Related references
Note: Only part of the references are listed.An IoT-Focused Intrusion Detection System Approach Based on Preprocessing Characterization for Cybersecurity Datasets
Xavier Larriva-Novo et al.
SENSORS (2021)
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
Muhammad Shafiq et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Transforming variables to central normality
Jakob Raymaekers et al.
MACHINE LEARNING (2021)
A Unifying Review of Deep and Shallow Anomaly Detection
Lukas Ruff et al.
PROCEEDINGS OF THE IEEE (2021)
An Adaptive Deep-Ensemble Anomaly-Based Intrusion Detection System for the Internet of Things
Khalid Albulayhi et al.
2021 IEEE WORLD AI IOT CONGRESS (AIIOT) (2021)
Corruption of the Pearson correlation coefficient by measurement error and its estimation, bias, and correction under different error models
Edoardo Saccenti et al.
SCIENTIFIC REPORTS (2020)
Efficient Distributed Preprocessing Model for Machine Learning-Based Anomaly Detection over Large-Scale Cybersecurity Datasets
Xavier Larriva-Novo et al.
APPLIED SCIENCES-BASEL (2020)
Optimizing Filter-Based Feature Selection Method Flow for Intrusion Detection System
Murtaza Ahmed Siddiqi et al.
ELECTRONICS (2020)
An Efficient Anomaly Intrusion Detection Method With Feature Selection and Evolutionary Neural Network
Samira Sarvari et al.
IEEE ACCESS (2020)
CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection
Kurniabudi et al.
IEEE ACCESS (2020)
Ranking of Normality Tests: An Appraisal through Skewed Alternative Space
Tanweer Ul Islam
SYMMETRY-BASEL (2019)
Mobile Encrypted Traffic Classification Using Deep Learning: Experimental Evaluation, Lessons Learned, and Challenges
Giuseppe Aceto et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2019)
A Deep Learning Approach to Network Intrusion Detection
Nathan Shone et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2018)
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
Ali Shiravi et al.
COMPUTERS & SECURITY (2012)