-
1
Accurate detection of selective forwarding attack in wireless sensor networks
Published 2019-01-01“…Moreover, to prevent collaborative selective forwarding attack, E-watchdog uses reports from more than one detection agents. …”
Get full text
Article -
2
Improving Attack Detection in IoV with Class Balancing and Feature Selection
Published 2025-03-01“…This study investigates the enhancement of detection efficiency for DoS and spoofing attacks in IoV by employing Ensemble Learning methods combined with feature selection techniques. …”
Get full text
Article -
3
An attack detection method based on deep learning for internet of things
Published 2025-08-01Subjects: Get full text
Article -
4
Developing a hybrid feature selection method to detect botnet attacks in IoT devices
Published 2024-07-01Subjects: Get full text
Article -
5
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
Published 2024-01-01Subjects: “…Network-based intrusion detection system…”
Get full text
Article -
6
Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection
Published 2025-06-01“… ABSTRACT: In the realm of cybersecurity, the increasing sophistication of cyber-attacks demands the creation of sophisticated intrusion detection systems (IDS) designed to accurately detect and counteract threats in real-time. …”
Get full text
Article -
7
RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework
Published 2023-10-01“…For this reason, this thesis utilized one of the most recent datasets (CSE-CICIDS2018 and CIC-DDoS2019) containing most Dos/DDoS attacks. This study proposed a framework based on Machine Learning for detecting denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. …”
Get full text
Article -
8
Towards a minimum universal features set for IoT DDoS attack detection
Published 2025-04-01Get full text
Article -
9
Intelligent intrusion detection system based on crowd search optimization for attack classification in network security
Published 2025-07-01“…In comparison to the various state-of-the-art classifiers, the CSO method was applied to the NSL-KDD dataset and the ROSPaCe dataset for the detection of the attacks. In the proposed work, we have used a random forest technique to perform feature selection (FS) to improve the effectiveness and efficiency of intrusion detection. …”
Get full text
Article -
10
Real-Time Power System Event Detection: A Novel Instance Selection Approach
Published 2023-01-01Subjects: Get full text
Article -
11
RF-SFAD: A RANDOM FOREST MODEL FOR SELECTIVE FORWARDING ATTACK DETECTION IN MOBILE WIRELESS SENSOR NETWORKS
Published 2025-06-01Subjects: “…mobile wireless sensor networks, random forest algorithm, selective forwarding attack detection, clustering, feature selection.…”
Get full text
Article -
12
Text Select-Backdoor: Selective Backdoor Attack for Text Recognition Systems
Published 2024-01-01“…In a backdoor attack, an attacker employs a specific trigger to initiate the attack. …”
Get full text
Article -
13
An Efficient Approach Based on RAE-GAMI-NET for Long Range Attack Detection on Blockchain
Published 2025-01-01Subjects: Get full text
Article -
14
Network Attack Detection for Business Safety
Published 2024-03-01“…In this paper, a machine learning-based approach was developed to detect network attacks. Two Machine learning models were used: Support vector machine and Artificial neural network. …”
Get full text
Article -
15
About Detection of Code Reuse Attacks
Published 2019-06-01“…At the heart of these attacks lies the detection, in the vulnerable program of suitable areas, of executable code — gadgets — and chaining these gadgets into chains. …”
Get full text
Article -
16
Android collusion attack detection model
Published 2018-06-01“…In order to solve the problem of poor efficiency and low accuracy of Android collusion detection,an Android collusion attack model based on component communication was proposed.Firstly,the feature vector set was extracted from the known applications and the feature vector set was generated.Secondly,the security policy rule set was generated through training and classifying the privilege feature set.Then,the component communication finite state machine according to the component and communication mode feature vector set was generated,and security policy rule set was optimized.Finally,a new state machine was generated by extracting the unknown application’s feature vector set,and the optimized security policy rule set was matched to detect privilege collusion attacks.The experimental results show that the proposed model has better detective efficiency and higher accuracy.…”
Get full text
Article -
17
-
18
Detecting LDoS attack based on ASPQ
Published 2012-05-01“…Based on the analysis of the effects on average size of packet in the queue which LDoS attack makes,the change of this value was got by simulation on NS2.So detection algorithm was proposed,and was applied on Droptail and RED,which were typical queue management algorithm.The result of simulation shows that the algorithm can effectively detect the LDoS attack.…”
Get full text
Article -
19
An explainable analytical approach to heart attack detection using biomarkers and nature-inspired algorithms
Published 2025-12-01Subjects: “…Heart attack prediction…”
Get full text
Article -
20
Optimizing feature selection and deep learning techniques for precise detection of low-rate distributed denial of service (LDDoS) attack
Published 2025-07-01“…Low-rate DDoS refers to the small number of requests to overcome the sudden spikes that disrupt the server.This work aims to improve the detection of two common LDDoS attack types, slowloris and slowhttptest simulated attacks, by optimizing feature selection and utilizing deep learning techniques. …”
Get full text
Article