Search Results - Network Intrusion Detection - Memory Efficient Algorithms

Refine Results
  1. 1

    Efficient Pattern Matching Algorithm for Memory Architecture by Lin, Cheng-Hung, Chang, Shih-Chieh

    ISSN: 1063-8210, 1557-9999
    Published: New York, NY IEEE 01.01.2011
    “… In order to accommodate the increasing number of attack patterns and meet the throughput requirement of networks, a successful network intrusion detection system must have a memory-efficient pattern…”
    Get full text
    Journal Article
  2. 2

    Unified Deep Learning approach for Efficient Intrusion Detection System using Integrated Spatial–Temporal Features by Rajesh Kanna, P, Santhi, P

    ISSN: 0950-7051, 1872-7409
    Published: Amsterdam Elsevier B.V 17.08.2021
    Published in Knowledge-based systems (17.08.2021)
    “…Intrusion detection systems (IDS) differentiate the malicious entries from the legitimate entries in network traffic data and helps in securing the networks…”
    Get full text
    Journal Article
  3. 3

    Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities by Saheed, Yakub Kayode, Abdulganiyu, Oluwadamilare Harazeem, Tchakoucht, Taha Ait

    ISSN: 1568-4946, 1872-9681
    Published: Elsevier B.V 01.04.2024
    Published in Applied soft computing (01.04.2024)
    “…The emergence of smart cities is an example of how new technologies, such as the Internet of Things (IoT), have facilitated the creation of extensive…”
    Get full text
    Journal Article
  4. 4

    IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism by Laghrissi, FatimaEzzahra, Douzi, Samira, Douzi, Khadija, Hssina, Badr

    ISSN: 2196-1115, 2196-1115
    Published: Cham Springer International Publishing 29.11.2021
    Published in Journal of big data (29.11.2021)
    “… Hackers commonly conduct network attacks to alter, damage, or steal private data. Intrusion detection systems (IDS…”
    Get full text
    Journal Article
  5. 5

    Hybrid Intrusion Detection using MapReduce based Black Widow Optimized Convolutional Long Short-Term Memory Neural Networks by Kanna, P. Rajesh, Santhi, P.

    ISSN: 0957-4174, 1873-6793
    Published: New York Elsevier Ltd 15.05.2022
    Published in Expert systems with applications (15.05.2022)
    “… These online systems can utilize Intrusion Detection Systems (IDS) to ensure their trustworthiness by preventing cyber security threats…”
    Get full text
    Journal Article
  6. 6

    An efficient network behavior anomaly detection using a hybrid DBN-LSTM network by Chen, Aiguo, Fu, Yang, Zheng, Xu, Lu, Guoming

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.03.2022
    Published in Computers & security (01.03.2022)
    “… The application of machine learning and deep learning methods has significantly improved the performance of network behavior anomaly detection (NBAD…”
    Get full text
    Journal Article
  7. 7

    An improved long short term memory network for intrusion detection by Awad, Asmaa Ahmed, Ali, Ahmed Fouad, Gaber, Tarek

    ISSN: 1932-6203, 1932-6203
    Published: United States Public Library of Science 01.08.2023
    Published in PloS one (01.08.2023)
    “…Over the years, intrusion detection system has played a crucial role in network security by discovering attacks from network traffics and generating an alarm signal to be sent to the security team…”
    Get full text
    Journal Article
  8. 8

    Intrusion Detection for Cybersecurity of Smart Meters by Sun, Chih-Che, Sebastian Cardenas, D. Jonathan, Hahn, Adam, Liu, Chen-Ching

    ISSN: 1949-3053, 1949-3061
    Published: Piscataway IEEE 01.01.2021
    Published in IEEE transactions on smart grid (01.01.2021)
    “… In this paper, a two-stage cyber intrusion protection system is proposed. At the first stage of intrusion detection, a Support Vector Machine (SVM…”
    Get full text
    Journal Article
  9. 9

    (IoT) Network intrusion detection system using optimization algorithms by Shan, Luo

    ISSN: 2045-2322, 2045-2322
    Published: London Nature Publishing Group UK 01.07.2025
    Published in Scientific reports (01.07.2025)
    “…To address the complex requirements of network intrusion detection in IoT environments, this study proposes a hybrid intelligent framework that integrates the Whale Optimization Algorithm (WOA…”
    Get full text
    Journal Article
  10. 10

    NSGTO‐LSTM: Niche‐strategy‐based gorilla troops optimization and long short‐term memory network intrusion detection model by Anchuri, Saritha, Ganesh, A., Perugu, Prathusha

    ISSN: 1225-6463, 2233-7326
    Published: Electronics and Telecommunications Research Institute (ETRI) 01.12.2025
    Published in ETRI journal (01.12.2025)
    “… In this study, an efficient intrusion detection (ID) system is implemented by using both machine learning and data mining concepts for detecting intrusion patterns…”
    Get full text
    Journal Article
  11. 11

    Efficient Intrusion Detection System in the Cloud Using Fusion Feature Selection Approaches and an Ensemble Classifier by Bakro, Mhamad, Kumar, Rakesh Ranjan, Alabrah, Amerah A., Ashraf, Zubair, Bisoy, Sukant K., Parveen, Nikhat, Khawatmi, Souheil, Abdelsalam, Ahmed

    ISSN: 2079-9292, 2079-9292
    Published: Basel MDPI AG 27.05.2023
    Published in Electronics (Basel) (27.05.2023)
    “… Therefore, there is a need for a proper mechanism for detecting cloud intrusions. In this paper, we have proposed a cloud intrusion detection system (IDS…”
    Get full text
    Journal Article
  12. 12

    Memory-Efficient Deep Learning for Botnet Attack Detection in IoT Networks by Popoola, Segun I., Adebisi, Bamidele, Ande, Ruth, Hammoudeh, Mohammad, Atayero, Aderemi A.

    ISSN: 2079-9292, 2079-9292
    Published: Basel MDPI AG 01.05.2021
    Published in Electronics (Basel) (01.05.2021)
    “… Recent research works have recommended the use of Deep Recurrent Neural Network (DRNN) for botnet attack detection in IoT networks…”
    Get full text
    Journal Article
  13. 13

    Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN by Malik, Jahanzaib, Akhunzada, Adnan, Bibi, Iram, Imran, Muhammad, Musaddiq, Arslan, Kim, Sung Won

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2020
    Published in IEEE access (2020)
    “…) and Convolutional Neural Network (CNN) for an efficient and timely detection of multi-vector threats and attacks…”
    Get full text
    Journal Article
  14. 14

    Cyber resilient framework with energy efficient swarm routing and ensemble threat detection in fog assisted wireless sensor networks by Upadhiyay, Anant, Jain, Abhishek

    ISSN: 2045-2322, 2045-2322
    Published: London Nature Publishing Group UK 17.10.2025
    Published in Scientific reports (17.10.2025)
    “…) algorithm with an ensemble-based Intrusion Detection System (IDS). The routing layer employs a multi-objective cost function that jointly considers distance, residual energy, and security risk…”
    Get full text
    Journal Article
  15. 15

    Deterministic memory-efficient string matching algorithms for intrusion detection by Tuck, N., Sherwood, T., Calder, B., Varghese, G.

    ISBN: 0780383559, 9780780383555
    ISSN: 0743-166X
    Published: Piscataway, New Jersey IEEE 2004
    Published in 2004 IEEE Infocom (2004)
    “…Intrusion detection systems (IDSs) have become widely recognized as powerful tools for identifying, deterring and deflecting malicious attacks over the network…”
    Get full text
    Conference Proceeding
  16. 16

    Intrusion detection system for controller area network by Tanksale, Vinayak

    ISSN: 2523-3246, 2523-3246
    Published: Singapore Springer Nature Singapore 01.12.2024
    Published in Cybersecurity (Singapore) (01.12.2024)
    “… The goal of this research is to design, implement, and test an efficient and effective intrusion detection system for intra-vehicle CANs…”
    Get full text
    Journal Article
  17. 17

    Improved perturbation based hybrid firefly algorithm and long short-term memory based intelligent security model for IoT network intrusion detection by Nayak, Janmenjoy, Priyadarshani, Pooja Puspita, Dash, Pandit Byomakesha

    ISSN: 0045-7906
    Published: Elsevier Ltd 01.01.2025
    Published in Computers & electrical engineering (01.01.2025)
    “… This research introduces an improved Long Short-Term Memory (LSTM) architecture designed to accurately detect attacks in an IoT environment…”
    Get full text
    Journal Article
  18. 18

    LSTM-JSO framework for privacy preserving adaptive intrusion detection in federated IoT networks by Sorour, Shaymaa E., Aljaafari, Mohammed, Shaker, Amany M., Amin, Ahmed E.

    ISSN: 2045-2322, 2045-2322
    Published: London Nature Publishing Group UK 02.04.2025
    Published in Scientific reports (02.04.2025)
    “… The framework dynamically optimizes hyperparameters using the Joint Strategy Optimization (JSO) algorithm, ensuring efficient model adaptation across heterogeneous IoT networks…”
    Get full text
    Journal Article
  19. 19

    Securing SDON with hybrid evolutionary intrusion detection system: An ensemble algorithm for feature selection and classification by J., Benitha Christinal, A., Ameelia Roseline

    ISSN: 1068-5200
    Published: Elsevier Inc 01.09.2025
    Published in Optical fiber technology (01.09.2025)
    “… To address these security issues, this paper proposes an adaptive IDS-SDON-EFSC (Intrusion Detection System for Software-Defined Optical Network with Ensemble Feature Selection and Classification) framework…”
    Get full text
    Journal Article
  20. 20

    Efficient Intrusion Detection Algorithms for Smart Cities-Based Wireless Sensing Technologies by Ramadan, Rabie A.

    ISSN: 2224-2708, 2224-2708
    Published: Basel MDPI AG 01.09.2020
    Published in Journal of sensor and actuator networks (01.09.2020)
    “…The world is experiencing the new development of smart cities. Smart cities’ infrastructure in its core is based on wireless sensor networks (WSNs…”
    Get full text
    Journal Article