SecureDeepNet-IoT: A deep learning application for invasion detection in industrial Internet of Things sensing systems

[1]  Salah El Hadaj,et al.  A Two-Stage Classifier Approach using RepTree Algorithm for Network Intrusion Detection , 2017 .

[2]  Yoshua Bengio,et al.  Greedy Layer-Wise Training of Deep Networks , 2006, NIPS.

[3]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[4]  Arafat Awajan,et al.  Experimental Evaluation of a Multi-layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System , 2017, 2017 International Conference on New Trends in Computing Sciences (ICTCS).

[5]  M. A. Novotny,et al.  An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection , 2018, Comput. Networks.

[6]  Joe Cunningham,et al.  The industrial internet of things (IIoT): An analysis framework , 2018, Comput. Ind..

[7]  Christian Diedrich,et al.  Convolutional Neural Networks for Multi-class Intrusion Detection System , 2018, MIKE.

[8]  K. P. Soman,et al.  Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.

[9]  Wei Wang,et al.  Generalized Autoencoder: A Neural Network Framework for Dimensionality Reduction , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[10]  Wei Wei,et al.  Ensemble machine learning approaches for webshell detection in Internet of things environments , 2020, Trans. Emerg. Telecommun. Technol..

[11]  Novruz Allahverdi,et al.  Deep Learning on Computerized Analysis of Chronic Obstructive Pulmonary Disease , 2020, IEEE Journal of Biomedical and Health Informatics.

[12]  Mohamed Idhammad LabSIV DoS Detection Method based on Artificial Neural Networks , 2017 .

[13]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).

[14]  Salim Hariri,et al.  Anomaly behavior analysis for IoT sensors , 2018, Trans. Emerg. Telecommun. Technol..

[15]  Yanpeng Zhang,et al.  A novel method for network traffic classification based on robust support vector machine , 2020, Trans. Emerg. Telecommun. Technol..

[16]  Imad H. Elhajj,et al.  A machine learning based framework for IoT device identification and abnormal traffic detection , 2019, Trans. Emerg. Telecommun. Technol..

[17]  Shahram Babaie,et al.  A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection , 2018, Comput. Networks.

[18]  Dandan Liu,et al.  DL-IDS: a deep learning-based intrusion detection framework for securing IoT , 2019, Trans. Emerg. Telecommun. Technol..

[19]  Guangming Xian,et al.  Cyber Intrusion Prevention for Large-Scale Semi-Supervised Deep Learning Based on Local and Non-Local Regularization , 2020, IEEE Access.

[20]  Parvez Faruki,et al.  Network Intrusion Detection for IoT Security Based on Learning Techniques , 2019, IEEE Communications Surveys & Tutorials.

[21]  Yoshua Bengio,et al.  Extracting and composing robust features with denoising autoencoders , 2008, ICML '08.

[22]  Yakup Kutlu,et al.  Generative Autoencoder Kernels on Deep Learning for Brain Activity Analysis , 2018, Natural and Engineering Sciences.

[23]  Miguel Nicolau,et al.  Learning Neural Representations for Network Anomaly Detection , 2019, IEEE Transactions on Cybernetics.

[24]  Nour Moustafa,et al.  Identification of malicious activities in industrial internet of things based on deep learning models , 2018, J. Inf. Secur. Appl..

[25]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[26]  Soheil Hashemi,et al.  Internet of Things backdoors: Resource management issues, security challenges, and detection methods , 2020, Trans. Emerg. Telecommun. Technol..

[27]  Chee Kheong Siew,et al.  Extreme learning machine: Theory and applications , 2006, Neurocomputing.

[28]  Song Han,et al.  Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.

[29]  Kim-Kwang Raymond Choo,et al.  An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.