Intelligent Transportation Systems (ITS), mainly Autonomous Vehicles (AV\u27s), are susceptible to security and safety problems that risk the users\u27 lives. Sophisticated threats can damage the security of AV\u27s communications and computational capabilities, slowing down their integration into our daily lives. Cyber-attacks are getting more complex, posing greater hurdles in identifying intrusions effectively. Failing to prevent the intrusions could tarnish the security services\u27 reliability, including data confidentiality, authenticity, and reliability. IDS is an overall prediction paradigm for detecting malicious network traffic in the ITS. This article studies the role of machine or deep learning in Software Defined-Intrusion Dete...
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering....
© 2020 John Wiley & Sons, Ltd Malware analysis and detection over the Android have been the focus of...
© 2014 IEEE. This article proposes a novel methodology to detect malicious uniform resource locators...
Intelligent Transportation Systems (ITS), mainly Autonomous Vehicles (AV\u27s), are susceptible to s...
Cyber-attacks in IoT enabled devices have grown at an alarming rate since the start of the Covid-19 ...
Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in which th...
The use of intrusion detection systems (IDS) has become crucial for modern networks. To ensure the t...
The increased demand for network security nowadays is becoming a crucial strategy. Accordingly, a ne...
Due to the absence of distinct boundaries, wireless networks are vulnerable to a variety of intrusio...
Artificial intelligence (AI) is a transformative technology for potential replacement of human tasks...
Detecting criminal activity online is not a new concept but how it can occur is changing. Technology...
Artificial intelligence (AI) is a well-established branch of computer science concerned with making ...
Wireless Networks lack clear boundaries which leads to security concerns and vulnerabilities to nume...
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in defensive cyber...
Copyright © 2020, IGI Global. In this article, the authors propose a deep learning framework for mal...
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering....
© 2020 John Wiley & Sons, Ltd Malware analysis and detection over the Android have been the focus of...
© 2014 IEEE. This article proposes a novel methodology to detect malicious uniform resource locators...
Intelligent Transportation Systems (ITS), mainly Autonomous Vehicles (AV\u27s), are susceptible to s...
Cyber-attacks in IoT enabled devices have grown at an alarming rate since the start of the Covid-19 ...
Volunteer computing uses Internet-connected devices (laptops, PCs, smart devices, etc.), in which th...
The use of intrusion detection systems (IDS) has become crucial for modern networks. To ensure the t...
The increased demand for network security nowadays is becoming a crucial strategy. Accordingly, a ne...
Due to the absence of distinct boundaries, wireless networks are vulnerable to a variety of intrusio...
Artificial intelligence (AI) is a transformative technology for potential replacement of human tasks...
Detecting criminal activity online is not a new concept but how it can occur is changing. Technology...
Artificial intelligence (AI) is a well-established branch of computer science concerned with making ...
Wireless Networks lack clear boundaries which leads to security concerns and vulnerabilities to nume...
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in defensive cyber...
Copyright © 2020, IGI Global. In this article, the authors propose a deep learning framework for mal...
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering....
© 2020 John Wiley & Sons, Ltd Malware analysis and detection over the Android have been the focus of...
© 2014 IEEE. This article proposes a novel methodology to detect malicious uniform resource locators...