相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things
Muna Al-Hawawreh et al.
IEEE INTERNET OF THINGS JOURNAL (2022)
Internet of things and ransomware: Evolution, mitigation and prevention
Mamoona Humayun et al.
EGYPTIAN INFORMATICS JOURNAL (2021)
Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT
Rahim Taheri et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
FedMCCS: Multicriteria Client Selection Model for Optimal IoT Federated Learning
Sawsan AbdulRahman et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Analysis of concept drift in fake reviews detection
Rami Mohawesh et al.
EXPERT SYSTEMS WITH APPLICATIONS (2021)
A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment
Rafal Kozik et al.
PATTERN ANALYSIS AND APPLICATIONS (2021)
Deep Anomaly Detection for Time-Series Data in Industrial IoT: A Communication-Efficient On-Device Federated Learning Approach
Yi Liu et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Developing a Security Testbed for Industrial Internet of Things
Muna AL-Hawawreh et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems
Beibei Li et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
MaldomDetector: A system for detecting algorithmically generated domain names with machine learning
Ahmad O. Almashhadani et al.
COMPUTERS & SECURITY (2020)
Defending network intrusion detection systems against adversarial evasion attacks
Marek Pawlicki et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
A trusted feature aggregator federated learning for distributed malicious attack detection
Xinhong Hei et al.
COMPUTERS & SECURITY (2020)
Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications
Bryse Flowers et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Edge Computing in Industrial Internet of Things: Architecture, Advances and Challenges
Tie Qiu et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network
Nishat Mowla et al.
IEEE ACCESS (2020)
Ransomware detection and mitigation using software-defined networking: The case of WannaCry
Maxat Akbanov et al.
COMPUTERS & ELECTRICAL ENGINEERING (2019)
Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things
Muna Al-Hawawreh et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Black Box Attacks on Deep Anomaly Detectors
Aditya Kuppa et al.
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019) (2019)
Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment
Muna Al-Hawawreh et al.
2019 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS) (2019)
A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware
Ahmad O. Almashhadani et al.
IEEE ACCESS (2019)
Ransomware early detection by the analysis of file sharing traffic
Daniel Morato et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
An anomaly-based approach for DDoS attack detection in cloud environment
Adnan Rawashdeh et al.
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY (2018)
A stacked contractive denoising auto-encoder for ECG signal denoising
Peng Xiong et al.
PHYSIOLOGICAL MEASUREMENT (2016)