• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4606053)   Today's Articles (5415)   Subscriber (49373)
For: Yao R, Wang N, Liu Z, Chen P, Sheng X. Intrusion Detection System in the Advanced Metering Infrastructure: A Cross-Layer Feature-Fusion CNN-LSTM-Based Approach. Sensors (Basel) 2021;21:626. [PMID: 33477451 DOI: 10.3390/s21020626] [Citation(s) in RCA: 23] [Impact Index Per Article: 7.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/02/2020] [Revised: 01/14/2021] [Accepted: 01/14/2021] [Indexed: 11/16/2022]
Number Cited by Other Article(s)
1
Deepa S, Janet J, Sumathi S, Ananth JP. Hybrid Optimization Algorithm Enabled Deep Learning Approach Brain Tumor Segmentation and Classification Using MRI. J Digit Imaging 2023;36:847-868. [PMID: 36622465 PMCID: PMC10287879 DOI: 10.1007/s10278-022-00752-2] [Citation(s) in RCA: 4] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/04/2022] [Revised: 09/16/2022] [Accepted: 12/04/2022] [Indexed: 01/10/2023]  Open
2
A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems. INFORMATION 2023. [DOI: 10.3390/info14020103] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/09/2023]  Open
3
Sahani N, Zhu R, Cho JH, Liu CC. Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey. ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS 2023. [DOI: 10.1145/3578366] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/13/2023]
4
Shokry M, Awad AI, Abd-Ellah MK, Khalaf AA. Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision. FUTURE GENERATION COMPUTER SYSTEMS 2022;136:358-377. [DOI: 10.1016/j.future.2022.06.013] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
5
Yao R, Wang N, Ke W, Chen P, Sheng X. Electricity theft detection in unbalanced sample distribution: a novel approach including a mechanism of sample augmentation. APPL INTELL 2022. [DOI: 10.1007/s10489-022-04069-z] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
6
Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things. JOURNAL OF SENSOR AND ACTUATOR NETWORKS 2022. [DOI: 10.3390/jsan11030032] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/01/2023]
7
Zhang C, Jia D, Wang L, Wang W, Liu F, Yang A. Comparative Research on Network Intrusion Detection Methods Based on Machine Learning. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102861] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
8
Balasaraswathi VR, Mary Shamala L, Hamid Y, Pachhaiammal Alias Priya M, Shobana M, Sugumaran M. An Efficient Feature Selection for Intrusion Detection System Using B-HKNN and C2 Search Based Learning Model. Neural Process Lett 2022. [DOI: 10.1007/s11063-022-10854-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
9
Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity. SENSORS 2022;22:s22010360. [PMID: 35009899 PMCID: PMC8749531 DOI: 10.3390/s22010360] [Citation(s) in RCA: 18] [Impact Index Per Article: 9.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/06/2021] [Revised: 12/30/2021] [Accepted: 12/30/2021] [Indexed: 02/04/2023]
10
Zhou J, Wu Z, Xue Y, Li M, Zhou D. Network unknown‐threat detection based on a generative adversarial network and evolutionary algorithm. INT J INTELL SYST 2021. [DOI: 10.1002/int.22766] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
11
Alazzam H, Sharieh A, Sabri KE. A lightweight intelligent network intrusion detection system using OCSVM and Pigeon inspired optimizer. APPL INTELL 2021. [DOI: 10.1007/s10489-021-02621-x] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
12
Mazunga F, Romosi T, Guvhu R. Manhole intrusion detection system with notification stages. SCIENTIFIC AFRICAN 2021. [DOI: 10.1016/j.sciaf.2021.e00819] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]  Open
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA