2021
DOI: 10.3390/su132212337
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems

Abstract: Machine learning (ML) is one of the dominating technologies practiced in both the industrial and academic domains throughout the world. ML algorithms can examine the threats and respond to intrusions and security incidents swiftly in an instinctive way. It plays a critical function in providing a proactive security mechanism in the cybersecurity domain. Cybersecurity ensures the real time protection of information, information systems, and networks from intruders. Several security and privacy reports have cite… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 25 publications
(71 reference statements)
0
2
0
Order By: Relevance
“…Their outcomes showcased the framework’s efficacy in selecting reliable and secure alternatives among IoMT systems. Alharbi et al [ 22 ] conducted an idealness assessment of machine learning-based IDS under hesitant fuzzy conditions, utilizing AHP and TOPSIS. Their approach assists machine learning practitioners in selecting and prioritizing attributes for intrusion detection systems.…”
Section: Related Workmentioning
confidence: 99%
“…Their outcomes showcased the framework’s efficacy in selecting reliable and secure alternatives among IoMT systems. Alharbi et al [ 22 ] conducted an idealness assessment of machine learning-based IDS under hesitant fuzzy conditions, utilizing AHP and TOPSIS. Their approach assists machine learning practitioners in selecting and prioritizing attributes for intrusion detection systems.…”
Section: Related Workmentioning
confidence: 99%
“…We use the EBM-I-C, input-oriented under the assumption of constant returns-to-scale in DEA (Alghassab, 2022;Alharbi et al, 2021;Bian & Yang, 2010;Bin Arfaj et al, 2022;Chen et al, 2022;Chen & He, 2017;Chen et al, 2018;Chen et al, 2019), to evaluate the effectiveness of each cybersecurity company. This part's financial data from 2020 is shown in Table 2.…”
Section: Evaluation Of Dmus' Performancementioning
confidence: 99%