Ai-driven cybersecurity: an overview, security intelligence modeling and research directions

IH Sarker, MH Furhad, R Nowrozy - SN Computer Science, 2021 - Springer
Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or
Industry 4.0), which can be used for the protection of Internet-connected systems from cyber …

Cybersecurity data science: an overview from machine learning perspective

IH Sarker, ASM Kayes, S Badsha, H Alqahtani… - Journal of Big …, 2020 - Springer
In a computing context, cybersecurity is undergoing massive shifts in technology and its
operations in recent days, and data science is driving the change. Extracting security …

HAST-IDS: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection

W Wang, Y Sheng, J Wang, X Zeng, X Ye… - IEEE …, 2017 - ieeexplore.ieee.org
The development of an anomaly-based intrusion detection system (IDS) is a primary
research direction in the field of intrusion detection. An IDS learns normal and anomalous …

A survey of data mining and machine learning methods for cyber security intrusion detection

AL Buczak, E Guven - IEEE Communications surveys & tutorials, 2015 - ieeexplore.ieee.org
This survey paper describes a focused literature survey of machine learning (ML) and data
mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial …

A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks

HH Pajouh, R Javidan, R Khayami… - … on Emerging Topics …, 2016 - ieeexplore.ieee.org
With increasing reliance on Internet of Things (IoT) devices and services, the capability to
detect intrusions and malicious activities within IoT networks is critical for resilience of the …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities

S Zhang, D Zhu - Computer Networks, 2020 - Elsevier
Abstract 6G is expected to support the unprecedented Internet of everything scenarios with
extremely diverse and challenging requirements. To fulfill such diverse requirements …

Deep learning in the fast lane: A survey on advanced intrusion detection systems for intelligent vehicle networks

M Almehdhar, A Albaseer, MA Khan… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
The rapid evolution of modern automobiles into intelligent and interconnected entities
presents new challenges in cybersecurity, particularly in Intrusion Detection Systems (IDS) …

[КНИГА][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …

A mobile malware detection method using behavior features in network traffic

S Wang, Z Chen, Q Yan, B Yang, L Peng… - Journal of Network and …, 2019 - Elsevier
Android has become the most popular mobile platform due to its openness and flexibility.
Meanwhile, it has also become the main target of massive mobile malware. This …