Search Results - "Ikram, Sumaiya Thaseen"
-
1
Intrusion Detection Model Using Fusion Of Chi-Square Feature Selection And Multi Class SVM
Published in Journal of King Saud University. Computer and information sciences (01-10-2017)“…Intrusion detection is a promising area of research in the domain of security with the rapid development of internet in everyday life. Many intrusion detection…”
Get full text
Journal Article -
2
An Intelligent Waste Management Application Using IoT and a Genetic Algorithm–Fuzzy Inference System
Published in Applied sciences (01-03-2023)“…The Internet of Things (IoT) is being used to create new applications for smart cities. Waste management is one issue that requires various IoT components for…”
Get full text
Journal Article -
3
Improving Accuracy of Intrusion Detection Model Using PCA and optimized SVM
Published in Journal of computing and information technology (01-06-2016)“…Intrusion detection is very essential for providing security to different network domains and is mostly used for locating and tracing the intruders. There are…”
Get full text
Journal Article Paper -
4
Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier
Published in The Journal of supercomputing (01-05-2022)“…Several organizations are implementing large-scale Internet of Things (IoT)-based ecosystems, such as Industrial IoT (IIoT). Such systems are vulnerable to new…”
Get full text
Journal Article -
5
Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models
Published in Cybernetics and information technologies : CIT (01-09-2021)“…Intrusion Detection Systems (IDSs) utilise deep learning techniques to identify intrusions with maximum accuracy and reduce false alarm rates. The feature…”
Get full text
Journal Article -
6
Live video streaming service with pay-as-you-use model on Ethereum Blockchain and InterPlanetary file system
Published in Wireless networks (01-10-2022)“…In centralized video streaming platforms, the platform owner, rather than the content producer, controls most of the content uploaded on the centralized video…”
Get full text
Journal Article -
7
DAIDNet: A Lightweight Domain-Aware Architecture for Automated Detection of Network Penetrations
Published in IEEE eTransactions on network and service management (01-06-2024)“…Intrusion detection and prevention has been an area of active research in the use of machine learning for cyber security practices. Artificial Neural Networks…”
Get full text
Journal Article -
8
Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models
Published in Cybernetics and information technologies : CIT (01-09-2021)“…Intrusion Detection Systems (IDSs) utilise deep learning techniques to identify intrusions with maximum accuracy and reduce false alarm rates. The feature…”
Get full text
Journal Article