Tree-Driven Intelligent Security System for Intrusion Detection in IoT environment

M Choukhairi, M M'haouach, Y Fakhri… - … on Wireless Networks …, 2023 - ieeexplore.ieee.org
With the rise of the Internet of Things (IoT), which envisions a connected network of
intelligent devices communicating autonomously through the Internet, the need to deal with …

An Adversarial Learning-based Tor Malware Traffic Detection Model

X Hu, Y Gao, G Cheng, H Wu… - GLOBECOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Attackers often use Tor to launch cyberattacks and conduct illegal transactions, threatening
cyberspace's security and people's daily lives. Existing methods for malware traffic detection …

Principles of robust learning and inference for iobts

ND Bastian, S Jha, P Tabuada… - IoT for Defense and …, 2022 - Wiley Online Library
Summary The Internet of Battlefield Things (IoBTs) operate in an adversarial rapidly‐
evolving environment, necessitating fast, robust and resilient decision‐making. The success …

Cyber creative gan for novel malicious packets

JA Pavlik, ND Bastian - Synthetic Data for Artificial Intelligence …, 2023 - spiedigitallibrary.org
Machine learning (ML) requires both quantity and variety of examples in order to learn
generalizable patterns. In cybersecurity, labeling network packets is a tedious and difficult …

Military and security applications: Cybersecurity

ND Bastian, MD Dinmore - Encyclopedia of optimization, 2023 - Springer
The domain of cybersecurity is growing as part of broader military and security applications,
and the capabilities and processes in this realm have qualities and characteristics that …

Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers

TJ Liu - The Computer Journal, 2024 - academic.oup.com
This paper studies adversarial attacks on network intrusion detection systems (IDSs) based
on deep or machine learning algorithms. Adversarial attacks on network IDSs must maintain …

CARA MEMANIPULASI PEMBELAJARAN MESIN (Machine Learning)

JT Santoso - Penerbit Yayasan Prima Agus Teknik, 2024 - penerbit.stekom.ac.id
Dalam pembelajaran diskriminatif, masalah manipulasi dirumuskan dengan jaringan saraf
yang mengukur perbedaan statistik antara fitur data pelatihan dan fitur data lawan. Jaringan …

Deep Learning with Conditional Generative Adversarial Network Based Intrusion Detection System on Balanced Data

K Hemavathi, R Latha - 2023 4th International Conference on …, 2023 - ieeexplore.ieee.org
Networks have an important role to play in modern life, and cyber security is an active
research area. An Intrusion Detection System (IDS) becomes a crucial cyber security method …

Intrusion Detection in IoT with Machine Learning and Deep Learning: A Systematic Review

MK Nayak, D Gountia, NK Ray - … Computing on IoT 2.0, Big Data …, 2024 - taylorfrancis.com
The security of IoT, particularly intrusion detection system (IDS) based on machine learning
(ML) and deep learning (DL) techniques. We systematically study and analyze different …

Intrusion Detection Systems and its application in latest Networking Technologies–A Survey

K Shanthi, R Maruthi - Educational Administration: Theory and Practice, 2024 - kuey.net
The attackers are using different techniques to intrude themselves into the network or system
to steal our data. The intruding techniques are increasing day by day and it is very difficult to …