In this chapter we will concentrate on the detection ... an intrusion is any set of actions that attempt to compromise the integrity, confidentiality, or availability of a computer resource. First, we ...
In the research, a blockchain based federated learning architecture is established. All participate entities perform model ...
We evaluate the performance of the BLS models by employing datasets from the Canadian Institute for Cybersecurity Intrusion (CIC) Detection System (CICIDS2017) and the collaborative project between ...
In Internet of Things, the network devices have been more vulnerable to various intrusion attacks. Most of the existing algorithms are trained in a ...