• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4681874)   Today's Articles (298)
For: Yang Z, Liu X, Li T, Wu D, Wang J, Zhao Y, Han H. A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102675] [Citation(s) in RCA: 12] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Number Cited by Other Article(s)
1
El-Shafeiy E, Elsayed WM, Elwahsh H, Alsabaan M, Ibrahem MI, Elhady GF. Deep Complex Gated Recurrent Networks-Based IoT Network Intrusion Detection Systems. SENSORS (BASEL, SWITZERLAND) 2024;24:5933. [PMID: 39338678 PMCID: PMC11435862 DOI: 10.3390/s24185933] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/03/2024] [Revised: 09/01/2024] [Accepted: 09/10/2024] [Indexed: 09/30/2024]
2
Li L, Lu Y, Yang G, Yan X. End-to-End Network Intrusion Detection Based on Contrastive Learning. SENSORS (BASEL, SWITZERLAND) 2024;24:2122. [PMID: 38610334 PMCID: PMC11014011 DOI: 10.3390/s24072122] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/23/2024] [Revised: 03/20/2024] [Accepted: 03/22/2024] [Indexed: 04/14/2024]
3
Peng T, Zheng Y, Zhao L, Zheng E. Industrial Product Surface Anomaly Detection with Realistic Synthetic Anomalies Based on Defect Map Prediction. SENSORS (BASEL, SWITZERLAND) 2024;24:264. [PMID: 38203128 PMCID: PMC10781225 DOI: 10.3390/s24010264] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/30/2023] [Revised: 12/14/2023] [Accepted: 12/18/2023] [Indexed: 01/12/2024]
4
Lee JH, Ji IH, Jeon SH, Seo JT. Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression. SENSORS (BASEL, SWITZERLAND) 2023;23:9855. [PMID: 38139701 PMCID: PMC10747890 DOI: 10.3390/s23249855] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/09/2023] [Revised: 12/04/2023] [Accepted: 12/11/2023] [Indexed: 12/24/2023]
5
Ahsan M, Khusna H, Wibawati, Lee MH. Support vector data description with kernel density estimation (SVDD-KDE) control chart for network intrusion monitoring. Sci Rep 2023;13:19149. [PMID: 37932421 PMCID: PMC10628185 DOI: 10.1038/s41598-023-46719-3] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/07/2023] [Accepted: 11/03/2023] [Indexed: 11/08/2023]  Open
6
Chakir O, Rehaimi A, Sadqi Y, Abdellaoui Alaoui EA, Krichen M, Gaba GS, Gurtov A. An Empirical Assessment of Ensemble Methods and Traditional Machine Learning Techniques for Web-based Attack Detection in Industry 5.0. JOURNAL OF KING SAUD UNIVERSITY - COMPUTER AND INFORMATION SCIENCES 2023. [DOI: 10.1016/j.jksuci.2023.02.009] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/17/2023]
7
HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security. FUTURE INTERNET 2022. [DOI: 10.3390/fi15010009] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/29/2022]  Open
8
MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102919] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/22/2023]
9
Yang H, Wang Z, Zhang L, Cheng X. IoT botnet detection with feature reconstruction and interval optimization. INT J INTELL SYST 2022. [DOI: 10.1002/int.23074] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
10
Evaluation of Asian Countries using Data Center Security Index: A Spherical Fuzzy AHP-based EDAS Approach. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102900] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
11
Prasad M, Tripathi S, Dahal K. A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network. APPL INTELL 2022. [DOI: 10.1007/s10489-022-03763-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
12
An Intrusion Detection Method for Industrial Control System Based on Machine Learning. INFORMATION 2022. [DOI: 10.3390/info13070322] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]  Open
13
Xue S, Chen H, Zheng X. Detection and quantification of anomalies in communication networks based on LSTM-ARIMA combined model. INT J MACH LEARN CYB 2022;13:3159-3172. [PMID: 35755890 PMCID: PMC9205417 DOI: 10.1007/s13042-022-01586-8] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/06/2021] [Accepted: 05/15/2022] [Indexed: 11/04/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA