Zobrazeno 1 - 10
of 291
pro vyhledávání: '"intrusion detection systems (ids)"'
Publikováno v:
Iraqi Journal for Computer Science and Mathematics, Vol 5, Iss 3 (2024)
Wireless Sensor Networks (WSNs) have been securing a big position in the new aspect of security network attacks, where these suffer from various serious cyber threats that can play with their data integrity and reliability. Due to the key importance
Externí odkaz:
https://doaj.org/article/f08af5fb33c748be9d8abc1ef102cdc9
Publikováno v:
Proceedings on Engineering Sciences, Vol 6, Iss 1, Pp 311-320 (2024)
Effective intrusion detection systems (IDS) are becoming essential for maintaining computer network security due to the growing complexity of cyber-attacks. Machine Learning (ML) can increase the effectiveness of intrusion detection technology, which
Externí odkaz:
https://doaj.org/article/f4eea0a4cd9241769880e1da3e25f2e6
Publikováno v:
IEEE Access, Vol 12, Pp 134837-134851 (2024)
This paper proposes a novel Convolutional Kolmogorov-Arnold Network (CKAN) model for Intrusion Detection Systems (IDS) in an IoT environment. The CKAN model is developed by replacing the Multi-Layer Perceptrons (MLPs) layers with Kolmogorov-Arnold Ne
Externí odkaz:
https://doaj.org/article/d38326fa4b4141ca9945be35351b05f2
Publikováno v:
IEEE Access, Vol 12, Pp 113842-113854 (2024)
In the last decade, with the increase in cyberattacks the privacy of network traffic has become a critical issue. Currently, simple network intrusion detection techniques are inefficient in terms of time complexity and are characterized by low detect
Externí odkaz:
https://doaj.org/article/8df1999bddc14034b8f61145f76b5ce9
Publikováno v:
IEEE Access, Vol 12, Pp 88146-88173 (2024)
Open Radio Access Network (RAN) introduces a groundbreaking industry standard for Radio Access Networks, fostering vendor interoperability and network flexibility through open interfaces while leveraging network softwarization, Artificial, and Machin
Externí odkaz:
https://doaj.org/article/b3e16bcc82b34effaeaa814aedd93a89
Autor:
A. Biju, S. Wilfred Franklin
Publikováno v:
Automatika, Vol 65, Iss 1, Pp 108-116 (2024)
Because of the recent development of various intrusion detection systems (IDS), which defend computer networks from security as well as privacy threats. The confidentiality, integrity and also availability of data may be compromised in the case that
Externí odkaz:
https://doaj.org/article/e2b59b85a53343528a8c2595c5830f57
Autor:
Nair, Divya, Mhavan, Neeta
Publikováno v:
Smart Analytics, Artificial Intelligence and Sustainable Performance Management in a Global Digitalised Economy
Publikováno v:
Jordanian Journal of Computers and Information Technology, Vol 9, Iss 4, Pp 360-376 (2023)
In the epoch of digital transformation, cloud computing remains paramount, acting as the linchpin for a plethora of services from enterprise solutions to day-to-day consumer applications. Yet, its expansive nature has invariably rendered it susceptib
Externí odkaz:
https://doaj.org/article/7b74856aed204589b4e029f63369796c
Publikováno v:
IEEE Open Journal of the Industrial Electronics Society, Vol 4, Pp 629-642 (2023)
Smart grids (SGs), a cornerstone of modern power systems, facilitate efficient management and distribution of electricity. Despite their advantages, increased connectivity and reliance on communication networks expand their susceptibility to cyber th
Externí odkaz:
https://doaj.org/article/0e68e616b0eb44b6842d7239a4a18f95
Autor:
Mousa'B Mohammad Shtayat, Mohammad Kamrul Hasan, Rossilawati Sulaiman, Shayla Islam, Atta Ur Rehman Khan
Publikováno v:
IEEE Access, Vol 11, Pp 115047-115061 (2023)
Ensuring the security of critical Industrial Internet of Things (IIoT) systems is of utmost importance, with a primary focus on identifying cyber-attacks using Intrusion Detection Systems (IDS). Deep learning (DL) techniques are frequently utilized i
Externí odkaz:
https://doaj.org/article/73f9daa7867d4ea687adfbbd3a03bda1