4.5 Article

A Secure Intrusion Detection System in Cyberphysical Systems Using a Parameter-Tuned Deep-Stacked Autoencoder

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications

Romany F. Mansour et al.

MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING (2019)

Article Computer Science, Information Systems

AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks

Jiaqi Li et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Multidisciplinary

A New Optimization Algorithm Based on Search and Rescue Operations

Amir Shabani et al.

MATHEMATICAL PROBLEMS IN ENGINEERING (2019)

Article Computer Science, Information Systems

Adapted K-Nearest Neighbors for Detecting Anomalies on Spatio-Temporal Traffic Flow

Youcef Djenouri et al.

IEEE ACCESS (2019)

Article Computer Science, Theory & Methods

Distributed attack detection scheme using deep learning approach for Internet of Things

Abebe Abeshu Diro et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Artificial Intelligence

Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems

Amit Kleinmann et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2017)