Skip to Content
You are currently on the new version of our website. Access the old version .

1,747 Results Found

  • Article
  • Open Access
2,044 Views
71 Pages

Neural Network IDS/IPS Intrusion Detection and Prevention System with Adaptive Online Training to Improve Corporate Network Cybersecurity, Evidence Recording, and Interaction with Law Enforcement Agencies

  • Serhii Vladov,
  • Victoria Vysotska,
  • Svitlana Vashchenko,
  • Serhii Bolvinov,
  • Serhii Glubochenko,
  • Andrii Repchonok,
  • Maksym Korniienko,
  • Mariia Nazarkevych and
  • Ruslan Herasymchuk

Thise article examines the reliable online detection and IDS/IPS intrusion prevention in dynamic corporate networks problems, where traditional signature-based methods fail to keep pace with new and evolving attacks, and streaming data is susceptible...

  • Article
  • Open Access
14 Citations
3,698 Views
28 Pages

XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System

  • Maiada M. Mahmoud,
  • Yasser Omar Youssef and
  • Ayman A. Abdel-Hamid

8 January 2025

The rapid evolution of technologies such as the Internet of Things (IoT), 5G, and cloud computing has exponentially increased the complexity of cyber attacks. Modern Intrusion Detection Systems (IDSs) must be capable of identifying not only frequent,...

  • Article
  • Open Access
6 Citations
3,030 Views
21 Pages

WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches

  • Shehla Gul,
  • Sobia Arshad,
  • Sanay Muhammad Umar Saeed,
  • Adeel Akram and
  • Muhammad Awais Azam

27 December 2024

The rise in cyber security issues has caused significant harm to tech world and thus society in recent years. Intrusion detection systems (IDSs) are crucial for the detection and the mitigation of the increasing risk of cyber attacks. False and disre...

  • Article
  • Open Access
643 Views
21 Pages

23 November 2025

The Internet of Medical Things (IoMT) integrates sensors, medical devices, and Internet of Things (IoT) technologies to provide data-driven healthcare systems. The systems facilitate medical monitoring and decision-making; however, there are signific...

  • Article
  • Open Access
95 Citations
8,524 Views
21 Pages

10 February 2023

Cloud computing (CC) is becoming an essential technology worldwide. This approach represents a revolution in data storage and collaborative services. Nevertheless, security issues have grown with the move to CC, including intrusion detection systems...

  • Article
  • Open Access
35 Citations
11,642 Views
20 Pages

24 November 2023

This article examines intrusion detection systems in depth using the CSE-CIC-IDS-2018 dataset. The investigation is divided into three stages: to begin, data cleaning, exploratory data analysis, and data normalization procedures (min-max and Z-score)...

  • Article
  • Open Access
2 Citations
3,133 Views
16 Pages

26 July 2020

In an underwater acoustic cellular (UAC) system, underwater equipment or sensor nodes need to detect the identity of an underwater base station (UBS) and synchronise it with a serving UBS. It is known that, in an underwater acoustic channel, the temp...

  • Review
  • Open Access
8 Citations
5,460 Views
12 Pages

Adaptive immunity relies on the V(D)J DNA recombination of immunoglobulin (Ig) and T cell receptor (TCR) genes, which enables the recognition of highly diverse antigens and the elicitation of antigen-specific immune responses. This process is mediate...

  • Article
  • Open Access
1 Citations
1,361 Views
26 Pages

Centralized Two-Tiered Tree-Based Intrusion-Detection System (C2T-IDS)

  • Hisham Abdul Karim Yassine,
  • Mohammed El Saleh,
  • Bilal Ezzeddine Nakhal and
  • Abdallah El Chakik

5 November 2025

The exponential growth of Internet of Things (IoT) devices introduces significant security challenges due to their resource constraints and diverse attack surfaces. To address these issues, this paper proposes the Centralized Two-Tiered Tree-Based In...

  • Article
  • Open Access
6 Citations
2,997 Views
12 Pages

Adaptive IDS for Cooperative Intelligent Transportation Systems Using Deep Belief Networks

  • Sultan Ahmed Almalki,
  • Ahmed Abdel-Rahim and
  • Frederick T. Sheldon

20 July 2022

The adoption of cooperative intelligent transportation systems (cITSs) improves road safety and traffic efficiency. Vehicles connected to cITS form vehicular ad hoc networks (VANET) to exchange messages. Like other networks and systems, cITSs are tar...

  • Article
  • Open Access
18 Citations
4,313 Views
26 Pages

24 October 2023

The importance of network security has become increasingly prominent due to the rapid development of network technology. Network intrusion detection systems (NIDSs) play a crucial role in safeguarding networks from malicious attacks and intrusions. H...

  • Article
  • Open Access
54 Citations
5,171 Views
15 Pages

3 February 2022

Intrusion detection systems based on recurrent neural network (RNN) have been considered as one of the effective methods to detect time-series data of in-vehicle networks. However, building a model for each arbitration bit is not only complex in stru...

  • Article
  • Open Access
2 Citations
2,853 Views
11 Pages

Millimeter-wave (mmWave) bands is considered for fifth-generation (5G) cellular systems because abundant spectrum is available for mobile broadband communications. In mmWave communication systems, accurate beamforming is important to compensate for h...

  • Article
  • Open Access
26 Citations
5,242 Views
34 Pages

24 December 2024

The Internet of Things (IoT) contains many devices that can compute and communicate, creating large networks. Industrial Internet of Things (IIoT) represents a developed application of IoT, connecting with embedded technologies in production in indus...

  • Review
  • Open Access
92 Citations
21,698 Views
27 Pages

A Study of Network Intrusion Detection Systems Using Artificial Intelligence/Machine Learning

  • Patrick Vanin,
  • Thomas Newe,
  • Lubna Luxmi Dhirani,
  • Eoin O’Connell,
  • Donna O’Shea,
  • Brian Lee and
  • Muzaffar Rao

18 November 2022

The rapid growth of the Internet and communications has resulted in a huge increase in transmitted data. These data are coveted by attackers and they continuously create novel attacks to steal or corrupt these data. The growth of these attacks is an...

  • Article
  • Open Access
20 Citations
3,607 Views
21 Pages

Information security is of pivotal concern for consistently streaming information over the widespread internetwork. The bottleneck flow of incoming and outgoing data traffic introduces the issues of malicious activities taken place by intruders, hack...

  • Article
  • Open Access
11 Citations
5,582 Views
23 Pages

Federated XAI IDS: An Explainable and Safeguarding Privacy Approach to Detect Intrusion Combining Federated Learning and SHAP

  • Kazi Fatema,
  • Samrat Kumar Dey,
  • Mehrin Anannya,
  • Risala Tasin Khan,
  • Mohammad Mamunur Rashid,
  • Chunhua Su and
  • Rashed Mazumder

An intrusion detection system (IDS) is a crucial element in cyber security concerns. IDS is a safeguarding module that is designed to identify unauthorized activities in network environments. The importance of constructing IDSs has never been this si...

  • Article
  • Open Access
152 Citations
10,935 Views
35 Pages

A Consolidated Decision Tree-Based Intrusion Detection System for Binary and Multiclass Imbalanced Datasets

  • Ranjit Panigrahi,
  • Samarjeet Borah,
  • Akash Kumar Bhoi,
  • Muhammad Fazal Ijaz,
  • Moumita Pramanik,
  • Yogesh Kumar and
  • Rutvij H. Jhaveri

31 March 2021

The widespread acceptance and increase of the Internet and mobile technologies have revolutionized our existence. On the other hand, the world is witnessing and suffering due to technologically aided crime methods. These threats, including but not li...

  • Article
  • Open Access
1 Citations
5,246 Views
16 Pages

5 June 2019

We have investigated numerically the dynamics of quantum Fisher information (QFI) and quantum entanglement (QE) of a two moving two-level atomic systems interacting with a coherent and thermal field in the presence of intrinsic decoherence (ID) and K...

  • Article
  • Open Access
2,789 Views
28 Pages

Comparison of Culture-Dependent and Culture-Independent Methods for Routine Identification of Airborne Microorganisms in Speleotherapeutic Caves

  • Rok Tomazin,
  • Tjaša Cerar Kišek,
  • Tea Janko,
  • Tina Triglav,
  • Katja Strašek Smrdel,
  • Vesna Cvitković Špik,
  • Andreja Kukec,
  • Janez Mulec and
  • Tadeja Matos

The effective identification of bacterial and fungal isolates is essential for microbiological monitoring in environments like speleotherapeutic caves. This study compares MALDI-TOF MS and the OmniLog ID System, two high-throughput culture-based iden...

  • Article
  • Open Access
5 Citations
4,221 Views
18 Pages

Hydrodynamic Evaluation of Five Influent Distribution Systems in a Cylindrical UASB Reactor Using CFD Simulations

  • Juan F. Cisneros,
  • Fabiola Cobos,
  • Manuel Raul Pelaez-Samaniego,
  • Usman Rehman,
  • Ingmar Nopens and
  • Andrés Alvarado

8 November 2021

UASB reactors are a promising option for environmentally friendly wastewater treatment due to their reduced carbon footprint and their capacity to treat a variety of wastewater strengths, among other recognized advantages over alternative wastewater...

  • Review
  • Open Access
115 Citations
29,563 Views
34 Pages

Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity

  • Pierpaolo Dini,
  • Abdussalam Elhanashi,
  • Andrea Begni,
  • Sergio Saponara,
  • Qinghe Zheng and
  • Kaouther Gasmi

25 June 2023

The Intrusion Detection System (IDS) is an effective tool utilized in cybersecurity systems to detect and identify intrusion attacks. With the increasing volume of data generation, the possibility of various forms of intrusion attacks also increases....

  • Article
  • Open Access
25 Citations
4,963 Views
17 Pages

An Intrusion Detection System (IDS) is a tool used primarily for security monitoring, which is one of the security strategies for Supervisory Control and Data Acquisition (SCADA) systems. Distributed Network Protocol version 3 (DNP3) is the predomina...

  • Article
  • Open Access
324 Views
21 Pages

Dual-Optimized Genetic Algorithm for Edge-Ready IoT Intrusion Detection on Raspberry Pi

  • Khawlah Harasheh,
  • Satinder Gill,
  • Kendra Brinkley,
  • Salah Garada,
  • Dindin Aro Roque,
  • Hayat MacHrouhi,
  • Janera Manning-Kuzmanovski,
  • Jesus Marin-Leal,
  • Melissa Isabelle Arganda-Villapando and
  • Sayed Ahmad Shah Sekandary

25 January 2026

The Internet of Things (IoT) is increasingly deployed at the edge under resource and environmental constraints, which limits the practicality of traditional intrusion detection systems (IDSs) on IoT hardware. This paper presents two IDS configuration...

  • Review
  • Open Access
349 Views
33 Pages

17 January 2026

The aviation sector relies on cooperative surveillance systems such as Automatic Dependent Surveillance-Broadcast (ADS-B) and Remote Identification (RID) to enhance safety and efficiency. However, their open, unencrypted communication protocols make...

  • Article
  • Open Access
155 Citations
12,200 Views
28 Pages

3 February 2022

In recent years, many methods for intrusion detection systems (IDS) have been designed and developed in the research community, which have achieved a perfect detection rate using IDS datasets. Deep neural networks (DNNs) are representative examples a...

  • Article
  • Open Access
14 Citations
6,157 Views
25 Pages

Wearable Sensor Localization Considering Mixed Distributed Sources in Health Monitoring Systems

  • Liangtian Wan,
  • Guangjie Han,
  • Hao Wang,
  • Lei Shu,
  • Nanxing Feng and
  • Bao Peng

12 March 2016

In health monitoring systems, the base station (BS) and the wearable sensors communicate with each other to construct a virtual multiple input and multiple output (VMIMO) system. In real applications, the signal that the BS received is a distributed...

  • Article
  • Open Access
6 Citations
2,605 Views
17 Pages

Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning

  • Muhammad Arsalan Paracha,
  • Muhammad Sadiq,
  • Junwei Liang,
  • Muhammad Hanif Durad and
  • Muhammad Sheeraz

22 June 2023

The advancements and reliance on digital data necessitates dependence on information technology. The growing amount of digital data and their availability over the Internet have given rise to the problem of information security. With the increase in...

  • Article
  • Open Access
28 Citations
5,470 Views
21 Pages

Stacking Ensemble Deep Learning for Real-Time Intrusion Detection in IoMT Environments

  • Easa Alalwany,
  • Bader Alsharif,
  • Yazeed Alotaibi,
  • Abdullah Alfahaid,
  • Imad Mahgoub and
  • Mohammad Ilyas

22 January 2025

The Internet of Medical Things (IoMT) is revolutionizing healthcare by enabling advanced patient care through interconnected medical devices and systems. However, its critical role and sensitive data make it a prime target for cyber threats, requirin...

  • Article
  • Open Access
5 Citations
3,104 Views
28 Pages

DCIDS—Distributed Container IDS

  • Savio Levy Rocha,
  • Fabio Lucio Lopes de Mendonca,
  • Ricardo Staciarini Puttini,
  • Rafael Rabelo Nunes and
  • Georges Daniel Amvame Nze

16 August 2023

Intrusion Detection Systems (IDS) still prevail as an important line of defense in modern computing environments. Cloud environment characteristics such as resource sharing, extensive connectivity, and agility in deploying new applications pose secur...

  • Article
  • Open Access
138 Citations
8,716 Views
21 Pages

16 July 2022

The Industrial Internet of Things (IIoT) has advanced digital technology and the fastest interconnection, which creates opportunities to substantially grow industrial businesses today. Although IIoT provides promising opportunities for growth, the ma...

  • Article
  • Open Access
1,129 Views
29 Pages

25 September 2025

As 5G and beyond networks grow in heterogeneity, complexity, and scale, traditional Intrusion Detection Systems (IDS) struggle to maintain accurate and precise detection mechanisms. A promising alternative approach to this problem has involved the us...

  • Article
  • Open Access
25 Citations
3,603 Views
16 Pages

A Multiple Rényi Entropy Based Intrusion Detection System for Connected Vehicles

  • Ki-Soon Yu,
  • Sung-Hyun Kim,
  • Dae-Woon Lim and
  • Young-Sik Kim

6 February 2020

In this paper, we propose an intrusion detection system based on the estimation of the Rényi entropy with multiple orders. The Rényi entropy is a generalized notion of entropy that includes the Shannon entropy and the min-entropy as spe...

  • Article
  • Open Access
9 Citations
6,186 Views
15 Pages

The Challenge of Emotions—An Experimental Approach to Assess the Emotional Competence of People with Intellectual Disabilities

  • Torsten Hammann,
  • Manuel M. Schwartze,
  • Peter Zentel,
  • Anna Schlomann,
  • Christiane Even,
  • Hans-Werner Wahl and
  • Christian Rietz

16 October 2022

Emotions influence processes of learning and thinking in all people. However, there is a lack of studies in the field of emotion research including people with intellectual disabilities (ID) addressing the existing diversity. The present study invest...

  • Article
  • Open Access
17 Citations
7,988 Views
19 Pages

20 February 2024

This research work highlights significant achievements in the domain of intrusion detection systems (IDSs) for autonomous vehicles, which are crucial in enhancing their safety, reliability, and cybersecurity. This study introduces an approach that le...

  • Article
  • Open Access
31 Citations
5,377 Views
28 Pages

3 March 2020

Applying Software Engineering (SE) processes is vital to critical and complex systems including security and networking systems. Nowadays, Wireless Sensor Networks (WSNs) and their applications are found in many military and civilian systems which ma...

  • Review
  • Open Access
25 Citations
17,751 Views
20 Pages

3 February 2025

In the rapid development of the Internet of Things (IoT) and large-scale distributed networks, Intrusion Detection Systems (IDS) face significant challenges in handling complex spatiotemporal features and addressing data imbalance issues. This articl...

  • Article
  • Open Access
5,207 Views
16 Pages

23 September 2024

The United Arab Emirates (UAE) is a frontrunner in digitalising government services, demonstrating the successful implementation of National Digital Identity (NDI) systems. Unlike many developing nations with varying levels of success with electronic...

  • Article
  • Open Access
9 Citations
3,801 Views
14 Pages

The rapidly increasing use of the internet has led to an increase in new devices and technologies; however, attack and security violations have grown exponentially as well. In order to detect and prevent attacks, an Intrusion Detection System (IDS) i...

  • Article
  • Open Access
113 Citations
22,416 Views
23 Pages

Explainable Artificial Intelligence for Intrusion Detection System

  • Shruti Patil,
  • Vijayakumar Varadarajan,
  • Siddiqui Mohd Mazhar,
  • Abdulwodood Sahibzada,
  • Nihal Ahmed,
  • Onkar Sinha,
  • Satish Kumar,
  • Kailash Shaw and
  • Ketan Kotecha

27 September 2022

Intrusion detection systems are widely utilized in the cyber security field, to prevent and mitigate threats. Intrusion detection systems (IDS) help to keep threats and vulnerabilities out of computer networks. To develop effective intrusion detectio...

  • Article
  • Open Access
2 Citations
2,638 Views
16 Pages

8 January 2022

Recently, the interaction information from reviews has been modeled to acquire representations between users and items and improve the sparsity problem in recommendation systems. Reviews are more responsive to information about users’ preferenc...

  • Review
  • Open Access
33 Citations
12,649 Views
54 Pages

14 December 2023

In recent years, the Internet of Vehicles (IoV) has garnered significant attention from researchers and automotive industry professionals due to its expanding range of applications and services aimed at enhancing road safety and driver/passenger comf...

  • Article
  • Open Access
16 Citations
3,710 Views
29 Pages

Modelling and Simulation of Collaborative Surveillance for Unmanned Traffic Management

  • Juan A. Besada,
  • David Carramiñana,
  • Luca Bergesio,
  • Ivan Campaña and
  • Ana M. Bernardos

15 February 2022

Unmanned traffic management (UTM) systems rely on collaborative position reporting to track unmanned aerial system (UAS) operations over wide unsurveilled (with counter-UAS systems) areas. Many different technologies, such as Remote-ID, ADS-B, FLARM,...

  • Article
  • Open Access
23 Citations
3,069 Views
24 Pages

A Classy Multifacet Clustering and Fused Optimization Based Classification Methodologies for SCADA Security

  • Alaa O. Khadidos,
  • Hariprasath Manoharan,
  • Shitharth Selvarajan,
  • Adil O. Khadidos,
  • Khaled H. Alyoubi and
  • Ayman Yafoz

15 May 2022

Detecting intrusions from the supervisory control and data acquisition (SCADA) systems is one of the most essential and challenging processes in recent times. Most of the conventional works aim to develop an efficient intrusion detection system (IDS)...

  • Article
  • Open Access
73 Citations
8,571 Views
20 Pages

5 January 2024

This study introduces a sophisticated intrusion detection system (IDS) that has been specifically developed for internet of things (IoT) networks. By utilizing the capabilities of long short-term memory (LSTM), a deep learning model renowned for its...

  • Article
  • Open Access
124 Views
18 Pages

The exponential growth of network traffic and the increasing sophistication of cyberattacks have underscored the need for intelligent and real-time Intrusion Detection Systems (IDS). Traditional flow-based IDS models typically analyze each network fl...

  • Article
  • Open Access
31 Citations
8,710 Views
22 Pages

Multi-Layer Hidden Markov Model Based Intrusion Detection System

  • Wondimu K. Zegeye,
  • Richard A. Dean and
  • Farzad Moazzami

The all IP nature of the next generation (5G) networks is going to open a lot of doors for new vulnerabilities which are going to be challenging in preventing the risk associated with them. Majority of these vulnerabilities might be impossible to det...

  • Article
  • Open Access
290 Citations
15,647 Views
27 Pages

Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection

  • Razan Abdulhammed,
  • Hassan Musafer,
  • Ali Alessa,
  • Miad Faezipour and
  • Abdelshakour Abuzneid

The security of networked systems has become a critical universal issue that influences individuals, enterprises and governments. The rate of attacks against networked systems has increased dramatically, and the tactics used by the attackers are cont...

  • Article
  • Open Access
46 Citations
38,349 Views
24 Pages

Drone Detection and Tracking Using RF Identification Signals

  • Driss Aouladhadj,
  • Ettien Kpre,
  • Virginie Deniau,
  • Aymane Kharchouf,
  • Christophe Gransart and
  • Christophe Gaquière

4 September 2023

The market for unmanned aerial systems (UASs) has grown considerably worldwide, but their ability to transmit sensitive information poses a threat to public safety. To counter these threats, authorities, and anti-drone organizations are ensuring that...

  • Article
  • Open Access
42 Citations
9,041 Views
19 Pages

An Architecture for Biometric Electronic Identification Document System Based on Blockchain

  • Rafael Páez,
  • Manuel Pérez,
  • Gustavo Ramírez,
  • Juan Montes and
  • Lucas Bouvarel

11 January 2020

This paper proposes an architecture for biometric electronic identification document (e-ID) system based on Blockchain for citizens identity verification in transactions corresponding to the notary, registration, tax declaration and payment, basic he...

of 35