An Efficient Deep Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks
暂无分享,去创建一个
[1] Prachi Shukla,et al. ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things , 2017, 2017 Intelligent Systems Conference (IntelliSys).
[2] Vrizlynn L. L. Thing,et al. IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[3] Insoo Koo,et al. Toward a Lightweight Intrusion Detection System for the Internet of Things , 2019, IEEE Access.
[4] Athanasios V. Vasilakos,et al. Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things , 2017, IEEE Cloud Computing.
[5] Zhen Liu,et al. An Adaptive Ensemble Machine Learning Model for Intrusion Detection , 2019, IEEE Access.
[6] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[7] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[8] Bogdan V. Ghita,et al. Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation , 2019, NEW2AN.
[9] Jiang Li,et al. A few-shot deep learning approach for improved intrusion detection , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).
[10] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[11] Athanasios V. Vasilakos,et al. LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment , 2020, J. Netw. Comput. Appl..
[12] Pascal Vincent,et al. Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[13] K. A. Taher,et al. Network Intrusion Detection using Supervised Machine Learning Technique with Feature Selection , 2019, 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST).
[14] Georgios Kambourakis,et al. Attacks and Countermeasures on 802.16: Analysis and Assessment , 2013, IEEE Communications Surveys & Tutorials.
[15] Sung-Bong Jang. Collaborative Documentation Process Model , 2015 .
[16] Gui Yun Tian,et al. Deep Learning Models for Cyber Security in IoT Networks , 2019, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC).
[17] Bogdan V. Ghita,et al. A machine-learning approach to Detect users' suspicious behaviour through the Facebook wall , 2019, ArXiv.
[18] Abdulrahman Alruban,et al. IoT Malware Network Traffic Classification using Visual Representation and Deep Learning , 2020, 2020 6th IEEE Conference on Network Softwarization (NetSoft).
[19] Pavan Pongle,et al. A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[20] Vasos Vassiliou,et al. Classifying Security Attacks in IoT Networks Using Supervised Learning , 2019, 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS).
[21] Claus Nebauer,et al. Evaluation of convolutional neural networks for visual recognition , 1998, IEEE Trans. Neural Networks.
[22] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[23] Francesco Chiti,et al. Context-aware wireless mobile autonomic computing and communications: research trends and emerging applications , 2016, IEEE Wireless Communications.
[24] Erol Gelenbe,et al. Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments , 2018, FNC/MobiSPC.
[25] Lyudmila Sukhostat,et al. Anomaly detection in network traffic using extreme learning machine , 2016, 2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT).
[26] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[27] Murad Khan,et al. Internet of Things: A Comprehensive Review of Enabling Technologies, Architecture, and Challenges , 2018 .
[28] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[29] Robert C. Atkinson,et al. Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).