Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Ghada Abdelmoumin"'
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 3, Iss 4, Pp 706-743 (2023)
Training-anomaly-based, machine-learning-based, intrusion detection systems (AMiDS) for use in critical Internet of Things (CioT) systems and military Internet of Things (MioT) environments may involve synthetic data or publicly simulated data due to
Externí odkaz:
https://doaj.org/article/65ca8173ae8f4623bb318c48e54dce5f
Publikováno v:
IEEE Internet of Things Journal. 9:4280-4290
Anomaly-based machine learning-enabled intrusion detection systems (AML-IDS) show low performance and prediction accuracy while detecting intrusions in the Internet of Things (IoT) than that of deep learning-based intrusion detection systems (DL-IDS)
Publikováno v:
Electronics; Volume 11; Issue 2; Pages: 213
Electronics, Vol 11, Iss 213, p 213 (2022)
Electronics, Vol 11, Iss 213, p 213 (2022)
An effective anomaly-based intelligent IDS (AN-Intel-IDS) must detect both known and unknown attacks. Hence, there is a need to train AN-Intel-IDS using dynamically generated, real-time data in an adversarial setting. Unfortunately, the public datase
Autor:
Ghada Abdelmoumin, Danda B. Rawat
Publikováno v:
Proceedings of the Future Technologies Conference (FTC) 2021, Volume 1 ISBN: 9783030899059
Traditional intrusion detection systems (IDSs) are not scalable and efficient in detecting intrusions in IoT systems; hence, protecting them against cyber-attacks. The need to secure the Internet of Things (IoT) platforms deployable at a large scale
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0cee3ac20b7e1f0eef90d6cdf0dcd7c3
https://doi.org/10.1007/978-3-030-89906-6_28
https://doi.org/10.1007/978-3-030-89906-6_28
Autor:
Noha Hazzazi, Ghada Abdelmoumin
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030430191
In this paper, we investigate several modern distributed operating systems (DiOSs) and their security policies and mechanisms. We survey the various security and protection issues present in DiOSs and review strategies and techniques used by DiOSs to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1d0f51e9db4cb4847e89718d35c0f062
https://doi.org/10.1007/978-3-030-43020-7_20
https://doi.org/10.1007/978-3-030-43020-7_20