Anomaly detection in blockchain networks: A comprehensive survey
Over the past decade, blockchain technology has attracted a huge attention from both
industry and academia because it can be integrated with a large number of everyday …
industry and academia because it can be integrated with a large number of everyday …
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review
Globally, the external internet is increasingly being connected to industrial control systems.
As a result, there is an immediate need to protect these networks from a variety of threats …
As a result, there is an immediate need to protect these networks from a variety of threats …
Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model
The fourth industrial revolution is marked by the rapid growth of Internet of Things (IoT)
technology, leading to an increase in the number of IoT devices. Unfortunately, this also …
technology, leading to an increase in the number of IoT devices. Unfortunately, this also …
TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems
Nowadays, intrusion detection systems based on deep learning deliver state-of-the-art
performance. However, recent research has shown that specially crafted perturbations …
performance. However, recent research has shown that specially crafted perturbations …
[HTML][HTML] Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things
S Wang, W Xu, Y Liu - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT), as the information carrier of the Internet and
telecommunications networks, is a new network technology comprising physical entities …
telecommunications networks, is a new network technology comprising physical entities …
FL-MGVN: Federated learning for anomaly detection using mixed gaussian variational self-encoding network
D Wu, Y Deng, M Li - Information processing & management, 2022 - Elsevier
Anomalous data are such data that deviate from a large number of normal data points, which
often have negative impacts on various systems. Current anomaly detection technology …
often have negative impacts on various systems. Current anomaly detection technology …
A lightweight and efficient IoT intrusion detection method based on feature grou**
M He, Y Huang, X Wang, P Wei… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) devices have been widely used in many fields, bringing many
conveniences to people's life. With the massive deployment and application of IoT devices …
conveniences to people's life. With the massive deployment and application of IoT devices …
Early network intrusion detection enabled by attention mechanisms and RNNs
Current flow-based Network Intrusion Detection Systems (NIDSs) have the drawback of
detecting attacks only once the flow has ended, resulting in potential delays in attack …
detecting attacks only once the flow has ended, resulting in potential delays in attack …
A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things
The Internet of Things (IoT) is transforming how we live and work, and its applications are
widespread, spanning smart homes, industrial monitoring, smart cities, healthcare …
widespread, spanning smart homes, industrial monitoring, smart cities, healthcare …
A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization
Z Wang, H Chen, S Yang, X Luo, D Li, J Wang - PeerJ Computer Science, 2023 - peerj.com
Intrusion detection ensures that IoT can protect itself against malicious intrusions in
extensive and intricate network traffic data. In recent years, deep learning has been …
extensive and intricate network traffic data. In recent years, deep learning has been …