A systematic literature review of intrusion detection system for network security: Research trends, datasets and methods
R Ferdiana - … 4th International Conference on Informatics and …, 2020 - ieeexplore.ieee.org
Study on intrusion detection system (IDS) mostly allow network administrators to focus on
development activities in terms of network security and making better use of resource. Many …
development activities in terms of network security and making better use of resource. Many …
Dependable intrusion detection system for IoT: A deep transfer learning based approach
Security concerns for Internet of Things (IoT) applications have been alarming because of
their widespread use in different enterprise systems. The potential threats to these …
their widespread use in different enterprise systems. The potential threats to these …
A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches
SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …
exchange data. These “things” can be sensors, actuators, smartphones, wearables …
[HTML][HTML] A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection
M Vishwakarma, N Kesswani - Decision Analytics Journal, 2023 - Elsevier
Technology is pivotal in the rapid growth of services and intensifying the quality of life.
Recent technology, like the Internet of Things (IoT), demonstrates an impressive …
Recent technology, like the Internet of Things (IoT), demonstrates an impressive …
Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT)
The Internet of Things (IoT) plays a crucial role in various sectors such as automobiles and
the logistic tracking medical field because it consists of distributed nodes, servers, and …
the logistic tracking medical field because it consists of distributed nodes, servers, and …
Machine learning in network anomaly detection: A survey
S Wang, JF Balarezo, S Kandeepan… - IEEE …, 2021 - ieeexplore.ieee.org
Anomalies could be the threats to the network that have ever/never happened. To protect
networks against malicious access is always challenging even though it has been studied …
networks against malicious access is always challenging even though it has been studied …
An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic
M Saharkhizan, A Azmoodeh… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices and systems will be increasingly targeted by cybercriminals
(including nation state-sponsored or affiliated threat actors) as they become an integral part …
(including nation state-sponsored or affiliated threat actors) as they become an integral part …
Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey
The Internet of Things (IoT) has emerged as a technology capable of connecting
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …
Scalable machine learning-based intrusion detection system for IoT-enabled smart cities
Given a scale expansion of Internet of Things for sustainable resource management in smart
cities, proper design of an intrusion detection system (IDS) is critical to safeguard the future …
cities, proper design of an intrusion detection system (IDS) is critical to safeguard the future …
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
With the popularity of Internet of Things (IoT) technology, the security of the IoT network has
become an important issue. Traditional intrusion detection systems have their limitations …
become an important issue. Traditional intrusion detection systems have their limitations …