Intrusion detection systems: A cross-domain overview

LN Tidjon, M Frappier… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …

Enhancing medical smartphone networks via blockchain-based trust management against insider attacks

W Meng, W Li, L Zhu - IEEE Transactions on Engineering …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has gradually become one of the most important platforms across
different disciplines, by enabling dedicated physical objects to communicate with other …

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

L Liu, Z Ma, W Meng - Future generation computer systems, 2019 - Elsevier
Abstract The Internet of Things (IoT) has experienced a rapid growth in the last few years
allowing different Internet-enabled devices to interact with each other in various …

Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems

Y Wang, W Meng, W Li, Z Liu, Y Liu… - … Practice and Experience, 2019 - Wiley Online Library
To protect assets and resources from being hacked, intrusion detection systems are widely
implemented in organizations around the world. However, false alarms are one challenging …

Design of multi-view based email classification for IoT systems via semi-supervised learning

W Li, W Meng, Z Tan, Y Xiang - Journal of Network and Computer …, 2019 - Elsevier
Suspicious emails are one big threat for Internet of Things (IoT) security, which aim to induce
users to click and then redirect them to a phishing webpage. To protect IoT systems, email …

DEMISe: Interpretable deep extraction and mutual information selection techniques for IoT intrusion detection

LR Parker, PD Yoo, TA Asyhari, L Chermak… - Proceedings of the 14th …, 2019 - dl.acm.org
Recent studies have proposed that traditional security technology--involving pattern-
matching algorithms that check predefined pattern sets of intrusion signatures--should be …

Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: a further analysis

W Li, LF Kwok - Journal of Information Security and Applications, 2019 - Elsevier
Collaborative intrusion detection systems/networks (CIDSs/CIDNs) have been widely used,
aiming to enhance the performance of a single intrusion detection system (IDS), by allowing …

Review on insider threat detection techniques

TO Oladimeji, CK Ayo… - Journal of Physics …, 2019 - iopscience.iop.org
An insider, also regarded as an employee of a company, becomes a threat when the
intention or action can affect the company negatively. Insider threat has been an eminent …

[PDF][PDF] Trust-based selfish node detection mechanism using beta distribution in wireless sensor network

V Kanchana Devi, R Ganesan - J. ICT Res. Appl, 2019 - pdfs.semanticscholar.org
Wireless sensor networks (WSNs) are placed in open environments for the collection of data
and are vulnerable to external and internal attacks. The cryptographic mechanisms …

A review on intrusion detection approaches in cloud security systems

S Singh, M Kubendiran… - International Journal of …, 2019 - inderscienceonline.com
Cloud computing is a technology that allows the conveyance of services, storage, network,
computing power, etc., over the internet. The on-demand and ubiquitous nature of this …