Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions

N Moustafa, N Koroniotis, M Keshk… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The field of Explainable Artificial Intelligence (XAI) has garnered considerable research
attention in recent years, aiming to provide interpretability and confidence to the inner …

A unifying review of deep and shallow anomaly detection

L Ruff, JR Kauffmann, RA Vandermeulen… - Proceedings of the …, 2021 - ieeexplore.ieee.org
Deep learning approaches to anomaly detection (AD) have recently improved the state of
the art in detection performance on complex data sets, such as large collections of images or …

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

A Khraisat, A Alazab - Cybersecurity, 2021 - Springer
Abstract The Internet of Things (IoT) has been rapidly evolving towards making a greater
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …

Ai-driven cybersecurity: an overview, security intelligence modeling and research directions

IH Sarker, MH Furhad, R Nowrozy - SN Computer Science, 2021 - Springer
Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or
Industry 4.0), which can be used for the protection of Internet-connected systems from cyber …

Cybersecurity data science: an overview from machine learning perspective

IH Sarker, ASM Kayes, S Badsha, H Alqahtani… - Journal of Big …, 2020 - Springer
In a computing context, cybersecurity is undergoing massive shifts in technology and its
operations in recent days, and data science is driving the change. Extracting security …

Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection …

RA Disha, S Waheed - Cybersecurity, 2022 - Springer
To protect the network, resources, and sensitive data, the intrusion detection system (IDS)
has become a fundamental component of organizations that prevents cybercriminal …

Survey of intrusion detection systems: techniques, datasets and challenges

A Khraisat, I Gondal, P Vamplew, J Kamruzzaman - Cybersecurity, 2019 - Springer
Cyber-attacks are becoming more sophisticated and thereby presenting increasing
challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade …

An effective intrusion detection approach using SVM with naïve Bayes feature embedding

J Gu, S Lu - Computers & Security, 2021 - Elsevier
Network security has become increasingly important in recent decades, while intrusion
detection system plays a critical role in protecting it. Various machine learning techniques …

Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues

A Aldweesh, A Derhab, AZ Emam - Knowledge-Based Systems, 2020 - Elsevier
The massive growth of data that are transmitted through a variety of devices and
communication protocols have raised serious security concerns, which have increased the …