AS-IDS: Anomaly and Signature Based IDS for the Internet of Things
暂无分享,去创建一个
[1] Yaser Jararweh,et al. Trustworthy and sustainable smart city services at the edge , 2020 .
[2] Amiya Nayak,et al. On securing IoT from Deep Learning perspective , 2020, 2020 IEEE Symposium on Computers and Communications (ISCC).
[3] Ahmad Sharieh,et al. A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer , 2020 .
[4] Ji Won Kim,et al. CNN-Based Network Intrusion Detection against Denial-of-Service Attacks , 2020, Electronics.
[5] Lu Lv,et al. A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine , 2020, Knowl. Based Syst..
[6] Bernabé Dorronsoro,et al. Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches , 2020, Applied Sciences.
[7] Zeeshan Ali Khan,et al. Reputation Management Using Honeypots for Intrusion Detection in the Internet of Things , 2020, Electronics.
[8] Tohari Ahmad,et al. Improving Intrusion Detection System by Estimating Parameters of Random Forest in Boruta , 2020, 2020 International Conference on Smart Technology and Applications (ICoSTA).
[9] Smitha Rajagopal,et al. A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets , 2020, Secur. Commun. Networks.
[10] Joarder Kamruzzaman,et al. Hybrid Intrusion Detection System Based on the Stacking Ensemble of C5 Decision Tree Classifier and One Class Support Vector Machine , 2020, Electronics.
[11] Dandan Liu,et al. DL-IDS: a deep learning-based intrusion detection framework for securing IoT , 2019, Trans. Emerg. Telecommun. Technol..
[12] Joarder Kamruzzaman,et al. A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks , 2019, Electronics.
[13] Genoveva Vargas-Solar,et al. Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning , 2019, Secur. Commun. Networks.
[14] Iraj Mahdavi,et al. Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms , 2019, J. King Saud Univ. Comput. Inf. Sci..
[15] Nagaraj Balakrishnan,et al. Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things , 2019, Internet Things.
[16] Yaser Jararweh,et al. An intrusion detection system for connected vehicles in smart cities , 2019, Ad Hoc Networks.
[17] Ishbel Duncan,et al. Improving Intrusion Detection Model Prediction by Threshold Adaptation , 2019, Inf..
[18] Geethapriya Thamilarasu,et al. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things , 2019, Sensors.
[19] Md. Rezaul Karim,et al. A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network , 2019, Symmetry.
[20] Maninder Singh,et al. Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks , 2019, Neural Computing and Applications.
[21] Ali Dehghantanha,et al. A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[22] Ying Zhang,et al. Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network , 2019, IEEE Access.
[23] Ahmed I. Saleh,et al. A hybrid intrusion detection system (HIDS) based on prioritized k-nearest neighbors and optimized SVM classifiers , 2017, Artificial Intelligence Review.
[24] Burak Kantarci,et al. On the Feasibility of Deep Learning in Sensor Network Intrusion Detection , 2019, IEEE Networking Letters.
[25] Gozde Karatas,et al. Deep Learning in Intrusion Detection Systems , 2018, 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT).
[26] A. Awad,et al. Intrusion detection systems for IoT-based smart environments: a survey , 2018, Journal of Cloud Computing.
[27] Kai Yang,et al. Active Learning for Wireless IoT Intrusion Detection , 2018, IEEE Wireless Communications.
[28] Abhishek Kumar,et al. Anomaly Based Novel Intrusion Detection System For Network Traffic Reduction , 2018, 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on.
[29] Yi Yi Aung,et al. Hybrid Intrusion Detection System using K-means and K-Nearest Neighbors Algorithms , 2018, 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS).
[30] Ramiro Gonçalves,et al. Intrusion detection systems in Internet of Things: A literature review , 2018, 2018 13th Iberian Conference on Information Systems and Technologies (CISTI).
[31] Altaf H. Khan,et al. Lightweight Neural Networks , 2017, ArXiv.
[32] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[33] S. J. Mousavirad,et al. Human mental search: a new population-based metaheuristic optimization algorithm , 2017, Applied Intelligence.
[34] Jin Cao,et al. An Automata Based Intrusion Detection Method for Internet of Things , 2017, Mob. Inf. Syst..
[35] Suresh N. Mali,et al. Security Enrichment in Intrusion Detection System Using Classifier Ensemble , 2017, J. Electr. Comput. Eng..
[36] Saliha Buyukcorak,et al. Hybrid Intrusion Detection System for DDoS Attacks , 2016, J. Electr. Comput. Eng..
[37] Qiang Ye,et al. Discrete Hessian Eigenmaps method for dimensionality reduction , 2015, J. Comput. Appl. Math..
[38] Aili Wang,et al. Network Intrusion Detection Combined Hybrid Sampling With Deep Hierarchical Network , 2020, IEEE Access.
[39] Amr Badr,et al. A Hybrid Nested Genetic-Fuzzy Algorithm Framework for Intrusion Detection and Attacks , 2020, IEEE Access.
[40] Dechang Pi,et al. HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems , 2019, IEEE Access.
[41] Mohamed Limam,et al. Enhancing the Accuracy of Intrusion Detection Systems by Reducing the Rates of False Positives and False Negatives Through Multi-objective Optimization , 2018, Journal of Network and Systems Management.
[42] Yong Tang,et al. An Automated Signature-Based Approach against Polymorphic Internet Worms , 2007, IEEE Trans. Parallel Distributed Syst..