Sign Up to like & get
recommendations!
1
Published in 2020 at "Wireless Personal Communications"
DOI: 10.1007/s11277-019-06986-8
Abstract: Internet of Things (IoT) and its applications are the most popular research areas at present. The characteristics of IoT on one side make it easily applicable to real-life applications, whereas on the other side expose…
read more here.
Keywords:
machine learning;
iot applications;
detection systems;
intrusion detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Cogent engineering"
DOI: 10.1080/23311916.2020.1859667
Abstract: Bio-inspired intrusion detection solutions provide better detection accuracy than conventional solutions in securing cyberspace. However, existing bio-inspired anomaly-based intrusion detection sys...
read more here.
Keywords:
detection;
bio inspired;
cyberspace;
intrusion detection ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3001350
Abstract: The rapid increase in network traffic has recently led to the importance of flow-based intrusion detection systems processing a small amount of traffic data. Furthermore, anomaly-based methods, which can identify unknown attacks are also integrated…
read more here.
Keywords:
based intrusion;
variational autoencoder;
network;
flow ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3175918
Abstract: Federated learning (FL) has become an increasingly popular solution for intrusion detection to avoid data privacy leakage in Internet of Things (IoT) edge devices. Existing FL-based intrusion detection methods, however, suffer from three limitations: 1)…
read more here.
Keywords:
intrusion detection;
based intrusion;
federated learning;
detection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Intelligent Transportation Systems"
DOI: 10.1109/tits.2021.3088998
Abstract: In this paper, we propose H-IDFS, a Histogram-based Intrusion Detection and Filtering framework, which assembles the CAN packets into windows, and computes their corresponding histograms. The latter are fed to a multi-class IDS classifier to…
read more here.
Keywords:
intrusion detection;
based intrusion;
histogram based;
detection filtering ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Network and Service Management"
DOI: 10.1109/tnsm.2022.3177512
Abstract: In 2016, Google introduced the concept of Federated Learning (FL), enabling collaborative Machine Learning (ML). FL does not share local data but ML models, offering applications in diverse domains. This paper focuses on the application…
read more here.
Keywords:
intrusion detection;
based intrusion;
federated learning;
survey ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.36227/techrxiv.17696972
Abstract: Over the past few years, Domain Name Service (DNS) remained a prime target for hackers as it enables them to gain first entry into networks and gain access to data for exfiltration. Although the DNS…
read more here.
Keywords:
dns https;
based intrusion;
explainable based;
https ... See more keywords