Survey of intrusion detection systems: techniques, datasets and challenges

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman - Cybersecurity, 2019 - Springer
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …

A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction

M Landauer, F Skopik, B Stojanović, A Flatscher… - International Journal of …, 2025 - Springer
Understanding the current threat landscape as well as timely detection of imminent attacks
are primary objectives of cyber security. Through time-series modeling of security data, such …

Construction of bivariate asymmetric copulas

S Mukherjee, Y Lee, JM Kim, J Jang… - Communications for …, 2018 - koreascience.kr
Copulas are a tool for constructing multivariate distributions and formalizing the dependence
structure between random variables. From copula literature review, there are a few …

Multivariate unsupervised machine learning for anomaly detection in enterprise applications

D Elsner, P Aleatrati Khosroshahi… - 2019 - scholarspace.manoa.hawaii.edu
Existing application performance management (APM) solutions lack robust anomaly
detection capabilities and root cause analysis techniques, that do not require manual efforts …

Détection d'intrusion basée sur l'analyse de compteurs matériels pour des objets connectés

M Bourdon - 2021 - laas.hal.science
Les objets connectés, qui forment aujourd'hui l'Internet des objets ou IoT, sont de plus en
plus nombreux et offrent une grande variété de fonctionnalités. Ils font cependant face à de …

[图书][B] On the Use of Copulas in Modern Process Monitoring

YL Liao - 2022 - search.proquest.com
In today's modern industry, autocorrelated processes are common due to the speed at which
measurements can be obtained. The general strategy for monitoring autocorrelated …

Intrusion detection system in IoT networks using SVM-PSO classification

SAM Al-Rubaye - 2022 - openaccess.altinbas.edu.tr
As the subfields of computer science and information technology continue to expand at a
dizzying rate, efforts are made to promote and improve scientific and technical initiatives …

Anomaly detection on a real-time server using decision trees step by step procedure

G Chaaya, H Maalouf - 2017 8th International Conference on …, 2017 - ieeexplore.ieee.org
Anomaly detection is the process of finding outlying records from a given data set. The aim
of this paper is to study a well-known anomaly detection technique on the “Short Message …

[PDF][PDF] Intrusion Detection Systems

A Margaritis - ikee.lib.auth.gr
With the continuous expansion of the Internet, computer attacks are expanding not only in
number but also in variety: ransomware is on the rise like never before, and zero-day …

A Highly Efficient Intrusion Detection and Packet Tracking Based on Game Theory Approach

G Sadineni, M Archana… - 2021 Emerging Trends in …, 2021 - ieeexplore.ieee.org
Wireless Sensing Networks (WSNs) offer excellent environmental monitoring capabilities
and use many interesting applications in advanced network applications. The problem is …