Classification and explanation for intrusion detection system based on ensemble trees and SHAP method

TTH Le, H Kim, H Kang, H Kim - Sensors, 2022 - mdpi.com
In recent years, many methods for intrusion detection systems (IDS) have been designed
and developed in the research community, which have achieved a perfect detection rate …

Securing wireless sensor networks using machine learning and blockchain: A review

S Ismail, DW Dawoud, H Reza - Future Internet, 2023 - mdpi.com
As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs)
are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have …

XGBoost for imbalanced multiclass classification-based industrial internet of things intrusion detection systems

TTH Le, YE Oktian, H Kim - Sustainability, 2022 - mdpi.com
The Industrial Internet of Things (IIoT) has advanced digital technology and the fastest
interconnection, which creates opportunities to substantially grow industrial businesses …

Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network

S Salmi, L Oughdir - Journal of Big Data, 2023 - Springer
Wireless sensor networks (WSNs) are increasingly being used for data monitoring and
collection purposes. Typically, they consist of a large number of sensor nodes that are used …

SLGBM: An intrusion detection mechanism for wireless sensor networks in smart environments

S Jiang, J Zhao, X Xu - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless sensor network (WSN), which serves as one of the key components of the cyber
physical system, is a wireless network composed of many stationary or moving sensors in a …

Polymorphic Adversarial DDoS attack on IDS using GAN

R Chauhan, SS Heydari - 2020 International Symposium on …, 2020 - ieeexplore.ieee.org
Intrusion Detection systems are important tools in preventing malicious traffic from
penetrating into networks and systems. Recently, Intrusion Detection Systems are rapidly …

Multi-stage jamming attacks detection using deep learning combined with kernelized support vector machine in 5G cloud radio access networks

M Hachimi, G Kaddoum, G Gagnon… - … symposium on networks …, 2020 - ieeexplore.ieee.org
In 5G networks, the Cloud Radio Access Network (C-RAN) is considered a promising future
architecture in terms of minimizing energy consumption and allocating resources efficiently …

Stochastic gradient descent intrusions detection for wireless sensor network attack detection system using machine learning

HM Saleh, H Marouane, A Fakhfakh - IEEE Access, 2024 - ieeexplore.ieee.org
Communication in cyber-physical systems relies heavily on Wireless Sensor Networks
(WSNs), which have numerous uses including ambient monitoring, object recognition, and …

A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks

M Alqahtani, A Gumaei, H Mathkour… - Sensors, 2019 - mdpi.com
An Intrusion detection system is an essential security tool for protecting services and
infrastructures of wireless sensor networks from unseen and unpredictable attacks. Few …

Detection of Denial-of-Service Attack in Wireless Sensor Networks: A lightweight Machine Learning Approach

MA Elsadig - IEEE Access, 2023 - ieeexplore.ieee.org
The characteristics and performance of wireless sensor networks (WSNs) are the main
reasons for their rapid expansion in various fields. However, these networks are extremely …