A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges

A Thakkar, R Lohiya - Archives of Computational Methods in Engineering, 2021 - Springer
Abstract Internet of Things (IoT) is widely accepted technology in both industrial as well as
academic field. The objective of IoT is to combine the physical environment with the cyber …

Data mining techniques in intrusion detection systems: A systematic literature review

F Salo, M Injadat, AB Nassif, A Shami, A Essex - IEEE Access, 2018 - ieeexplore.ieee.org
The continued ability to detect malicious network intrusions has become an exercise in
scalability, in which data mining techniques are playing an increasingly important role. We …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

Optimization of RBF-SVM kernel using grid search algorithm for DDoS attack detection in SDN-based VANET

GO Anyanwu, CI Nwakanma, JM Lee… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The dynamic nature of the vehicular space exposes it to distributed malicious attacks
irrespective of the integration of enabling technologies. The software-defined network (SDN) …

Design of intrusion detection system for internet of things based on improved BP neural network

A Yang, Y Zhuansun, C Liu, J Li, C Zhang - Ieee Access, 2019 - ieeexplore.ieee.org
With the advent of global 5G networks, the Internet of Things will no longer be limited by
network speed and traffic. With the large-scale application of the Internet of Things, people …

Network intrusion detection using multi-architectural modular deep neural network

R Atefinia, M Ahmadi - The Journal of Supercomputing, 2021 - Springer
The exponential growth of computer networks and the adoption of new network-based
technologies have made computer security an important challenge. With the emergence of …

Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network

P Rani, S Verma, GN Nguyen - IEEE access, 2020 - ieeexplore.ieee.org
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …

Pelatihan Manajemen Usaha Dalam Meningkatkan Usaha UMKM Kuliner

A Hardana, A Damisa - Medani: Jurnal Pengabdian …, 2022 - jurnal.risetilmiah.ac.id
Abstract Jumlah Usaha Mikro Kecil serta Menengah (UMKM) ialah bagian yang besar dari
pelaksana ekonomi secara totalitas. Tetapi pertumbuhan UMKM yang berkaitan dengan …

Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks

A Davahli, M Shamsi, G Abaei - Journal of Ambient Intelligence and …, 2020 - Springer
Open wireless sensor networks (WSNs) in Internet of things (IoT) has led to many zero-day
security attacks. Since intrusion detection is a key security solution, this paper presents a …

A survey on feature selection techniques based on filtering methods for cyber attack detection

Y Lyu, Y Feng, K Sakurai - Information, 2023 - mdpi.com
Cyber attack detection technology plays a vital role today, since cyber attacks have been
causing great harm and loss to organizations and individuals. Feature selection is a …