Abstract—Many companies start using could systems and services to increase their productivity and decrease the cost by migrating their applications, infrastructures, and data to external cloud platforms. Using cloud systems leads to raise the number of attacks on such systems. Protecting these cloud platforms from different attacks becomes an essential task using Intrusion detection systems (IDS). In general, IDS is used to detect normal or abnormal network traffic packets. In this paper, we proposed a hybrid intelligent IDS system based on a onedimensional Convolution Neural Network (1D-CNN) and Binary Particle swarm Optimization (BPSO). BPSO is employed as a wrapper feature selection to determine the most valuable features and reduce the ...
With the rising use of Internet technologies around the world, the number of network intruders and a...
Intrusion detection has become a main part of network security due to the huge number of attacks whi...
intrusion detection Abstract. BP neural network has two disadvantages, one is to fall into local min...
At present times, Cloud Computing (CC) becomes more familiar in several domains such as education, m...
AbstractCloud computing provides a framework for supporting end users easily attaching powerful serv...
Cloud computing (CC) is becoming an essential technology worldwide. This approach represents a revol...
Intrusion detection systems (IDS) are crucial for network security because they enable detection of ...
Today, cloud computing has become popular among users in organizations and companies. Security and e...
Ever growing Internet causes the availability of information. However, it also provides a suitable s...
Information security is an issue of global concern nowadays. The complexity, accessibility, and exte...
The increased adoption of cloud computing resources produces major loopholes in cloud computing for ...
Cybersecurity experts estimate that cyber-attack damage cost will rise tremendously. The massive uti...
At present data transmission widely uses wireless network framework for transmitting large volume of...
All attacks in a computer network begin with an intruder\u27s action of affecting the services provi...
Abstract: Network Intrusion Detection has been an active area of research with the growing incidence...
With the rising use of Internet technologies around the world, the number of network intruders and a...
Intrusion detection has become a main part of network security due to the huge number of attacks whi...
intrusion detection Abstract. BP neural network has two disadvantages, one is to fall into local min...
At present times, Cloud Computing (CC) becomes more familiar in several domains such as education, m...
AbstractCloud computing provides a framework for supporting end users easily attaching powerful serv...
Cloud computing (CC) is becoming an essential technology worldwide. This approach represents a revol...
Intrusion detection systems (IDS) are crucial for network security because they enable detection of ...
Today, cloud computing has become popular among users in organizations and companies. Security and e...
Ever growing Internet causes the availability of information. However, it also provides a suitable s...
Information security is an issue of global concern nowadays. The complexity, accessibility, and exte...
The increased adoption of cloud computing resources produces major loopholes in cloud computing for ...
Cybersecurity experts estimate that cyber-attack damage cost will rise tremendously. The massive uti...
At present data transmission widely uses wireless network framework for transmitting large volume of...
All attacks in a computer network begin with an intruder\u27s action of affecting the services provi...
Abstract: Network Intrusion Detection has been an active area of research with the growing incidence...
With the rising use of Internet technologies around the world, the number of network intruders and a...
Intrusion detection has become a main part of network security due to the huge number of attacks whi...
intrusion detection Abstract. BP neural network has two disadvantages, one is to fall into local min...