A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism

S Cai, H Xu, M Liu, Z Chen, G Zhang - Computers & Security, 2024 - Elsevier
The increasingly frequent network intrusions have brought serious impacts to the production
and life, thus malicious network traffic detection has received more and more attention in …

Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things

D Manivannan - Journal of Network and Computer Applications, 2024 - Elsevier
The significant advancements in sensors and other resource-constrained devices, capable
of collecting data and communicating wirelessly, are poised to revolutionize numerous …

[HTML][HTML] Federated learning enables 6 G communication technology: Requirements, applications, and integrated with intelligence framework

MK Hasan, AKMA Habib, S Islam, N Safie… - Alexandria Engineering …, 2024 - Elsevier
The 5 G networks are effectively deployed worldwide, and academia and industries have
begun looking at 6 G network communication technology for consumer electronics …

[HTML][HTML] Mitigating Adversarial Attacks against IoT Profiling

ECP Neto, S Dadkhah, S Sadeghi, H Molyneaux - Electronics, 2024 - mdpi.com
Internet of Things (IoT) applications have been helping society in several ways. However,
challenges still must be faced to enable efficient and secure IoT operations. In this context …

Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory

F Ullah, A Turab, S Ullah, D Cacciagrano, Y Zhao - Sensors, 2024 - mdpi.com
Internet of Things (IoT) applications and resources are highly vulnerable to flood attacks,
including Distributed Denial of Service (DDoS) attacks. These attacks overwhelm the …

[PDF][PDF] Dependable Cyber-Physical Systems: concepts, challenges, and case studies

LC MICLEA, A CIOBOTARU, M MISAROS… - Technical …, 2023 - jesi.astr.ro
As the integration of cyber and physical components becomes increasingly prevalent in
modern systems, ensuring the dependability of Cyber-Physical Systems (CPS) has emerged …

Node Compromising Detection to Mitigate Poisoning Attacks in IoT Networks

FK Vuseghesa, ML Messai… - … and Mobile Computing …, 2024 - ieeexplore.ieee.org
The emergence of the Internet of Things (IoT) networks as a source of large amount of data
has paved the way for the adoption of machine learning models. Divers datasets, used in the …

Privacy-Preserving Detection of DDoS Attacks in IoT Using Federated Learning Techniques

K Bhatia, S Bhattacharya… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Internet of Things devices are widely employed in various industries, cities, and institutions
as with low-cost investment various benefits can be obtained. The computing power …

A Robust Data-Driven Framework for Artificial Intelligent Systems

QH Nguyen - 2024 - search.proquest.com
Artificial Intelligence (AI) systems have demonstrated remarkable performance across
various domains. However, their robustness remains a critical concern, particularly in terms …

Hybrid Deep Learning framework-based intrusion detection system for the Internet of Things

AR Nair - … International Conference on Intelligent Systems for …, 2024 - ieeexplore.ieee.org
The recent surge in Internet of Things (IoT) devices has brought about unique security
challenges. These devices have limited resources and are vulnerable to attacks. As Internet …