Interpreting unsupervised anomaly detection in security via rule extraction

R Li, Q Li, Y Zhang, D Zhao… - Advances in Neural …, 2024 - proceedings.neurips.cc
Many security applications require unsupervised anomaly detection, as malicious data are
extremely rare and often only unlabeled normal data are available for training (ie, zero …

Hybrid MQTTNet: an intrusion detection system using heuristic-based optimal feature integration and hybrid Fuzzy with 1DCNN

PM Vijayan, S Sundar - Cybernetics and Systems, 2022 - Taylor & Francis
The development of IoT systems combined with the smart environments work in an effective
way by making the objects to be smart. On the other hand, the IoT systems are vulnerable to …

[HTML][HTML] An Effective Method for Detecting Unknown Types of Attacks Based on Log-Cosh Variational Autoencoder

L Yu, L Xu, X Jiang - Applied Sciences, 2023 - mdpi.com
The increasing prevalence of unknown-type attacks on the Internet highlights the importance
of developing efficient intrusion detection systems. While machine learning-based …

HALO: HVAC Load Forecasting With Industrial IoT and Local-Global-Scale Transformer

C Pan, C Zhang, ECH Ngai, J Liu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The evolution of Internet-of-Things (IoT) is fostering the use of intelligent controls for energy
conservation. Yet, the efficacy of these strategies is largely tied to diverse load forecasting …

Detecting malware activity using public search data

I Villanueva-Miranda, M Akbar - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The prevalence of malware on the Internet makes malware detection vital as an early
warning system for organizations' security. This paper presents a novel approach to linking …

Masked Memory Network for Semi-Supervised Anomaly Detection in Internet of Things

J Yin, Y Qiao, Z Dai, Z Zhou, X Wang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
With the rapid development of Internet of things (IoT), an increasing volume of data is
generated across diverse IoT devices. Within these data, an extremely limited subset may …

Modeling and predicting emerging threats using disparate data

I Villanueva-Miranda - 2023 - search.proquest.com
Early detection is crucial to mitigate the impact of emerging threats. This work proposes four
innovative frameworks that build machine learning and deterministic epidemiological …

Digital twin-empowered smart attack detection system for 6g edge of things networks

Y Yigit, C Chrysoulas, G Yurdakul… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates
towards the Edge of Things (EoT) network. This shift prompts businesses to deploy …

[HTML][HTML] An automated system of intrusion detection by IoT-aided MQTT using improved heuristic-aided autoencoder and LSTM-based Deep Belief Network

PM Vijayan, S Sundar - Plos one, 2023 - journals.plos.org
The IoT offered an enormous number of services with the help of multiple applications so it
faces various security-related problems and also heavy malicious attacks. Initially, the IoT …

Genos: General In-Network Unsupervised Intrusion Detection by Rule Extraction

R Li, Q Li, Y Zhang, D Zhao, X Xiao, Y Jiang - arXiv preprint arXiv …, 2024 - arxiv.org
Anomaly-based network intrusion detection systems (A-NIDS) use unsupervised models to
detect unforeseen attacks. However, existing A-NIDS solutions suffer from low throughput …