Detection model for ambiguous intrusion using SMOTE and LSTM for network security
In today's interconnected world, networks play a crucial role. Consequently, network security has become increasingly vital. To ensure network security, various methods are employed, including digital signatures, firewalls, and intrusion detection. Among these methods, intrusion detection syste...
Saved in:
Main Authors: | Khalaf, Al-Ogaidi Ali Hameed, Mohamed, Raihani, Abdul Raziff, Abdul Rafiez |
---|---|
Format: | Article |
Language: | English English |
Published: |
Semarak Ilmu Publishing
2024
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/115980/1/115980_Detection%20model%20for%20ambiguous%20intrusion.pdf http://irep.iium.edu.my/115980/2/115980_Detection%20model%20for%20ambiguous%20intrusion_SCOPUS.pdf http://irep.iium.edu.my/115980/ https://semarakilmu.com.my/journals/index.php/applied_sciences_eng_tech/article/view/3895 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Detection model for ambiguous intrusion using SMOTE and LSTM for Network Security
by: Khalaf, Al-Ogaidi Ali Hameed, et al.
Published: (2024) -
A prototype for network intrusion detection system using danger theory
by: Al-Dhubhani, Raed, et al.
Published: (2015) -
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014) -
Identification of information security threats using data mining approach in campus network
by: Awang, Norkhushaini, et al.
Published: (2020) -
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)