Results 71 to 80 of about 14,194 (229)

RRF‐IPS: A Real‐Time Reputation‐Based Intrusion Prevention System

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
RRF‐IPS: A Real‐Time Reputation‐Based Intrusion Prevention System. ABSTRACT With the rapid development of technologies such as cloud computing and the Internet of Things, organizations face the thorny reality that network attacks are becoming increasingly diverse, covert, and intelligent.
Zhenghao Qian   +7 more
wiley   +1 more source

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

Characterizing the IRC-based Botnet Phenomenon [PDF]

open access: yes, 2007
Botnets, networks of compromised machines that can be remotely controlled by an attacker, are one of the most common attack platforms nowadays. They can, for example, be used to launch distributed denial-of-service (DDoS) attacks, steal sensitive ...
Guo, Jinpeng   +4 more
core  

Event Log Correlation for Multi‐Step Attack Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Event log correlation (ELC) is central to detecting multi‐step attacks (MSAD) that unfold across heterogeneous systems and long time horizons. This review synthesises ELC families—mining/sequence, graph learning, provenance/causal correlation, and hybrid LLM‐assisted approaches—through an MSAD‐first lens that ties methods to attack stages and ...
Syed Usman Shaukat   +2 more
wiley   +1 more source

Detecting P2P botnet based on the role of flows

open access: yesTongxin xuebao, 2012
Towards the weaknesses of the existing detection methods of P2P botnet,a novel real-time detection model based on the role of flows was proposed,which was named as RF.According to the characteristics of flows,the model made the flows play the different ...
Yuan-zhang SONG   +4 more
doaj   +2 more sources

Communication‐Security Co‐Design for Federated Learning in Grant‐Free NOMA IoT Networks

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This article presents SA‐PPO, a Security‐Aware Proximal Policy Optimisation framework for federated learning over grant‐free NOMA (non‐orthogonal multiple access) in IoT networks. By jointly optimising access control, resource allocation, and trust‐weighted aggregation using cross‐layer indicators, SA‐PPO enhances both communication reliability and ...
Emmanuel Atebawone   +5 more
wiley   +1 more source

Deep Reinforcement Learning and IoT for Renewable Energy Optimization in Smart Buildings: A Comprehensive Review

open access: yesIET Generation, Transmission &Distribution, Volume 20, Issue 1, January/December 2026.
This paper presents a comprehensive review of Internet of Things (IoT)‐deep reinforcement learning (DRL) integration for smart building energy management, with an emphasis on addressing renewable energy variability, real‐time decision‐making and interoperability challenges.
Tehseen Mazhar   +2 more
wiley   +1 more source

Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review

open access: yesIEEE Access
The proliferation of Internet of Things (IoT) devices has brought about an increased threat of botnet attacks, necessitating robust security measures. In response to this evolving landscape, deep learning (DL)-based intrusion detection systems (IDS) have
Tamara Al-Shurbaji   +7 more
doaj   +1 more source

Artificial Intelligence Applications in Smart Cities: Integrating Communication, Energy Management, Cybersecurity and Internet of Things

open access: yesThe Journal of Engineering, Volume 2026, Issue 1, January/December 2026.
ABSTRACT Smart cities represent transformative urban ecosystems, leveraging advanced technologies to address challenges posed by rapid urbanisation, energy efficiency demands, and sustainability goals. Despite extensive research, a comprehensive and integrated literature analysis combining AI‐based communication, energy management, cybersecurity, and ...
Maaz Tahir Malik   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy