detection System Using Machine Learning Models on NSL-KDD Dataset

    Intrusion detection systems are crucial to cyberattack protection. This paper presents an intrusion detection system (IDS) architecture that uses...
    Conference paper 2024
  3. Enhancing Accuracy with Recursive Feature Selection Using Multiple Machine Learning and Deep Learning Techniques on NSL-KDD Dataset

    The world has moved toward digital revolution and more and more services are now being available online. This has presented significant challenges in...
    Subrat Mohanty, Satendra Kumar, Mayank Agarwal in Advances in Data-Driven Computing and Intelligent Systems
    Conference paper 2024
  4. A Statistical Analysis on KDD Cup’99 Dataset for the Network Intrusion Detection System

    Knowledge Discovery and Data Mining Tools Competition (KDD Cup’99) has been used on prior choice by researchers for the purpose of research and...
    Satish Kumar, Sunanda, Sakshi Arora in Applied Soft Computing and Communication Networks
    Chapter 2020
  5. Toward support-vector machine-based ant colony optimization algorithms for intrusion detection

    One of the major challenges of network traffic analysis is intrusion detection. Intrusion detection systems (IDSs) are designed to detect malicious...

    Ahmed Abdullah Alqarni in Soft Computing
    Article 28 February 2023
  6. An Optimal Cluster Based Intrusion Detection System for Defence Against Attack in Web and Cloud Computing Environments

    In recent years, the rapid growth of information technology organizations causes ability to meet their demands such as scalability, mobility and...

    K. G. Maheswari, C. Siva, G. Nalini Priya in Wireless Personal Communications
    Article 26 September 2022
  7. HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT

    Critical Industries such as Manufacturing, Power, and Intelligent Transportation are increasingly using IIoT systems, making them more susceptible to...

    Kumar Saurabh, Vaidik Sharma, ... O. P. Vyas in Arabian Journal for Science and Engineering
    Article 10 July 2024
  8. Intrusion Detection System Using Supervised Machine Learning

    The whole world is joining the Internet because our world is moving toward digitalization. Internet/networks are significant today on the planet;...
    Shubham Kumar, Khundrakpam Johnson Singh in Recent Advances in Electrical and Electronic Engineering
    Conference paper 2024
  9. Optimization of BPN parameters using PSO for intrusion detection in cloud environment

    The usage of internet is getting increased in all aspect, like from building various models that are fully connect with internet to the usage of...

    G. Nagarajan, P. J. Sajith in Soft Computing
    Article 21 June 2023
  10. Fog computing-based IoT-enabled system security for electrical vehicles in the smart grid

    Wireless sensor networks (WSNs) face significant challenges related to dependability, integrity, and confidentiality due to their widespread...

    Sanjay Kumar Sonker, Vibha Kaw Raina, ... Ramesh C. Bansal in Electrical Engineering
    Article 09 February 2024
  11. Security and scalability issues in big data analytics in heterogeneous networks

    Big data is most widely used in many applications to overcome the issues in various domains. The processing of huge and complicated data becomes more...

    S. Uma Maheswara Rao, L. Lakshmanan in Soft Computing
    Article 16 March 2023
  12. Comparative Analysis of Anomaly-Based Intrusion Detection System on Artificial Intelligence

    Network security (NS) has now become critical in securing the computing infrastructure of government and industry. A current intrusion detection...
    Conference paper 2023
  13. Energy-aware ACO-DNN optimization model for intrusion detection of unmanned aerial vehicle (UAVs)

    In modern militaries the Unmanned Aerial Vehicles (UAVs) are used for war fighting and also for certain civilian applications such as law...

    Jitendra Kumar Samriya, Mohit Kumar, Rajeev Tiwari in Journal of Ambient Intelligence and Humanized Computing
    Article 12 August 2022
  14. Machine Learning Approach to the Internet of Things Threat Detection

    The development in software, hardware and communication technologies has made the broadcasting of sensory data collected from various devices very...
    Alka Upadhyay, Sameena Naaz, ... Iffat Rehman Ansari in Data Science and Network Engineering
    Conference paper 2024
  15. Real-Time Intrusion Detection in Connected Autonomous Vehicles

    Connected autonomous vehicles (a.k.a CAVs) have shown a new paradigm in the transportation field by reducing cost, managing traffic and efficiently...
    Anjanee Kumar, Tanmoy Kanti Das in Inventive Systems and Control
    Conference paper 2023
  16. Evaluating the Performance of Various SVM Kernel Functions Based on Basic Features Extracted from KDDCUP'99 Dataset by Random Forest Method for Detecting DDoS Attacks

    The main goal of Denial of Service (DoS) attack is to restrict authorized users from gaining access to available services and resources or to prevent...

    Kaushik Adhikary, Shashi Bhushan, ... Kamlesh Dutta in Wireless Personal Communications
    Article 27 October 2021
  17. Designing a System Using Features Selection Based on Filter Methods and XGBoost Classifier for Detecting Intrusion in Cloud

    Recently, with the accelerating growth of using cloud computing and its related services in various aspects, the difficulty of ensuring cybersecurity...
    Conference paper 2024
  18. Fusion-based anomaly detection system using modified isolation forest for internet of things

    In recent years, advanced threat and zero day attacks are increasing significantly, but the traditional network intrusion detection system based on...

    Orieb AbuAlghanam, Hadeel Alazzam, ... Omar Adwan in Journal of Ambient Intelligence and Humanized Computing
    Article 10 September 2022
  19. Intrusion Attack Detection Using Firefly Optimization Algorithm and Ensemble Classification Model

    In recent decades, the Internet of Things (IoTs) based network intrusion detection (ID) remains a challenging research topic. Currently, several...

    Rekha Gangula, Murali Mohan Vutukuru, M. Ranjeeth Kumar in Wireless Personal Communications
    Article 21 August 2023
  20. A distributed platform for intrusion detection system using data stream mining in a big data environment

    With the growth of computer networks worldwide, there has been a greater need to protect local networks from malicious data that travel over the...

    Fábio César Schuartz, Mauro Fonseca, Anelise Munaretto in Annals of Telecommunications
    Article 08 June 2024
Did you find what you were looking for? Share feedback.