2020
DOI: 10.1016/j.jisa.2020.102582
|View full text |Cite
|
Sign up to set email alerts
|

Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
58
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 86 publications
(58 citation statements)
references
References 82 publications
0
58
0
Order By: Relevance
“…Malware has acquired advanced competencies and diversity in features, which significantly raises the importance of cybersecurity. Cybersecurity activities in various organizations have increased (Shamshirband et al, 2020;Shamshirband & Chronopoulos, 2019) due to its vital importance to the aforementioned problem. One of the essential cybersecurity activities is malware analysis.…”
Section: Introductionmentioning
confidence: 99%
“…Malware has acquired advanced competencies and diversity in features, which significantly raises the importance of cybersecurity. Cybersecurity activities in various organizations have increased (Shamshirband et al, 2020;Shamshirband & Chronopoulos, 2019) due to its vital importance to the aforementioned problem. One of the essential cybersecurity activities is malware analysis.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, a meta-heuristic method has derivation-free mechanisms which enables them to optimize problems stochastically. On the other hand, the superior of a meta-heuristic method is its ability to avoid local optima compared to conventional optimization techniques [ 45 , 46 ]. All these advantages can be considered as strengths of the GWO based hybrid models and increase the accuracy of the network.…”
Section: Discussionmentioning
confidence: 99%
“…As depicted in Fig. 5, here we use the forwarding detection method by configuring a firewall or a (stealthy) Intrusion Detection System (IDS) [56] according to the flow rules determined by the controller and check if the switch is forwarding the packets accordingly. • Switch Isolation: while matching the dump data from the switches, each switch is disconnected from its peers if the hash of the flow tables does not match the hash of the updated block in the control-layer chain.…”
Section: B Blockchain-enabled Data Layermentioning
confidence: 99%