-
1
Text Select-Backdoor: Selective Backdoor Attack for Text Recognition Systems
Published 2024-01-01“…In a backdoor attack, an attacker employs a specific trigger to initiate the attack. …”
Get full text
Article -
2
Accurate detection of selective forwarding attack in wireless sensor networks
Published 2019-01-01“…Selective forwarding attack in wireless sensor networks shows great impact on network performance and consumes limited energy resource. …”
Get full text
Article -
3
Hybridization of Swarm for Features Selection to Modeling Heart Attack Data
Published 2022-12-01“…In order to model the data, set in which the features were selected, it was proposed to use the boosting (Catboost) as a classifier for predicting heart attacks. …”
Get full text
Article -
4
Sybil-Resilient Publisher Selection Mechanism in Blockchain-Based MCS Systems
Published 2025-01-01“…This article proposes a novel two-phase publisher selection mechanism to mitigate Sybil attacks in BMCS systems. …”
Get full text
Article -
5
Defense strategies selection based on attack-defense evolutionary game model
Published 2017-01-01“…Due to that the current network security researches based on game theory mostly use the completely rationality assumption,which is not consistent with the facts.Under the bounded rationality constraint of network attack-defense,attack-defense evolutionary game model and a method to solve evolutionary stable equilibrium based on the non-cooperative evolutionary game theory was proposed.The optimal defense strategy selection algorithm was designed based on the analysis of the evolutionary stable strategy.The effectiveness of the model and method proposed is verified by simulation results,through which some evolution conclusions of offensive behavior on the premise of limited rationality were drawn.…”
Get full text
Article -
6
Research on filter-based adversarial feature selection against evasion attacks
Published 2023-07-01Subjects: “…adversarial feature selection…”
Get full text
Article -
7
Improving Attack Detection in IoV with Class Balancing and Feature Selection
Published 2025-03-01“…This study investigates the enhancement of detection efficiency for DoS and spoofing attacks in IoV by employing Ensemble Learning methods combined with feature selection techniques. …”
Get full text
Article -
8
Cyber-attacks to critical energy infrastructure and management issues: overview of selected cases
Published 2020-09-01Get full text
Article -
9
A Comprehensive Analysis of Feature Selection and Classification Techniques for Web Attack Classification
Published 2025-04-01Get full text
Article -
10
Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures
Published 2012-01-01“…In this paper, a well-known attack selective forwarding attack will be studied in network coding systems. …”
Get full text
Article -
11
An attack detection method based on deep learning for internet of things
Published 2025-08-01Subjects: Get full text
Article -
12
Developing a hybrid feature selection method to detect botnet attacks in IoT devices
Published 2024-07-01Subjects: Get full text
Article -
13
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
Published 2024-01-01“…However, the effectiveness of CADS is highly dependent on selecting pertinent features. This research evaluates the impact of three feature selection techniques—Recursive Feature Elimination (RFE), Mutual Information (MI), and Lasso Feature Selection (LFS)—on CADS performance. …”
Get full text
Article -
14
MACHINE LEARNING BASED STRATEGY FOR MITM ATTACK MITIGATION UTILIZING HYBRID FEATURE SELECTION
Published 2025-03-01“…Effective detection techniques are necessary due to the considerable threat posed by Man-in-the-Middle (MITM) attacks to network security. This study integrates machine learning classification, dimensionality reduction, and hybrid feature selection to present a novel approach for MITM threat identification. …”
Get full text
Article -
15
-
16
Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection
Published 2025-06-01“… ABSTRACT: In the realm of cybersecurity, the increasing sophistication of cyber-attacks demands the creation of sophisticated intrusion detection systems (IDS) designed to accurately detect and counteract threats in real-time. …”
Get full text
Article -
17
Website defense strategy selection method based on attack-defense game and Monte Carlo simulation
Published 2018-08-01“…Aiming at the selection of security defense strategy in network attack-defense,the dynamic change process of mutual influence between attack-defense strategy was studied.Based on the game process of both offense and defense,the attack-defense game model was constructed,the attack process of the attacker based on Monte Carlo simulation was simulated and the attacker’s best attack utility was obtained,so as to calculate the best defensive utility of the defender.In order to maximize the effectiveness of network security defense,the optimal defense strategy under limited resources was implemented.Simulation experiments verify the effectiveness of the proposed method and analyze the influence of different parameter settings on the selection of defense strategy.…”
Get full text
Article -
18
Intelligent intrusion detection system based on crowd search optimization for attack classification in network security
Published 2025-07-01“…In comparison to the various state-of-the-art classifiers, the CSO method was applied to the NSL-KDD dataset and the ROSPaCe dataset for the detection of the attacks. In the proposed work, we have used a random forest technique to perform feature selection (FS) to improve the effectiveness and efficiency of intrusion detection. …”
Get full text
Article -
19
Real-Time Power System Event Detection: A Novel Instance Selection Approach
Published 2023-01-01Subjects: Get full text
Article -
20
RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework
Published 2023-10-01“…Many efforts are being put into developing defenses against these types of attacks. The tools used by attackers to perform these types of attacks increase day-to-day. …”
Get full text
Article