Graph-based deep learning for communication networks: A survey

W Jiang - Computer Communications, 2022 - Elsevier
Communication networks are important infrastructures in contemporary society. There are
still many challenges that are not fully solved and new solutions are proposed continuously …

Graph neural networks in IoT: A survey

G Dong, M Tang, Z Wang, J Gao, S Guo, L Cai… - ACM Transactions on …, 2023 - dl.acm.org
The Internet of Things (IoT) boom has revolutionized almost every corner of people's daily
lives: healthcare, environment, transportation, manufacturing, supply chain, and so on. With …

Classification and explanation for intrusion detection system based on ensemble trees and SHAP method

TTH Le, H Kim, H Kang, H Kim - Sensors, 2022 - mdpi.com
In recent years, many methods for intrusion detection systems (IDS) have been designed
and developed in the research community, which have achieved a perfect detection rate …

Anomal-E: A self-supervised network intrusion detection system based on graph neural networks

E Caville, WW Lo, S Layeghy, M Portmann - Knowledge-Based Systems, 2022 - Elsevier
This paper investigates graph neural networks (GNNs) applied for self-supervised intrusion
and anomaly detection in computer networks. GNNs are a deep learning approach for graph …

Dynamic multi-scale topological representation for enhancing network intrusion detection

M Zhong, M Lin, Z He - Computers & Security, 2023 - Elsevier
Network intrusion detection systems (NIDS) play a crucial role in maintaining network
security. However, current NIDS techniques tend to neglect the topological structures of …

Application of a dynamic line graph neural network for intrusion detection with semisupervised learning

G Duan, H Lv, H Wang, G Feng - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Deep learning (DL) greatly enhances binary anomaly detection capabilities through effective
statistical network characterization; nevertheless, the intrusion class differentiation …

smote-drnn: A deep learning algorithm for botnet detection in the internet-of-things networks

SI Popoola, B Adebisi, R Ande, M Hammoudeh… - Sensors, 2021 - mdpi.com
Nowadays, hackers take illegal advantage of distributed resources in a network of
computing devices (ie, botnet) to launch cyberattacks against the Internet of Things (IoT) …

Graph neural networks for intrusion detection: A survey

T Bilot, N El Madhoun, K Al Agha, A Zouaoui - IEEE Access, 2023 - ieeexplore.ieee.org
Cyberattacks represent an ever-growing threat that has become a real priority for most
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …

Cybersecurity knowledge graphs

LF Sikos - Knowledge and Information Systems, 2023 - Springer
Cybersecurity knowledge graphs, which represent cyber-knowledge with a graph-based
data model, provide holistic approaches for processing massive volumes of complex …

TS-IDS: Traffic-aware self-supervised learning for IoT Network Intrusion Detection

H Nguyen, R Kashef - Knowledge-Based Systems, 2023 - Elsevier
With recent advances in the Internet of Things (IoT) technology, more people can have
instant and easy access to the IoT network of vast and diverse interconnected devices (eg …