Adventures in data analysis: A systematic review of Deep Learning techniques for pattern recognition in cyber-physical-social systems

Z Amiri, A Heidari, NJ Navimipour, M Unal… - Multimedia Tools and …, 2024 - Springer
Abstract Machine Learning (ML) and Deep Learning (DL) have achieved high success in
many textual, auditory, medical imaging, and visual recognition patterns. Concerning the …

Adversarial machine learning attacks against intrusion detection systems: A survey on strategies and defense

A Alotaibi, MA Rassam - Future Internet, 2023 - mdpi.com
Concerns about cybersecurity and attack methods have risen in the information age. Many
techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs) …

The Threat of Adversarial Attacks on Machine Learning in Network Security--A Survey

O Ibitoye, R Abou-Khamis, M Shehaby… - arXiv preprint arXiv …, 2019 - arxiv.org
Machine learning models have made many decision support systems to be faster, more
accurate, and more efficient. However, applications of machine learning in network security …

Adversarial machine learning in network intrusion detection domain: A systematic review

HA Alatwi, C Morisset - arXiv preprint arXiv:2112.03315, 2021 - arxiv.org
Due to their massive success in various domains, deep learning techniques are increasingly
used to design network intrusion detection solutions that detect and mitigate unknown and …

Enhanced detection of imbalanced malicious network traffic with regularized generative adversarial networks

R Chapaneri, S Shah - Journal of Network and Computer Applications, 2022 - Elsevier
Due to the emerging network security vulnerabilities and threats, securing the network and
identifying malicious network traffic is crucial for various organizations. One critical aspect of …

Enhancing the sustainability of deep-learning-based network intrusion detection classifiers against adversarial attacks

A Alotaibi, MA Rassam - Sustainability, 2023 - mdpi.com
An intrusion detection system (IDS) is an effective tool for securing networks and a
dependable technique for improving a user's internet security. It informs the administration …

A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security

A Yang, Y Bai, T Xue, Y Li, J Li - Future Generation Computer Systems, 2023 - Elsevier
As an important technology in the field of cyberspace security, image steganography is of
great strategic significance to the research of image steganography. With the wider …

Investigating on the robustness of flow-based intrusion detection system against adversarial samples using Generative Adversarial Networks

PT Duy, NH Khoa, H Do Hoang, VH Pham - Journal of Information …, 2023 - Elsevier
Abstract Recently, Software Defined Networking (SDN) has emerged as the key technology
in programming and orchestrating security policy in the security operations centers (SOCs) …

Mitigation of black-box attacks on intrusion detection systems-based ml

S Alahmed, Q Alasad, MM Hammood, JS Yuan… - Computers, 2022 - mdpi.com
Intrusion detection systems (IDS) are a very vital part of network security, as they can be
used to protect the network from illegal intrusions and communications. To detect malicious …

Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity

SK Shandilya, BJ Choi, A Kumar, S Upadhyay - Processes, 2023 - mdpi.com
The new paradigm of nature-inspired cybersecurity can establish a robust defense by
utilizing well-established nature-inspired computing algorithms to analyze networks and act …