Adventures in data analysis: A systematic review of Deep Learning techniques for pattern recognition in cyber-physical-social systems
Abstract Machine Learning (ML) and Deep Learning (DL) have achieved high success in
many textual, auditory, medical imaging, and visual recognition patterns. Concerning the …
many textual, auditory, medical imaging, and visual recognition patterns. Concerning the …
Adversarial machine learning attacks against intrusion detection systems: A survey on strategies and defense
A Alotaibi, MA Rassam - Future Internet, 2023 - mdpi.com
Concerns about cybersecurity and attack methods have risen in the information age. Many
techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs) …
techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs) …
The Threat of Adversarial Attacks on Machine Learning in Network Security--A Survey
Machine learning models have made many decision support systems to be faster, more
accurate, and more efficient. However, applications of machine learning in network security …
accurate, and more efficient. However, applications of machine learning in network security …
Adversarial machine learning in network intrusion detection domain: A systematic review
HA Alatwi, C Morisset - arXiv preprint arXiv:2112.03315, 2021 - arxiv.org
Due to their massive success in various domains, deep learning techniques are increasingly
used to design network intrusion detection solutions that detect and mitigate unknown and …
used to design network intrusion detection solutions that detect and mitigate unknown and …
Enhanced detection of imbalanced malicious network traffic with regularized generative adversarial networks
R Chapaneri, S Shah - Journal of Network and Computer Applications, 2022 - Elsevier
Due to the emerging network security vulnerabilities and threats, securing the network and
identifying malicious network traffic is crucial for various organizations. One critical aspect of …
identifying malicious network traffic is crucial for various organizations. One critical aspect of …
Enhancing the sustainability of deep-learning-based network intrusion detection classifiers against adversarial attacks
A Alotaibi, MA Rassam - Sustainability, 2023 - mdpi.com
An intrusion detection system (IDS) is an effective tool for securing networks and a
dependable technique for improving a user's internet security. It informs the administration …
dependable technique for improving a user's internet security. It informs the administration …
A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security
A Yang, Y Bai, T Xue, Y Li, J Li - Future Generation Computer Systems, 2023 - Elsevier
As an important technology in the field of cyberspace security, image steganography is of
great strategic significance to the research of image steganography. With the wider …
great strategic significance to the research of image steganography. With the wider …
Investigating on the robustness of flow-based intrusion detection system against adversarial samples using Generative Adversarial Networks
Abstract Recently, Software Defined Networking (SDN) has emerged as the key technology
in programming and orchestrating security policy in the security operations centers (SOCs) …
in programming and orchestrating security policy in the security operations centers (SOCs) …
Mitigation of black-box attacks on intrusion detection systems-based ml
Intrusion detection systems (IDS) are a very vital part of network security, as they can be
used to protect the network from illegal intrusions and communications. To detect malicious …
used to protect the network from illegal intrusions and communications. To detect malicious …
Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity
The new paradigm of nature-inspired cybersecurity can establish a robust defense by
utilizing well-established nature-inspired computing algorithms to analyze networks and act …
utilizing well-established nature-inspired computing algorithms to analyze networks and act …