Loading…
Loading…
Transforming Transportation: Safe and Secure Vehicular Communication and Anomaly Detection With Intelligent Cyber-Physical System and Deep Learning
AlEisa, Hussah Nasser, Alrowais, Fadwa, Allafi, Randa, Almalki, Nabil Sharaf, Faqih, Raji, Marzouk, Radwa, Alnfiai, Mrim M., Motwakel, Abdelwahed, Ibrahim, Sara Saadeldeen
Published in IEEE transactions on consumer electronics (01.02.2024)
Published in IEEE transactions on consumer electronics (01.02.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems
Chen, Jiming, Gao, Xiangshan, Deng, Ruilong, He, Yang, Fang, Chongrong, Cheng, Peng
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Get full text
Journal Article
Loading…
Loading…
Loading…
A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization
Kiennert, Christophe, Ismail, Ziad, Debar, Herve, Leneutre, Jean
Published in ACM computing surveys (22.08.2018)
Published in ACM computing surveys (22.08.2018)
Get full text
Journal Article
Loading…
DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments
Javadpour, Amir, Pinto, Pedro, Ja’fari, Forough, Zhang, Weizhe
Published in Cluster computing (01.02.2023)
Published in Cluster computing (01.02.2023)
Get full text
Journal Article
Loading…
Leveraging siamese networks for one-shot intrusion detection model
Hindy, Hanan, Tachtatzis, Christos, Atkinson, Robert, Brosset, David, Bures, Miroslav, Andonovic, Ivan, Michie, Craig, Bellekens, Xavier
Published in Journal of intelligent information systems (01.04.2023)
Published in Journal of intelligent information systems (01.04.2023)
Get full text
Journal Article
Loading…
Loading…
Loading…
Lightweight Wireless Intrusion Detection Systems Against DDoS Attack
Get full text
Conference Proceeding
Loading…
Loading…
Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
Khaleel, Yahya Layth, Habeeb, Mustafa Abdulfattah, Albahri, A. S., Al-Quraishi, Tahsien, Albahri, O. S., Alamoodi, A. H.
Published in Journal of intelligent systems (07.08.2024)
Published in Journal of intelligent systems (07.08.2024)
Get full text
Journal Article
Loading…
Loading…
Applying Stack Bidirectional LSTM Model to Intrusion Detection
Ran, Ziyong, Zheng, Desheng, Lai, Yanling, Tian, Lulu
Published in Computers, materials & continua (01.01.2020)
Published in Computers, materials & continua (01.01.2020)
Get full text
Journal Article
Loading…
Hybrid Cybersecurity for Asymmetric Threats: Intrusion Detection and SCADA System Protection Innovations
Almalawi, Abdulmohsen, Hassan, Shabbir, Fahad, Adil, Iqbal, Arshad, Khan, Asif Irshad
Published in Symmetry (Basel) (18.04.2025)
Published in Symmetry (Basel) (18.04.2025)
Get full text
Journal Article
Loading…
Suitability of Blockchain for Collaborative Intrusion Detection Systems
Dawit, Nahom Aron, Mathew, Sujith Samuel, Hayawi, Kadhim
Published in 2020 12th Annual Undergraduate Research Conference on Applied Computing (URC) (01.04.2020)
Published in 2020 12th Annual Undergraduate Research Conference on Applied Computing (URC) (01.04.2020)
Get full text
Conference Proceeding
Loading…