-
21
Towards a minimum universal features set for IoT DDoS attack detection
Published 2025-04-01Get full text
Article -
22
Preventing flow table overflow against denial of service attack in software defined network
Published 2023-02-01Subjects: Get full text
Article -
23
Extracting Optimal Number of Features for Machine Learning Models in Multilayer IoT Attacks
Published 2024-12-01Subjects: “…IoT attacks…”
Get full text
Article -
24
RF-SFAD: A RANDOM FOREST MODEL FOR SELECTIVE FORWARDING ATTACK DETECTION IN MOBILE WIRELESS SENSOR NETWORKS
Published 2025-06-01Subjects: “…mobile wireless sensor networks, random forest algorithm, selective forwarding attack detection, clustering, feature selection.…”
Get full text
Article -
25
Enhanced Deep Autoencoder-Based Reinforcement Learning Model with Improved Flamingo Search Policy Selection for Attack Classification
Published 2025-01-01“…The enhancement of deep reinforcement learning is made by associating a deep autoencoder (AE) and an improved flamingo search algorithm (IFSA) to approximate the Q-function and optimal policy selection. After feature representations, a support vector machine (SVM) classifier, which discriminates the input into normal and attack instances, is employed for classification. …”
Get full text
Article -
26
Optimizing feature selection and deep learning techniques for precise detection of low-rate distributed denial of service (LDDoS) attack
Published 2025-07-01“…Low-rate DDoS refers to the small number of requests to overcome the sudden spikes that disrupt the server.This work aims to improve the detection of two common LDDoS attack types, slowloris and slowhttptest simulated attacks, by optimizing feature selection and utilizing deep learning techniques. …”
Get full text
Article -
27
Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning
Published 2025-01-01Subjects: “…DDoS attack detection…”
Get full text
Article -
28
An Immunology Inspired Flow Control Attack Detection Using Negative Selection with -Contiguous Bit Matching for Wireless Sensor Networks
Published 2015-11-01“…An Anomaly Detection System (ADS) framework inspired from the Human Immune System is implemented in this paper for detecting Sybil attacks in WSNs. This paper implemented an improved, decentralized, and customized version of the Negative Selection Algorithm (NSA) for data flow anomaly detection with learning capability. …”
Get full text
Article -
29
Leveraging federated learning for DoS attack detection in IoT networks based on ensemble feature selection and deep learning models
Published 2025-12-01“…Detecting Denial-of-Service (DoS) attacks in IoT networks is critical for ensuring cybersecurity. …”
Get full text
Article -
30
An Efficient Approach Based on RAE-GAMI-NET for Long Range Attack Detection on Blockchain
Published 2025-01-01Subjects: Get full text
Article -
31
Adversarial Threats to Cloud IDS: Robust Defense With Adversarial Training and Feature Selection
Published 2025-01-01“…To mitigate these vulnerabilities, we explicitly propose a dual-layered defense strategy: (i) adversarial training, explicitly incorporating adversarial examples into model training to improve robustness, and (ii) SHAP-based robust feature selection, explicitly enhancing interpretability and resilience by identifying stable, attack-resistant features. …”
Get full text
Article -
32
A review on recent approaches of Machine Learning, Deep Learning, and Explainable Artificial intelligence in Intrusion Detection Systems
Published 2023-03-01Subjects: “…Datasets. Attacks…”
Get full text
Article -
33
Augmenting cybersecurity through attention based stacked autoencoder with optimization algorithm for detection and mitigation of attacks on IoT assisted networks
Published 2024-12-01Subjects: “…Cybersecurity attack…”
Get full text
Article -
34
Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing
Published 2025-01-01“…Besides, the pair barracuda swarm optimization (PBSO) method is employed to select features optimally. To recognize a DoW attack, the FODWNN-DoWAD method utilizes a deep wavelet neural network (DWNN) model. …”
Get full text
Article -
35
Improving IoT Network Longevity with Attack Repellent Energy (SARE) Algorithm for Energy-Efficient and Secure Routing
Published 2025-01-01“…The proposed Secure Attack Repellent Energy (SARE) algorithm selects CHs based on the K-Nearest Neighbor (KNN) algorithm, which evaluates residual energy by considering the battery voltage attached to each node. …”
Get full text
Article -
36
An explainable analytical approach to heart attack detection using biomarkers and nature-inspired algorithms
Published 2025-12-01Subjects: “…Heart attack prediction…”
Get full text
Article -
37
DDoSNet: Detection and prediction of DDoS attacks from realistic multidimensional dataset in IoT network environment
Published 2024-09-01“…By integrating ABO with the decision tree, a subset of features is selected that maximizes the discrimination between regular network traffic and DDoS attacks. …”
Get full text
Article -
38
-
39
Layout selection for single-axle forced-steering radial mechanism
Published 2024-07-01Get full text
Article -
40
Comparison of selected physical fitness components among male football players of different playing positions
Published 2015-11-01“…The purpose of this study was to examine the level of physical fitness among male football players in relation to their different playing positions i.e. goalkeepers, defenders, midfielders and attackers. A sample of forty (N = 40) male football players (mean ± SD: age 20.45 ± 1.70 years, height 1.84 ± 4.07 m, weight 81.62 ± 5.45 kg, BMI 23.99 ± 1.66m), which includes ten each goalkeepers, defenders, midfielders and attackers, who participated in inter-college competitions of Guru Nanak Dev University, Amritsar, India, was selected. …”
Get full text
Article