[HTML][HTML] A survey of deep learning methods for cyber security
DS Berman, AL Buczak, JS Chavis, CL Corbett - Information, 2019 - mdpi.com
This survey paper describes a literature review of deep learning (DL) methods for cyber
security applications. A short tutorial-style description of each DL method is provided …
security applications. A short tutorial-style description of each DL method is provided …
[HTML][HTML] A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions
The Internet of Things (IoT) is poised to impact several aspects of our lives with its fast
proliferation in many areas such as wearable devices, smart sensors and home appliances …
proliferation in many areas such as wearable devices, smart sensors and home appliances …
[HTML][HTML] CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment
Nowadays, the Internet of Things (IoT) concept plays a pivotal role in society and brings new
capabilities to different industries. The number of IoT solutions in areas such as …
capabilities to different industries. The number of IoT solutions in areas such as …
[HTML][HTML] Classification and explanation for intrusion detection system based on ensemble trees and SHAP method
In recent years, many methods for intrusion detection systems (IDS) have been designed
and developed in the research community, which have achieved a perfect detection rate …
and developed in the research community, which have achieved a perfect detection rate …
[HTML][HTML] Machine learning-based IoT-botnet attack detection with sequential architecture
With the rapid development and popularization of Internet of Things (IoT) devices, an
increasing number of cyber-attacks are targeting such devices. It was said that most of the …
increasing number of cyber-attacks are targeting such devices. It was said that most of the …
[HTML][HTML] Features dimensionality reduction approaches for machine learning based network intrusion detection
The security of networked systems has become a critical universal issue that influences
individuals, enterprises and governments. The rate of attacks against networked systems …
individuals, enterprises and governments. The rate of attacks against networked systems …
[HTML][HTML] Realguard: A lightweight network intrusion detection system for IoT gateways
Cyber security has become increasingly challenging due to the proliferation of the Internet of
things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the …
things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the …
[HTML][HTML] IMIDS: An intelligent intrusion detection system against cyber threats in IoT
The increasing popularity of the Internet of Things (IoT) has significantly impacted our daily
lives in the past few years. On one hand, it brings convenience, simplicity, and efficiency for …
lives in the past few years. On one hand, it brings convenience, simplicity, and efficiency for …
[HTML][HTML] Attack-Aware IoT network traffic routing leveraging ensemble learning
Q Abu Al-Haija, A Al-Badawi - Sensors, 2021 - mdpi.com
Network Intrusion Detection Systems (NIDSs) are indispensable defensive tools against
various cyberattacks. Lightweight, multipurpose, and anomaly-based detection NIDSs …
various cyberattacks. Lightweight, multipurpose, and anomaly-based detection NIDSs …
[HTML][HTML] Effective feature selection methods to detect IoT DDoS attack in 5G core network
YE Kim, YS Kim, H Kim - Sensors, 2022 - mdpi.com
The 5G networks aim to realize a massive Internet of Things (IoT) environment with low
latency. IoT devices with weak security can cause Tbps-level Distributed Denial of Service …
latency. IoT devices with weak security can cause Tbps-level Distributed Denial of Service …