[PDF][PDF] A two-stage deep learning approach for can intrusion detection

L Zhang, L Shi, N Kaja, D Ma - Proc. Ground Vehicle Syst. Eng …, 2018 - gvsets.ndia-mich.org
With recent advancements in the automotive world and the introductions of autonomous
vehicles, automotive cybersecurity has become a main and primary issue for every …

Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and …

AM Aleesa, BB Zaidan, AA Zaidan… - Neural Computing and …, 2020 - Springer
This study reviews and analyses the research landscape for intrusion detection systems
(IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the …

Intelligent cyber attack detection and classification for network-based intrusion detection systems

N Oliveira, I Praça, E Maia, O Sousa - Applied Sciences, 2021 - mdpi.com
With the latest advances in information and communication technologies, greater amounts of
sensitive user and corporate information are shared continuously across the network …

Intrusion detection systems using support vector machines on the kddcup'99 and nsl-kdd datasets: A comprehensive survey

MK Ngueajio, G Washington, DB Rawat… - Proceedings of SAI …, 2022 - Springer
With the growing rates of cyber-attacks and cyber espionage, the need for better and more
powerful intrusion detection systems (IDS) is even more warranted nowadays. The basic …

[PDF][PDF] Deep feature extraction for multi-class intrusion detection in industrial control systems

S Potluri, C Diedrich - International Journal of Computer Theory and …, 2017 - ijcte.com
In recent days, network based communication is more vulnerable to outsider and insider
attacks due to its wide spread applications in different domains. Intrusion detection is a key …

An evaluation of machine learning methods to detect malicious SCADA communications

JM Beaver, RC Borges-Hink… - 2013 12th international …, 2013 - ieeexplore.ieee.org
Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems have been
designed to operate on closed, proprietary networks where a malicious insider posed the …

Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review

H Kheddar, Y Himeur, AI Awad - Journal of Network and Computer …, 2023 - Elsevier
Globally, the external internet is increasingly being connected to industrial control systems.
As a result, there is an immediate need to protect these networks from a variety of threats …

Efficient cyber attack detection in industrial control systems using lightweight neural networks and pca

M Kravchik, A Shabtai - IEEE transactions on dependable and …, 2021 - ieeexplore.ieee.org
Industrial control systems (ICSs) are widely used and vital to industry and society. Their
failure can have severe impact on both the economy and human life. Hence, these systems …

A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems

A Patel, H Alhussian, JM Pedersen, B Bounabat… - Computers & …, 2017 - Elsevier
Smart Grid (SG) systems are critical, intelligent infrastructure utility services connected
through open networks that are potentially susceptible to cyber-attacks with very acute …

A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems

AI Abubakar, H Chiroma, SA Muaz, LB Ila - Procedia Computer Science, 2015 - Elsevier
Cybercrime has led to the loss of billions of dollars, the malfunctioning of computer systems,
the destruction of critical information, the compromising of network integrity and …