Zero trust architecture (zta): A comprehensive survey
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …
number of advocates in the critical infrastructure risk management space. The article …
Recent advances in anomaly detection methods applied to aviation
Anomaly detection is an active area of research with numerous methods and applications.
This survey reviews the state-of-the-art of data-driven anomaly detection techniques and …
This survey reviews the state-of-the-art of data-driven anomaly detection techniques and …
Adbench: Anomaly detection benchmark
Given a long list of anomaly detection algorithms developed in the last few decades, how do
they perform with regard to (i) varying levels of supervision,(ii) different types of anomalies …
they perform with regard to (i) varying levels of supervision,(ii) different types of anomalies …
Deep learning methods in network intrusion detection: A survey and an objective comparison
S Gamage, J Samarabandu - Journal of Network and Computer …, 2020 - Elsevier
The use of deep learning models for the network intrusion detection task has been an active
area of research in cybersecurity. Although several excellent surveys cover the growing …
area of research in cybersecurity. Although several excellent surveys cover the growing …
Logbert: Log anomaly detection via bert
Detecting anomalous events in online computer systems is crucial to protect the systems
from malicious attacks or malfunctions. System logs, which record detailed information of …
from malicious attacks or malfunctions. System logs, which record detailed information of …
Deep learning for anomaly detection: A survey
R Chalapathy, S Chawla - arXiv preprint arXiv:1901.03407, 2019 - arxiv.org
Anomaly detection is an important problem that has been well-studied within diverse
research areas and application domains. The aim of this survey is two-fold, firstly we present …
research areas and application domains. The aim of this survey is two-fold, firstly we present …
Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
A Aldweesh, A Derhab, AZ Emam - Knowledge-Based Systems, 2020 - Elsevier
The massive growth of data that are transmitted through a variety of devices and
communication protocols have raised serious security concerns, which have increased the …
communication protocols have raised serious security concerns, which have increased the …
A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks
There has been significant research in incorporating both blockchain and intrusion detection
to improve data privacy and detect existing and emerging cyberattacks, respectively. In …
to improve data privacy and detect existing and emerging cyberattacks, respectively. In …
LUCID: A practical, lightweight deep learning solution for DDoS attack detection
R Doriguzzi-Corin, S Millar… - … on Network and …, 2020 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are one of the most harmful threats in today's
Internet, disrupting the availability of essential services. The challenge of DDoS detection is …
Internet, disrupting the availability of essential services. The challenge of DDoS detection is …
GAN augmentation to deal with imbalance in imaging-based intrusion detection
Nowadays attacks on computer networks continue to advance at a rate outpacing cyber
defenders' ability to write new attack signatures. This paper illustrates a deep learning …
defenders' ability to write new attack signatures. This paper illustrates a deep learning …