Related references
Note: Only part of the references are listed.
Article
Computer Science, Artificial Intelligence
David A. Bierbrauer et al.
Summary: Traditional machine learning models for network intrusion detection rely on extensive network traffic data, which is not feasible in edge network scenarios. This study explores the feasibility of using transfer learning and neural networks to perform intrusion detection solely based on raw network traffic in computationally limited environments. The results show that high accuracy can be achieved on edge devices with a combination of transferred one-dimensional convolutional neural network model and retrained random forest model.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)
Article
Chemistry, Analytical
Nasr Abosata et al.
Summary: Technological breakthroughs in the IoT have allowed for smart lives through the Internet, but the RPL protocol's security becomes crucial. The existing IDS solutions cannot detect novel RPL intrusions, thus a customised global attack knowledge-based IDS model is necessary. This paper proposes a FT-CID model to detect RPL intrusion in a heterogeneous IoT using federated transfer learning.
Proceedings Paper
Telecommunications
Li Yang et al.
Summary: This paper proposes a transfer learning and ensemble learning-based IDS using convolutional neural networks and hyper-parameter optimization techniques to protect IoV systems from network attacks. The experiments demonstrate that the proposed IDS can effectively detect network attacks in both intra-vehicle and external vehicular networks.
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022)
(2022)
Article
Computer Science, Information Systems
Mohamed Amine Ferrag et al.
Summary: This paper presents a comprehensive realistic cyber security dataset called Edge-IIoTset for IoT and IIoT applications. The dataset is generated using a purpose-built IoT/IIoT testbed and includes a representative set of devices, sensors, protocols, and cloud/edge configurations. It provides data from various IoT devices and analyzes fourteen attacks related to IoT and IIoT connectivity protocols.
Article
Computer Science, Information Systems
Xinghua Li et al.
Summary: As a new type of network, attacks in the Internet of Vehicles (IoV) are constantly evolving. This paper proposes two model update schemes based on whether the IoV cloud can provide timely labeled data for new attacks. The experimental results show that the proposed schemes have significantly improved detection accuracy compared to existing methods.
INFORMATION SCIENCES
(2021)
Review
Biology
Mohammad Amin Morid et al.
Summary: This study reviewed the application of transfer learning with convolutional neural networks in medical image analysis, identifying the most common anatomical areas studied and the use of different models for analysis in different anatomical areas. Findings can guide future research approaches and highlight research gaps in the field.
COMPUTERS IN BIOLOGY AND MEDICINE
(2021)
Article
Computer Science, Theory & Methods
Deepak Singh et al.
Summary: Darknet, built on an encrypted network, is an internet-based technology that facilitates criminal activities. Despite having both positive and negative impacts on society, it cannot be ignored.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2021)
Article
Computer Science, Hardware & Architecture
B. Natesha et al.
Summary: The paper proposes a two-level resource provisioning fog framework using docker and containers, formulates the service placement problem in fog computing environment as a multi-objective optimization problem to ensure the QoS of IoT applications, and solves it with the Elitism-based Genetic Algorithm (EGA). The proposed approach outperforms other state-of-the-art service placement strategies in terms of service cost, energy consumption, and service time according to experimental results on a fog computing testbed developed using docker and containers on 1.4 GHz 64-bit quad-core processor devices.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Review
Computer Science, Hardware & Architecture
Sang-Woong Lee et al.
Summary: This article focuses on the application of deep learning in intrusion detection systems, discussing how different methods utilize deep learning networks for better results. It classifies the studied IDS schemes and compares their features in different aspects. Finally, comparisons of deep IDS approaches and future research directions are provided.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2021)
Article
Chemistry, Analytical
Sk Tanzir Mehedi et al.
Summary: This paper proposes a deep transfer learning-based IDS model for In-Vehicle Networks, which outperforms existing models in terms of performance. Experimental evaluations show significant improvement in detection accuracy compared to mainstream machine learning, deep learning, and benchmark deep transfer learning models, demonstrating better performance for real-time IVN security.
Proceedings Paper
Automation & Control Systems
Maha Driss et al.
Summary: The Internet of Things (IoT) technology has led to the emergence of various smart applications in crucial sectors, but it also poses security vulnerabilities. Researchers have utilized microservices-based architecture to enhance the security of IoT data, providing scalable, reusable, and reconfigurable security features. This paper is the first survey to investigate the use of microservices technology for securing IoT applications.
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021)
(2021)
Article
Computer Science, Artificial Intelligence
A. Helen Victoria et al.
Summary: Deep learning in artificial intelligence is effective in computer vision, natural language processing, and audio recognition. Hyperparameter tuning is crucial for training model performance, and Bayesian optimization algorithm enhances model performance effectively.
Article
Computer Science, Information Systems
Mohammed Al-Sarem et al.
Article
Automation & Control Systems
Siyu Shao et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2019)
Review
Computer Science, Hardware & Architecture
Nour Moustafa et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2019)
Article
Automation & Control Systems
Emiliano Sisinni et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2018)
Proceedings Paper
Computer Science, Artificial Intelligence
Francois Chollet
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017)
(2017)