Open Access
ARTICLE
Sooyong Jeong1,#, Cheolhee Park2,#, Dowon Hong3,*, Changho Seo4
1 Basic Science Research Institution, Kongju National University, Gongju, 32588, Republic of Korea
2 Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, 34129, Republic of Korea
3 Department of Applied Mathematics, Kongju National University, Gongju, 32588, Republic of Korea
4 Department of Convergence Science, Kongju National University, Gongju, 32588, Republic of Korea
* Corresponding Author: Dowon Hong. Email:
# These authors contributed equally to this work
(This article belongs to the Special Issue: AI-Driven Intrusion Detection and Threat Analysis in Cybersecurity)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.072561
Received 29 August 2025; Accepted 20 November 2025; Published online 12 December 2025
View
Download
Like
A Hybrid Approach for Network Intrusion Detection
Mavra Mehmood, Talha Javed, Jamel...Real-Time Network Intrusion Prevention System Using Incremental Feature Generation
Yeongje Uhm, Wooguil PakDevelopment of PCCNN-Based Network Intrusion Detection System for EDGE Computing
Mohd Anul Haq, Mohd Abdul Rahim...Fed-DFE: A Decentralized Function Encryption-Based Privacy-Preserving Scheme for Federated Learning
Zhe Sun, Jiyuan Feng, Lihua Yin,...Trustworthiness Evaluation for Permissioned Blockchain-Enabled Applications
Shi-Cho Cha, Chuang-Ming Shiung,...