2020
DOI: 10.1007/s12083-020-00999-y
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of intrusion detection in cyber attacks using DEEP learning neural networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 33 publications
(12 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…Lezzi et al (2018) demonstrated that effective cybersecurity practices decrease the threat of cyberattacks and protect systems from unauthorized access. Scholars (McCormac et al, 2017; Kumar et al, 2021) emphasized that the organizations' technological capabilities alone are not enough to secure strong cybersecurity systems; developing technical human resource skills through education and training is essential to establishing robust organizational security.…”
Section: Research Model and Hypotheses Developmentmentioning
confidence: 99%
See 2 more Smart Citations
“…Lezzi et al (2018) demonstrated that effective cybersecurity practices decrease the threat of cyberattacks and protect systems from unauthorized access. Scholars (McCormac et al, 2017; Kumar et al, 2021) emphasized that the organizations' technological capabilities alone are not enough to secure strong cybersecurity systems; developing technical human resource skills through education and training is essential to establishing robust organizational security.…”
Section: Research Model and Hypotheses Developmentmentioning
confidence: 99%
“…Addae et al (2016) proposed a behavioral cybersecurity model based on behavioral theories to identify factors affecting the individuals' cybersecurity behavior. Kumar et al (2021) used the human-organization-technology (HOT) theory as a means by which to identify the drivers required to enrich cybersecurity at the organizational level. The HOT theory was initially designed for the analysis of health information systems (Yusof et al, 2008).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Alotaibi and Alotaibi proposed an abnormal traffic detection method based on a deep neural network, which can identify the normal or abnormal connections in the network, and the detection effect is good [11]. Kumar et al proposed a deep neural network ID system based on context LSTM (Long Short-term Memory Networks) [12]. Firstly, the original data is obtained by social media on the internet, from which the push-level bots are detected, and then the context features are extracted and detected by LSTM.…”
Section: Id System Researchmentioning
confidence: 99%
“…To achieve the desired e ect, we simply need to set and adjust the parameters of the particle system according to the characteristics of special e ects during the development process. e time it takes to write and develop code can be cut in half while achieving special e ects, and good results have been obtained [12].…”
Section: Scene Modelingmentioning
confidence: 99%