Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues.
Shahab ShamshirbandMahdis FathiAnthony T. ChronopoulosAntonio MontieriFabio PalumboAntonio PescapèPublished in: J. Inf. Secur. Appl. (2020)
Keyphrases
- computing environments
- intrusion detection
- computational intelligence
- distributed computing environment
- intrusion detection system
- computing platform
- mobile environments
- anomaly detection
- mobile computing
- network security
- network intrusion detection
- network traffic
- cloud computing
- mobile agents
- information security
- data mining
- fuzzy logic
- detecting anomalous
- artificial immune
- cyber security
- power system
- intelligent systems
- alert correlation
- network intrusion
- high detection rate
- artificial intelligence
- intrusion detection and prevention
- computer security
- fraud detection
- mobile clients
- machine learning
- information systems
- databases
- database systems
- data mining techniques
- network intrusion detection systems
- wireless networks