© 2020 IEEE. With the increase of cyber attack risks on critical infrastructures monitored by networked systems, robust Intrusion Detection Systems (IDSs) for protecting the information have become vital. Designing an IDS that performs with maximum accuracy with minimum false alarms is a challenging task. Ensemble method considered as one of the main developments in machine learning in the past decade, it finds an accurate classifier by combining many classifiers. In this paper, an ensemble classification procedure is proposed using Random Forest (RF), DensityBased Spatial Clustering of Applications with Noise (DBSCAN) and Restricted Boltzmann Machine (RBM) as base classifiers. RF, DBSCAN, and RBM techniques have been used for classificatio...
© 2018, Springer International Publishing AG, part of Springer Nature. The main protocol of the Inte...
© 2018 Association for Computing Machinery. Speeding up pattern matching for intrusion detection sys...
© 2017 IEEE. This paper discusses the problem of collusion attacks in Internet of Things (IoT) envir...
Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in which th...
The increased demand for network security nowadays is becoming a crucial strategy. Accordingly, a ne...
Wireless Networks lack clear boundaries which leads to security concerns and vulnerabilities to nume...
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance...
© 2015 IEEE. Intrusion detection systems are widely accepted as one of the main tools for monitoring...
The Internet of Things (IoT) is the fourth technological revolution in the global information indust...
The advent of Internet of Energy (IoE) and the seamless integration of grid operators, power generat...
Due to the absence of distinct boundaries, wireless networks are vulnerable to a variety of intrusio...
Artificial intelligence (AI) is a transformative technology for potential replacement of human tasks...
Cyber-attacks in IoT enabled devices have grown at an alarming rate since the start of the Covid-19 ...
© 2020 IEEE. Cyber-security is indispensable as malicious incidents are ubiquitous on the Internet. ...
© 2019 Elsevier B.V. With the emergence of WSNs in the recent times, providing trustworthy and relia...
© 2018, Springer International Publishing AG, part of Springer Nature. The main protocol of the Inte...
© 2018 Association for Computing Machinery. Speeding up pattern matching for intrusion detection sys...
© 2017 IEEE. This paper discusses the problem of collusion attacks in Internet of Things (IoT) envir...
Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in which th...
The increased demand for network security nowadays is becoming a crucial strategy. Accordingly, a ne...
Wireless Networks lack clear boundaries which leads to security concerns and vulnerabilities to nume...
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance...
© 2015 IEEE. Intrusion detection systems are widely accepted as one of the main tools for monitoring...
The Internet of Things (IoT) is the fourth technological revolution in the global information indust...
The advent of Internet of Energy (IoE) and the seamless integration of grid operators, power generat...
Due to the absence of distinct boundaries, wireless networks are vulnerable to a variety of intrusio...
Artificial intelligence (AI) is a transformative technology for potential replacement of human tasks...
Cyber-attacks in IoT enabled devices have grown at an alarming rate since the start of the Covid-19 ...
© 2020 IEEE. Cyber-security is indispensable as malicious incidents are ubiquitous on the Internet. ...
© 2019 Elsevier B.V. With the emergence of WSNs in the recent times, providing trustworthy and relia...
© 2018, Springer International Publishing AG, part of Springer Nature. The main protocol of the Inte...
© 2018 Association for Computing Machinery. Speeding up pattern matching for intrusion detection sys...
© 2017 IEEE. This paper discusses the problem of collusion attacks in Internet of Things (IoT) envir...