A survey of CNN-based network intrusion detection
Over the past few years, Internet applications have become more advanced and widely
used. This has increased the need for Internet networks to be secured. Intrusion detection …
used. This has increased the need for Internet networks to be secured. Intrusion detection …
A Network Intrusion Detection System with Broadband WO3–x/WO3–x‐Ag/WO3–x Optoelectronic Memristor
Real‐time intrusion detection system based on the von Neumann architecture struggle to
balance low power consumption and high computing speed. In this work, a strategy for …
balance low power consumption and high computing speed. In this work, a strategy for …
Hyperparameter optimization for 1D-CNN-based network intrusion detection using GA and PSO
D Kilichev, W Kim - Mathematics, 2023 - mdpi.com
This study presents a comprehensive exploration of the hyperparameter optimization in one-
dimensional (1D) convolutional neural networks (CNNs) for network intrusion detection. The …
dimensional (1D) convolutional neural networks (CNNs) for network intrusion detection. The …
[PDF][PDF] Hands-On Fundamentals of 1D Convolutional Neural Networks—A Tutorial for Beginner Users.
I Cacciari, A Ranfagni - Applied Sciences (2076-3417), 2024 - iris.cnr.it
In recent years, deep learning (DL) has garnered significant attention for its successful
applications across various domains in solving complex problems. This interest has spurred …
applications across various domains in solving complex problems. This interest has spurred …
Network intrusion detection based on the temporal convolutional model
Recurrent networks have been adopted as default architecture in approaches performing
sequence modelling of network intrusion detection problems. However, models based on …
sequence modelling of network intrusion detection problems. However, models based on …
Frhids: Federated learning recommender hydrid intrusion detection system model in software defined networking for consumer devices
In the past few years, numerous methods of attack against recommendation systems have
been developed. Cellphones, smart devices, and self-driving cars are instances of …
been developed. Cellphones, smart devices, and self-driving cars are instances of …
Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models
In the evolving landscape of Internet of Things (IoT) and Industrial IoT (IIoT) security, novel
and efficient intrusion detection systems (IDSs) are paramount. In this article, we present a …
and efficient intrusion detection systems (IDSs) are paramount. In this article, we present a …
Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW‐NB15 …
The Internet offers humanity many distinctive and indispensable services, whether for
individuals or for institutions and companies. This great role has attracted the Internet …
individuals or for institutions and companies. This great role has attracted the Internet …
Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity
In the current landscape where cybersecurity threats are escalating in complexity and
frequency, traditional defense mechanisms like rule-based firewalls and signature-based …
frequency, traditional defense mechanisms like rule-based firewalls and signature-based …
Optimization of Intrusion Detection with Deep Learning: A Study Based on the KDD Cup 99 Database.
AM Amine, YI Khamlichi - International Journal of Safety & …, 2024 - search.ebscohost.com
With the exponential increase in cyberattacks, the need for effective and scalable network
intrusion detection systems (IDS) is critical. This study evaluates the effectiveness of …
intrusion detection systems (IDS) is critical. This study evaluates the effectiveness of …