• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Mahadevappa P, Murugesan RK, Al-amri R, Thabit R, Al-Ghushami AH, Alkawsi G. A secure edge computing model using machine learning and IDS to detect and isolate intruders. MethodsX 2024;12:102597. [PMID: 38379716 PMCID: PMC10877948 DOI: 10.1016/j.mex.2024.102597] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/16/2023] [Accepted: 01/31/2024] [Indexed: 02/22/2024]  Open
2
Mahindru A, Arora H, Kumar A, Gupta SK, Mahajan S, Kadry S, Kim J. PermDroid a framework developed using proposed feature selection approach and machine learning techniques for Android malware detection. Sci Rep 2024;14:10724. [PMID: 38730228 DOI: 10.1038/s41598-024-60982-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/14/2023] [Accepted: 04/29/2024] [Indexed: 05/12/2024]  Open
3
Mogollón Gutiérrez Ó, Sancho Núñez JC, Ávila M, Caro A. A detailed study of resampling algorithms for cyberattack classification in engineering applications. PeerJ Comput Sci 2024;10:e1975. [PMID: 38660195 PMCID: PMC11041950 DOI: 10.7717/peerj-cs.1975] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/12/2023] [Accepted: 03/11/2024] [Indexed: 04/26/2024]
4
Wang Z, Ghaleb FA, Zainal A, Siraj MM, Lu X. An efficient intrusion detection model based on convolutional spiking neural network. Sci Rep 2024;14:7054. [PMID: 38528084 DOI: 10.1038/s41598-024-57691-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/25/2024] [Accepted: 03/20/2024] [Indexed: 03/27/2024]  Open
5
Wardana AA, Kołaczek G, Warzyński A, Sukarno P. Ensemble averaging deep neural network for botnet detection in heterogeneous Internet of Things devices. Sci Rep 2024;14:3878. [PMID: 38365928 PMCID: PMC10873349 DOI: 10.1038/s41598-024-54438-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/25/2023] [Accepted: 02/13/2024] [Indexed: 02/18/2024]  Open
6
Naqvi SSA, Li Y, Uzair M. DDoS attack detection in smart grid network using reconstructive machine learning models. PeerJ Comput Sci 2024;10:e1784. [PMID: 38259891 PMCID: PMC10803083 DOI: 10.7717/peerj-cs.1784] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/22/2023] [Accepted: 12/07/2023] [Indexed: 01/24/2024]
7
Emanet S, Karatas Baydogmus G, Demir O. An ensemble learning based IDS using Voting rule: VEL-IDS. PeerJ Comput Sci 2023;9:e1553. [PMID: 37810337 PMCID: PMC10557513 DOI: 10.7717/peerj-cs.1553] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/04/2023] [Accepted: 08/04/2023] [Indexed: 10/10/2023]
8
Wang Z, Chen H, Yang S, Luo X, Li D, Wang J. A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization. PeerJ Comput Sci 2023;9:e1569. [PMID: 37810346 PMCID: PMC10557502 DOI: 10.7717/peerj-cs.1569] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/01/2023] [Accepted: 08/14/2023] [Indexed: 10/10/2023]
9
Abbas Q, Hina S, Sajjad H, Zaidi KS, Akbar R. Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems. PeerJ Comput Sci 2023;9:e1552. [PMID: 37705624 PMCID: PMC10496009 DOI: 10.7717/peerj-cs.1552] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/26/2023] [Accepted: 08/03/2023] [Indexed: 09/15/2023]
10
Dobrojevic M, Zivkovic M, Chhabra A, Sani NS, Bacanin N, Mohd Amin M. Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach. PeerJ Comput Sci 2023;9:e1405. [PMID: 37409075 PMCID: PMC10319270 DOI: 10.7717/peerj-cs.1405] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/23/2023] [Accepted: 04/27/2023] [Indexed: 07/07/2023]
11
Hassan F, Yu J, Syed ZS, Ahmed N, Reshan MSA, Shaikh A. Achieving model explainability for intrusion detection in VANETs with LIME. PeerJ Comput Sci 2023;9:e1440. [PMID: 37409077 PMCID: PMC10319271 DOI: 10.7717/peerj-cs.1440] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/13/2023] [Accepted: 05/24/2023] [Indexed: 07/07/2023]
12
Diaba SY, Elmusrati M. Proposed algorithm for smart grid DDoS detection based on deep learning. Neural Netw 2023;159:175-184. [PMID: 36577364 DOI: 10.1016/j.neunet.2022.12.011] [Citation(s) in RCA: 5] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/16/2022] [Revised: 10/27/2022] [Accepted: 12/14/2022] [Indexed: 12/24/2022]
13
Mvula PK, Branco P, Jourdan GV, Viktor HL. A systematic literature review of cyber-security data repositories and performance assessment metrics for semi-supervised learning. Discov Data 2023;1:4. [PMID: 37038388 PMCID: PMC10079755 DOI: 10.1007/s44248-023-00003-x] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/27/2023] [Accepted: 03/21/2023] [Indexed: 04/12/2023]
14
Zivkovic M, Tair M, K V, Bacanin N, Hubálovský Š, Trojovský P. Novel hybrid firefly algorithm: an application to enhance XGBoost tuning for intrusion detection classification. PeerJ Comput Sci 2022;8:e956. [PMID: 35634110 PMCID: PMC9137854 DOI: 10.7717/peerj-cs.956] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/03/2022] [Accepted: 04/01/2022] [Indexed: 06/15/2023]
15
Gujral H, Sharma A, Jain P, Juneja S, Mittal S. Design and Implementation of a Quantitative Network Health Monitoring and Recovery System. Wirel Pers Commun 2022;125:367-397. [PMID: 35370363 PMCID: PMC8951673 DOI: 10.1007/s11277-022-09554-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 01/23/2022] [Indexed: 06/14/2023]
16
Kantzavelou I, Maglaras L, Tzikopoulos PF, Katsikas S. A multiplayer game model to detect insiders in wireless sensor networks. PeerJ Comput Sci 2022;8:e791. [PMID: 35174260 PMCID: PMC8802792 DOI: 10.7717/peerj-cs.791] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/06/2020] [Accepted: 11/01/2021] [Indexed: 06/14/2023]
17
Amraoui N, Zouari B. Anomalous behavior detection-based approach for authenticating smart home system users. Int J Inf Secur 2021;21:611-636. [PMID: 34840546 PMCID: PMC8605774 DOI: 10.1007/s10207-021-00571-6] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
18
Wang W, Harrou F, Bouyeddou B, Senouci SM, Sun Y. A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems. Cluster Comput 2021;25:561-578. [PMID: 34629940 PMCID: PMC8490144 DOI: 10.1007/s10586-021-03426-w] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 03/05/2021] [Revised: 09/09/2021] [Accepted: 09/17/2021] [Indexed: 06/13/2023]
19
Hsu CY, Wang S, Qiao Y. Intrusion detection by machine learning for multimedia platform. Multimed Tools Appl 2021;80:29643-29656. [PMID: 34248394 PMCID: PMC8260568 DOI: 10.1007/s11042-021-11100-x] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/05/2020] [Revised: 04/27/2021] [Accepted: 05/21/2021] [Indexed: 06/01/2023]
20
Binbusayyis A, Vaiyapuri T. Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection. Heliyon 2020;6:e04262. [PMID: 32685709 PMCID: PMC7355994 DOI: 10.1016/j.heliyon.2020.e04262] [Citation(s) in RCA: 12] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/13/2019] [Revised: 05/06/2020] [Accepted: 06/17/2020] [Indexed: 01/17/2023]  Open
21
Ghanem TF, Elkilani WS, Abdul-Kader HM. A hybrid approach for efficient anomaly detection using metaheuristic methods. J Adv Res 2015;6:609-19. [PMID: 26199752 DOI: 10.1016/j.jare.2014.02.009] [Citation(s) in RCA: 43] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]  Open
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA