A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning
暂无分享,去创建一个
[1] Ananth A. Jillepalli,et al. IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method , 2022, Applied Sciences.
[2] S. Meher,et al. Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection , 2022, The Journal of Supercomputing.
[3] Q. A. Al-Haija,et al. ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks , 2022, J. Sens. Actuator Networks.
[4] Ahmad Al Badawi,et al. Boost‐Defence for resilient IoT networks: A head‐to‐toe approach , 2022, Expert Syst. J. Knowl. Eng..
[5] Syed Ghazanfar Abbas,et al. Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System , 2022, Sensors.
[6] Q. Abu Al-haija,et al. Attack-Aware IoT Network Traffic Routing Leveraging Ensemble Learning , 2021, Sensors.
[7] Sajjad Shaukat Jamal,et al. A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT , 2021, Sensors.
[8] William J. Buchanan,et al. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks , 2021, Sensors.
[9] Qasem Abu Al-Haija,et al. An Efficient Deep Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks , 2020, Electronics.
[10] P. A. Lyakhov,et al. Application of the residue number system to reduce hardware costs of the convolutional neural network implementation , 2020, Math. Comput. Simul..
[11] C. C. Sobin,et al. A Survey on Architecture, Protocols and Challenges in IoT , 2020, Wireless Personal Communications.
[12] Qusay H. Mahmoud,et al. A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks , 2020, Canadian Conference on AI.
[13] P. Orson,et al. Embedding spheres in knot traces , 2020, Compositio Mathematica.
[14] Eric Gamess,et al. An Evaluation of Machine Learning-based Anomaly Detection in a SCADA System Using the Modbus Protocol , 2020, ACM Southeast Regional Conference.
[15] S Smys,et al. Anomalies Detection in Fog Computing Architectures Using Deep Learning , 2020 .
[16] P. Tiwari,et al. Internet of Things is a revolutionary approach for future technology enhancement: a review , 2019, Journal of Big Data.
[17] Jiankun Hu,et al. A holistic review of Network Anomaly Detection Systems: A comprehensive survey , 2019, J. Netw. Comput. Appl..
[18] Joe Cunningham,et al. The industrial internet of things (IIoT): An analysis framework , 2018, Comput. Ind..
[19] Hans D. Schotten,et al. Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set , 2018, ARES.
[20] Song Han,et al. Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.
[21] Tanweer Alam,et al. A Reliable Communication Framework and its Use in Internet of Things (Iot) , 2018 .
[22] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[23] Wenpeng Yin,et al. Comparative Study of CNN and RNN for Natural Language Processing , 2017, ArXiv.
[24] Elisa Bertino,et al. Internet of Things (IoT) , 2016, ACM Trans. Internet Techn..
[25] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[26] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[27] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[28] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[29] Geoffrey E. Hinton,et al. Improving neural networks by preventing co-adaptation of feature detectors , 2012, ArXiv.
[30] Thomas Morris,et al. A testbed for SCADA control system cybersecurity research and pedagogy , 2011, CSIIRW '11.
[31] Dony Ariyus,et al. Intrusion Detection System (IDS) , 2010 .
[32] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[33] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[34] D. Hubel,et al. Receptive fields and functional architecture of monkey striate cortex , 1968, The Journal of physiology.
[35] Zahir Tari,et al. TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems , 2020, IEEE Access.
[36] Qian Chen,et al. Chapter Three - Toward realizing self-protecting healthcare information systems: Design and security challenges , 2019, Adv. Comput..
[37] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[38] Jean-Marie Flaus,et al. A Deep Learning Approach for Intrusion Detection System in Industry Network , 2018, BDCSIntell.
[39] Yoav Goldberg. Neural Network Methods for Natural Language Processing , 2017 .
[40] José M. Fernandez,et al. Providing SCADA Network Data Sets for Intrusion Detection Research , 2016, CSET @ USENIX Security Symposium.