To design and develop AI-based cybersecurity systems (e.g., intrusion detection system (IDS)), users can justifiably trust, one needs to evaluate the impact of trust using machine learning and deep learning technologies. To guide the design and implementation of trusted AI-based systems in IDS, this paper provides a comparison among machine learning and deep learning models to investigate the trust impact based on the accuracy of the trusted AI-based systems regarding the malicious data in IDs. The four machine learning techniques are decision tree (DT), K nearest neighbour (KNN), random forest (RF), and naïve Bayes (NB). The four deep learning techniques are LSTM (one and two layers) and GRU (one and two layers). Two datasets are used to c...
In today's digital world, the tremendous amount of data poses a significant challenge to cyber secur...
Protecting computer systems and network against various types of attacks by malicious individual or ...
Protecting computer systems and network against various types of attacks by malicious individual or ...
Because of the increased emphasis on cyber security in today's world, intrusion detection systems (I...
In recent years, due to the emergence of boundless communication paradigm and increased number of ne...
Despite the growing popularity of machine learning models in the cyber-security applications (e.g., ...
The quality or state of being secure is the crucial concern of our daily life usage of any network. ...
The quick progress in the web and networking domains has taken place by means of a huge growth of th...
Nowadays, the ever-increasing complication and severity of security attacks on computer networks hav...
With the growing rate of cyber-attacks , there is a significant need for intrusion detection system...
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the ...
In this paper, we present a comparative evaluation of deep learning approaches to network intrusion ...
The rapid growth of the Internet and communications has resulted in a huge increase in transmitted d...
In this paper, we present a survey of deep learning approaches for cybersecurity intrusion detection...
In this paper, we present a survey of deep learning approaches for cybersecurity intrusion detection...
In today's digital world, the tremendous amount of data poses a significant challenge to cyber secur...
Protecting computer systems and network against various types of attacks by malicious individual or ...
Protecting computer systems and network against various types of attacks by malicious individual or ...
Because of the increased emphasis on cyber security in today's world, intrusion detection systems (I...
In recent years, due to the emergence of boundless communication paradigm and increased number of ne...
Despite the growing popularity of machine learning models in the cyber-security applications (e.g., ...
The quality or state of being secure is the crucial concern of our daily life usage of any network. ...
The quick progress in the web and networking domains has taken place by means of a huge growth of th...
Nowadays, the ever-increasing complication and severity of security attacks on computer networks hav...
With the growing rate of cyber-attacks , there is a significant need for intrusion detection system...
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the ...
In this paper, we present a comparative evaluation of deep learning approaches to network intrusion ...
The rapid growth of the Internet and communications has resulted in a huge increase in transmitted d...
In this paper, we present a survey of deep learning approaches for cybersecurity intrusion detection...
In this paper, we present a survey of deep learning approaches for cybersecurity intrusion detection...
In today's digital world, the tremendous amount of data poses a significant challenge to cyber secur...
Protecting computer systems and network against various types of attacks by malicious individual or ...
Protecting computer systems and network against various types of attacks by malicious individual or ...