• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4600962)   Today's Articles (1850)   Subscriber (49362)
For: Ferrag MA, Maglaras L, Ahmim A, Derdour M, Janicke H. RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks. Future Internet 2020;12:44. [DOI: 10.3390/fi12030044] [Citation(s) in RCA: 64] [Impact Index Per Article: 16.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
Number Cited by Other Article(s)
1
Mogollón Gutiérrez Ó, Sancho Núñez JC, Ávila M, Caro A. A detailed study of resampling algorithms for cyberattack classification in engineering applications. PeerJ Comput Sci 2024;10:e1975. [PMID: 38660195 PMCID: PMC11041950 DOI: 10.7717/peerj-cs.1975] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/12/2023] [Accepted: 03/11/2024] [Indexed: 04/26/2024]
2
Alalhareth M, Hong SC. An Adaptive Intrusion Detection System in the Internet of Medical Things Using Fuzzy-Based Learning. SENSORS (BASEL, SWITZERLAND) 2023;23:9247. [PMID: 38005635 PMCID: PMC10674369 DOI: 10.3390/s23229247] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/22/2023] [Revised: 11/13/2023] [Accepted: 11/16/2023] [Indexed: 11/26/2023]
3
Sharma RK, Issac B, Xin Q, Gadekallu TR, Nath K. Plant and Salamander Inspired Network Attack Detection and Data Recovery Model. SENSORS (BASEL, SWITZERLAND) 2023;23:5562. [PMID: 37420729 DOI: 10.3390/s23125562] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/15/2023] [Revised: 04/24/2023] [Accepted: 06/01/2023] [Indexed: 07/09/2023]
4
Khan NW, Alshehri MS, Khan MA, Almakdi S, Moradpoor N, Alazeb A, Ullah S, Naz N, Ahmad J. A hybrid deep learning-based intrusion detection system for IoT networks. MATHEMATICAL BIOSCIENCES AND ENGINEERING : MBE 2023;20:13491-13520. [PMID: 37679099 DOI: 10.3934/mbe.2023602] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/09/2023]
5
Catillo M, Pecchia A, Villano U. CPS-GUARD: Intrusion Detection for Cyber-Physical Systems and IoT Devices Using Outlier-Aware Deep Autoencoders. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103210] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/31/2023]
6
Zero-day attack detection: a systematic literature review. Artif Intell Rev 2023. [DOI: 10.1007/s10462-023-10437-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/03/2023]
7
Gokul Pran S, Raja S. An efficient feature selection and classification approach for an intrusion detection system using Optimal Neural Network. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2023. [DOI: 10.3233/jifs-222120] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/26/2023]
8
Attique D, Wang H, Wang P. Fog-Assisted Deep-Learning-Empowered Intrusion Detection System for RPL-Based Resource-Constrained Smart Industries. SENSORS (BASEL, SWITZERLAND) 2022;22:9416. [PMID: 36502115 PMCID: PMC9735641 DOI: 10.3390/s22239416] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/22/2022] [Revised: 11/16/2022] [Accepted: 11/22/2022] [Indexed: 06/17/2023]
9
Peng J, Cai Z, Chen Z, Liu X, Zheng M, Song C, Zhu X, Teng Y, Zhang R, Zhou Y, Lv X, Xu J. An trustworthy intrusion detection framework enabled by ex-post-interpretation-enabled approach. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022. [DOI: 10.1016/j.jisa.2022.103364] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
10
Meta-Heuristic Optimization Algorithm-Based Hierarchical Intrusion Detection System. COMPUTERS 2022. [DOI: 10.3390/computers11120170] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
11
Alkasassbeh M, Al-Haj Baddar S. Intrusion Detection Systems: A State-of-the-Art Taxonomy and Survey. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2022. [DOI: 10.1007/s13369-022-07412-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
12
Manzano Sanchez RA, Zaman M, Goel N, Naik K, Joshi R. Towards Developing a Robust Intrusion Detection Model Using Hadoop-Spark and Data Augmentation for IoT Networks. SENSORS (BASEL, SWITZERLAND) 2022;22:7726. [PMID: 36298077 PMCID: PMC9608938 DOI: 10.3390/s22207726] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/15/2022] [Revised: 10/04/2022] [Accepted: 10/06/2022] [Indexed: 06/16/2023]
13
IIoT Malware Detection Using Edge Computing and Deep Learning for Cybersecurity in Smart Factories. APPLIED SCIENCES-BASEL 2022. [DOI: 10.3390/app12157679] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/06/2023]
14
Sarwar A, Alnajim AM, Marwat SNK, Ahmed S, Alyahya S, Khan WU. Enhanced Anomaly Detection System for IoT Based on Improved Dynamic SBPSO. SENSORS 2022;22:s22134926. [PMID: 35808425 PMCID: PMC9269715 DOI: 10.3390/s22134926] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/27/2022] [Revised: 06/21/2022] [Accepted: 06/26/2022] [Indexed: 12/04/2022]
15
Ahmad R, Alsmadi I, Alhamdani W, Tawalbeh L. A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022. [DOI: 10.1016/j.jisa.2022.103196] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
16
Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method. Symmetry (Basel) 2022. [DOI: 10.3390/sym14061095] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/04/2022]  Open
17
Binbusayyis A, Alaskar H, Vaiyapuri T, Dinesh M. An investigation and comparison of machine learning approaches for intrusion detection in IoMT network. THE JOURNAL OF SUPERCOMPUTING 2022;78:17403-17422. [PMID: 35601090 PMCID: PMC9114823 DOI: 10.1007/s11227-022-04568-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 04/27/2022] [Indexed: 06/15/2023]
18
Ahmad R, Alsmadi I, Alhamdani W, Tawalbeh L. A comprehensive deep learning benchmark for IoT IDS. Comput Secur 2022. [DOI: 10.1016/j.cose.2021.102588] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
19
Prasad A, Chandra S. VMFCVD: An Optimized Framework to Combat Volumetric DDoS Attacks using Machine Learning. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2022;47:9965-9983. [PMID: 35096507 PMCID: PMC8783776 DOI: 10.1007/s13369-021-06484-9] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/12/2021] [Accepted: 12/06/2021] [Indexed: 11/29/2022]
20
K. G, S.H. B. Network traffic analysis through deep learning for detection of an army of bots in health IoT network. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS 2022. [DOI: 10.1108/ijpcc-10-2021-0259] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
21
Al-Sarem M, Saeed F, Alkhammash EH, Alghamdi NS. An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection. SENSORS (BASEL, SWITZERLAND) 2021;22:185. [PMID: 35009725 PMCID: PMC8749651 DOI: 10.3390/s22010185] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/14/2021] [Revised: 12/23/2021] [Accepted: 12/24/2021] [Indexed: 06/14/2023]
22
Enhanced Network Intrusion Detection System. SENSORS 2021;21:s21237835. [PMID: 34883839 PMCID: PMC8659770 DOI: 10.3390/s21237835] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/12/2021] [Revised: 11/11/2021] [Accepted: 11/19/2021] [Indexed: 12/03/2022]
23
Tian P, Chen Z, Yu W, Liao W. Towards asynchronous federated learning based threat detection: A DC-Adam approach. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102344] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
24
Memory-Efficient Deep Learning for Botnet Attack Detection in IoT Networks. ELECTRONICS 2021. [DOI: 10.3390/electronics10091104] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
25
Popoola SI, Adebisi B, Ande R, Hammoudeh M, Anoh K, Atayero AA. SMOTE-DRNN: A Deep Learning Algorithm for Botnet Detection in the Internet-of-Things Networks. SENSORS (BASEL, SWITZERLAND) 2021;21:2985. [PMID: 33923151 PMCID: PMC8123033 DOI: 10.3390/s21092985] [Citation(s) in RCA: 18] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/27/2021] [Revised: 04/20/2021] [Accepted: 04/21/2021] [Indexed: 11/16/2022]
26
Wu C, Li W. Enhancing intrusion detection with feature selection and neural network. INT J INTELL SYST 2021. [DOI: 10.1002/int.22397] [Citation(s) in RCA: 20] [Impact Index Per Article: 6.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
27
Cyber Ranges and TestBeds for Education, Training, and Research. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11041809] [Citation(s) in RCA: 16] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
28
Yang X, Shu L, Chen J, Ferrag MA, Wu J, Nurellari E, Huang K. A Survey on Smart Agriculture: Development Modes, Technologies, and Security and Privacy Challenges. IEEE/CAA JOURNAL OF AUTOMATICA SINICA 2021;8:273-302. [PMID: 0 DOI: 10.1109/jas.2020.1003536] [Citation(s) in RCA: 24] [Impact Index Per Article: 8.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/21/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA