Design and Implementation of Secure Cloud Storage System based on Hybrid Cryptographic Algorithm DOI
Yuchen Jiang, Jiwei Li, Linfeng Zhang

et al.

Published: Aug. 23, 2024

Language: Английский

Deep learning-based improved transformer model on android malware detection and classification in internet of vehicles DOI Creative Commons
Naif Almakayeel

Scientific Reports, Journal Year: 2024, Volume and Issue: 14(1)

Published: Oct. 24, 2024

With the growing popularity of autonomous vehicles (AVs), confirming their safety has become a significant concern. Vehicle manufacturers have combined Android operating system into AVs to improve consumer comfort. However, diversity and weaknesses pose substantial risks AVs, as these factors can expose them threats, namely malware. The advanced behaviour multi-data source fusion in driving models mitigated recognition accuracy effectualness for To efficiently counter new malware variants, novel techniques distinct from conventional methods must be utilized. Machine learning (ML) cannot detect every complex variant. deep (DL) model is an efficient tool detecting various variants. This manuscript proposes Deep Learning-Based Improved Transformer Model on Malware Detection (DLBITM-AMD) technique Internet (IoVs). main aim presented DLBITM-AMD approach effectually accurately. method performs Z-score normalization process convert raw data standard form. Then, utilizes binary grey wolf optimization (BGWO) select optimum feature subsets. An improved transformer integrated with RNN softmax enhance classification recognition. Finally, snake optimizer algorithm (SOA) employed parameter method. extensive experiment accomplished benchmark dataset. performance validation portrayed superior value 99.26% over existing models.

Language: Английский

Citations

7

An effective IDS using CondenseNet and CoAtNet based approach for SDN-IoT environment DOI

Dimmiti Srinivasa Rao,

Ajith Jubilson Emerson

Computers & Electrical Engineering, Journal Year: 2025, Volume and Issue: 123, P. 110305 - 110305

Published: April 1, 2025

Language: Английский

Citations

0

Optimized efficient predefined time adaptive neural network for stream traffic classification in software defined network DOI

V. Sujatha,

S. Prabakeran

Expert Systems with Applications, Journal Year: 2025, Volume and Issue: unknown, P. 128086 - 128086

Published: May 1, 2025

Language: Английский

Citations

0

A hybrid wrapper technique enabled Network Intrusion Detection System for Software defined networking based IoT networks DOI
Mangayarkarasi Ramaiah, Adla Padma,

Ravula Vishnukumar

et al.

Published: May 3, 2024

Language: Английский

Citations

2

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks DOI Creative Commons

Zaed S. Mahdi,

Rana M. Zaki, Laith Alzubaidi

et al.

Security and Privacy, Journal Year: 2024, Volume and Issue: unknown

Published: Oct. 1, 2024

ABSTRACT The Internet of Things (IoT) represents a vast network devices connected to the Internet, making it easier for users connect modern technology. However, complexity these networks and large volume data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS) attacks spoofing. It has become necessary use intrusion detection systems protect networks. Existing IoT face many problems limitations, including high false alarm rates delayed detection. Also, datasets used training may be outdated or sparse, which reduces model's accuracy, mechanisms not defend when any is detected. To address new hybrid deep learning machine methodology proposed that contributes detecting DDoS spoofing attacks, reducing alarms, then implementing defensive measures. In consists three stages: first stage propose method feature selection consisting techniques (correlation coefficient sequential selector); second model by integrating neural with classifier (cascaded long short‐term memory [LSTM] Naive Bayes classifier); third stage, improving defense blocking ports after threats maintaining integrity. evaluating performance methodology, (CIC‐DDoS2019, CIC‐IoT2023, CIC‐IoV2024) were used, also balanced obtain effective results. accuracy 99.91%, 99.88%, 99.77% was obtained. cross‐validation technique test ensure no overfitting. proven its provides powerful solution enhance security can applied fields other attacks.

Language: Английский

Citations

1

Design and Implementation of Secure Cloud Storage System based on Hybrid Cryptographic Algorithm DOI
Yuchen Jiang, Jiwei Li, Linfeng Zhang

et al.

Published: Aug. 23, 2024

Language: Английский

Citations

0