Related references
Note: Only part of the references are listed.An intrusion detection approach using ensemble Support Vector Machine based Chaos Game Optimization algorithm in big data platform
A. Ponmalar et al.
APPLIED SOFT COMPUTING (2022)
Federated learning for malware detection in IoT devices
Valerian Rey et al.
COMPUTER NETWORKS (2022)
Toward feasible machine learning model updates in network-based intrusion detection
Pedro Horchulhack et al.
COMPUTER NETWORKS (2022)
A collaborative approach to early detection of IoT Botnet
Giang L. Nguyen et al.
COMPUTERS & ELECTRICAL ENGINEERING (2022)
A lightweight supervised intrusion detection mechanism for IoT networks
Souradip Roy et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)
Intrusion Detection System in Wireless Sensor Networks and Fair Resource Allocation Using Geometric Deep Learning Techniques
S. Narasimha Prasad et al.
WIRELESS PERSONAL COMMUNICATIONS (2022)
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations
Muhammad Azmi Umer et al.
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2022)
Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection
Muhammad Shabbir Abbasi et al.
APPLIED SOFT COMPUTING (2022)
AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis
Shishir Kumar Shandilya et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)
Artificial intelligence for intrusion detection systems in Unmanned Aerial Vehicles
Jason Whelan et al.
COMPUTERS & ELECTRICAL ENGINEERING (2022)
ConvXSS: A deep learning-based smart ICT framework against code injection attacks for HTML5 web applications in sustainable smart city infrastructure
Koundinya Kuppa et al.
SUSTAINABLE CITIES AND SOCIETY (2022)
Detection and prevention of man-in-the-middle attack in iot network using regression modeling
N. Sivasankari et al.
ADVANCES IN ENGINEERING SOFTWARE (2022)
Unveiling the potential of Graph Neural Networks for robust Intrusion Detection
David Pujol-Perich et al.
Performance Evaluation Review (2022)
A survey on machine learning-based malware detection in executable files
Jagsir Singh et al.
JOURNAL OF SYSTEMS ARCHITECTURE (2021)
Cyber terrorism: A homogenized taxonomy and definition
Jordan J. Plotnek et al.
COMPUTERS & SECURITY (2021)
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network
Syed Ibrahim Imtiaz et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
Hazim Hanif et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)
Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
Arwa Aldweesh et al.
KNOWLEDGE-BASED SYSTEMS (2020)
Cyber attack taxonomy for digital environment in nuclear power plants
Seungmin Kim et al.
NUCLEAR ENGINEERING AND TECHNOLOGY (2020)
Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic
Wisam Elmasry et al.
COMPUTER NETWORKS (2020)
Cyber-security on smart grid: Threats and potential solutions
Muhammed Zekeriya Gunduz et al.
COMPUTER NETWORKS (2020)
A hybrid deep learning model for efficient intrusion detection in big data environment
Mohammad Mehedi Hassan et al.
INFORMATION SCIENCES (2020)
Detection of SQL injection based on artificial neural network
Peng Tang et al.
KNOWLEDGE-BASED SYSTEMS (2020)
An efficient XGBoost-DNN-based classification model for network intrusion detection system
Preethi Devan et al.
NEURAL COMPUTING & APPLICATIONS (2020)
An intrusion detection approach based on improved deep belief network
Qiuting Tian et al.
APPLIED INTELLIGENCE (2020)
A NSGA2-LR wrapper approach for feature selection in network intrusion detection
Chaouki Khammassi et al.
COMPUTER NETWORKS (2020)
A deep learning method with wrapper based feature extraction for wireless intrusion detection system
Sydney Mambwe Kasongo et al.
COMPUTERS & SECURITY (2020)
A comparative evaluation of unsupervised deep architectures for intrusion detection in sequential data streams
Dusan Sovilj et al.
EXPERT SYSTEMS WITH APPLICATIONS (2020)
IGAN-IDS: An imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks
Shuokang Huang et al.
AD HOC NETWORKS (2020)
Building an efficient intrusion detection system based on feature selection and ensemble classifier
Yuyang Zhou et al.
COMPUTER NETWORKS (2020)
Building Auto-Encoder Intrusion Detection System based on random forest feature selection
XuKui Li et al.
COMPUTERS & SECURITY (2020)
Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis
Sandhya Mishra et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Genetic convolutional neural network for intrusion detection systems
Minh Tuan Nguyen et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices
Jerry John Kponyo et al.
INTERNET OF THINGS (2020)
Large-Scale and Robust Intrusion Detection Model Combining Improved Deep Belief Network With Feature-Weighted SVM
Yukun Wu et al.
IEEE ACCESS (2020)
Why do users not report spear phishing emails?
Youngsun Kwak et al.
TELEMATICS AND INFORMATICS (2020)
Analysis of internet of things malware using image texture features and machine learning techniques
Mwangi Karanja Evanson et al.
INTERNET OF THINGS (2020)
Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization
Yanqing Yang et al.
IEEE ACCESS (2020)
A Comprehensive Survey on Geometric Deep Learning
Wenming Cao et al.
IEEE ACCESS (2020)
An intelligent intrusion detection system
Nevrus Kaja et al.
APPLIED INTELLIGENCE (2019)
Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks
Celyn Birkinshaw et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)
Application of deep learning to cybersecurity: A survey
Samaneh Mandavifar et al.
NEUROCOMPUTING (2019)
A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network
Muhammad Ashfaq Khan et al.
SYMMETRY-BASEL (2019)
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms
Jiadong Ren et al.
SECURITY AND COMMUNICATION NETWORKS (2019)
Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms
Zouhair Chiba et al.
COMPUTERS & SECURITY (2019)
A survey of network-based intrusion detection data sets
Markus Ring et al.
COMPUTERS & SECURITY (2019)
Network anomaly detection using channel boosted and residual learning based deep convolutional neural network
Naveed Chouhan et al.
APPLIED SOFT COMPUTING (2019)
Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system
Aneta Poniszewska-Maranda et al.
COMPUTING (2019)
Review: machine learning techniques applied to cybersecurity
Javier Martinez Torres et al.
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (2019)
Building a Cloud IDS Using an Efficient Feature Selection Method and SVM
Wenjuan Wang et al.
IEEE ACCESS (2019)
SoftSwitch: a centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks
Muhammet Baykara et al.
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES (2019)
A Survey on malware analysis and mitigation techniques
S. Sibi Chakkaravarthy et al.
COMPUTER SCIENCE REVIEW (2019)
An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks
Yihan Xiao et al.
IEEE ACCESS (2019)
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
Rakesh Kumar et al.
COMPUTER SCIENCE REVIEW (2019)
A Deep Learning Method With Filter Based Feature Engineering for Wireless Intrusion Detection System
Sydney Mambwe Kasongo et al.
IEEE ACCESS (2019)
A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers
Ahmed I. Saleh et al.
ARTIFICIAL INTELLIGENCE REVIEW (2019)
A survey of phishing attacks: Their types, vectors and technical approaches
Kang Leng Chiew et al.
EXPERT SYSTEMS WITH APPLICATIONS (2018)
Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System Over Big Data
Kai Peng et al.
IEEE ACCESS (2018)
An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection
Tamer Aldwairi et al.
COMPUTER NETWORKS (2018)
A taxonomy of cyber-physical threats and impact in the smart home
Ryan Heartfield et al.
COMPUTERS & SECURITY (2018)
Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection
Majjed Al-Qatf et al.
IEEE ACCESS (2018)
An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units
Congyuan Xu et al.
IEEE ACCESS (2018)
Enhanced Network Anomaly Detection Based on Deep Neural Networks
Sheraz Naseer et al.
IEEE ACCESS (2018)
Network Intrusion Detection Method Based on PCA and Bayes Algorithm
Bing Zhang et al.
SECURITY AND COMMUNICATION NETWORKS (2018)
Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system
Wathiq Laftah Al-Yaseen et al.
EXPERT SYSTEMS WITH APPLICATIONS (2017)
An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine
M. R. Gauthama Raman et al.
KNOWLEDGE-BASED SYSTEMS (2017)
Taxonomy of Cross-Domain Attacks on CyberManufacturing System
Mingtao Wu et al.
COMPLEX ADAPTIVE SYSTEMS CONFERENCE WITH THEME: ENGINEERING CYBER PHYSICAL SYSTEMS, CAS (2017)
A GA-LR wrapper approach for feature selection in network intrusion detection
Chaouki Khammassi et al.
COMPUTERS & SECURITY (2017)
Phishing environments, techniques, and countermeasures: A survey
Ahmed Aleroud et al.
COMPUTERS & SECURITY (2017)
CANN: An intrusion detection system based on combining cluster centers and nearest neighbors
Wei-Chao Lin et al.
KNOWLEDGE-BASED SYSTEMS (2015)
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns
Gideon Creech et al.
IEEE TRANSACTIONS ON COMPUTERS (2014)
Hardware Trojan Attacks: Threat Analysis and Countermeasures
Swarup Bhunia et al.
PROCEEDINGS OF THE IEEE (2014)
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
Ali Shiravi et al.
COMPUTERS & SECURITY (2012)
Reducing the dimensionality of data with neural networks
G. E. Hinton et al.
SCIENCE (2006)
A fast learning algorithm for deep belief nets
Geoffrey E. Hinton et al.
NEURAL COMPUTATION (2006)