Anomaly based Intrusion Detection using Modified Fuzzy Clustering
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security has become an increasingly vital field in computer science in response to the proliferation of private sensitive information.
B.S. Harish, S.V.A. Kumar
doaj +1 more source
Interactive Learning for Network Anomaly Monitoring and Detection with Human Guidance in the Loop
With the advancement in big data and cloud computing technology, we have witnessed tremendous developments in applying intelligent techniques in network operation and management.
Dong Yang, Ze Liu, Songjie Wei
doaj +1 more source
Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN
Computer-empowered detection of possible faults for Heating, Ventilation and Air-Conditioning (HVAC) subsystems, e.g., chillers, is one of the most important applications in Artificial Intelligence (AI) integrated Internet of Things (IoT).
Ke Yan, Xiaokang Zhou
doaj +1 more source
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data [PDF]
With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as Intrusion Detection Systems IDSs for detecting the known and ...
Naglaa Ibrahim, Hana Usman
doaj +1 more source
UTILIZING MACHINE LEARNING-BASED INTRUSION DETECTION TECHNOLOGIES FOR NETWORK SECURITY [PDF]
Effective intrusion detection systems (IDS) are becoming essential for maintaining computer network security due to the growing complexity of cyber-attacks.
Rahul Kumar Sharma +3 more
doaj +1 more source
IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism
Network attacks are illegal activities on digital resources within an organizational network with the express intention of compromising systems. A cyber attack can be directed by individuals, communities, states or even from an anonymous source.
FatimaEzzahra Laghrissi +3 more
doaj +1 more source
Secure and Fault-Tolerant IoT-Based Healthcare System for Reliable Decision-Making
Internet of Things (IoT) integration has revolutionized healthcare, offering personalized medical care through remote patient monitoring and telemedicine. However, challenges remain in critical healthcare scenarios, such as data security vulnerabilities
Bashaer Almelehy +3 more
doaj +1 more source
BackgroundSeveral obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information.
Carrión Señor, Inmaculada +2 more
doaj +1 more source
An efficient intrusion detection system for IoT security using CNN decision forest
The adoption and integration of the Internet of Things (IoT) have become essential for the advancement of many industries, unlocking purposeful connections between objects.
Kamal Bella +6 more
semanticscholar +1 more source
Predicting anomalies in computer networks using autoencoder-based representation learning
Recent improvements in the internet of things (IoT), cloud services, and network data variety have increased the demand for complex anomaly detection algorithms in network intrusion detection systems (IDSs) capable of dealing with sophisticated network ...
Shehram Sikander Khan, A. Mailewa
semanticscholar +1 more source

