Network intrusion detection system: A systematic study of machine learning and deep learning approaches
The rapid advances in the internet and communication fields have resulted in a huge
increase in the network size and the corresponding data. As a result, many novel attacks are …
increase in the network size and the corresponding data. As a result, many novel attacks are …
A survey of data mining and machine learning methods for cyber security intrusion detection
AL Buczak, E Guven - IEEE Communications surveys & tutorials, 2015 - ieeexplore.ieee.org
This survey paper describes a focused literature survey of machine learning (ML) and data
mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial …
mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial …
Network intrusion detection for IoT security based on learning techniques
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …
A detailed investigation and analysis of using machine learning techniques for intrusion detection
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …
significant number of techniques have been developed which are based on machine …
Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions
Vehicular networking has significant potential to enable diverse applications associated with
traffic safety, traffic efficiency and infotainment. In this survey and tutorial paper we introduce …
traffic safety, traffic efficiency and infotainment. In this survey and tutorial paper we introduce …
A survey of intrusion detection systems in wireless sensor networks
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
applications ranging from health care to tactical military. Although Wireless Sensor Networks …
A survey on vehicular cloud computing
Vehicular networking has become a significant research area due to its specific features and
applications such as standardization, efficient traffic management, road safety and …
applications such as standardization, efficient traffic management, road safety and …
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no
open computer network is immune from intrusions. The wireless ad-hoc network is …
open computer network is immune from intrusions. The wireless ad-hoc network is …
A survey of random forest based methods for intrusion detection systems
Over the past decades, researchers have been proposing different Intrusion Detection
approaches to deal with the increasing number and complexity of threats for computer …
approaches to deal with the increasing number and complexity of threats for computer …
A survey of security issues in wireless sensor networks
Y Wang, G Attebury, B Ramamurthy - 2006 - digitalcommons.unl.edu
Abstract Wireless Sensor Networks (WSNs) are used in many applications in military,
ecological, and health-related areas. These applications often include the monitoring of …
ecological, and health-related areas. These applications often include the monitoring of …