A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations

MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin… - Applied Sciences, 2020 - mdpi.com
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …

Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions

W Li, W Meng, LF Kwok - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …

A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks

O Alkadi, N Moustafa, B Turnbull… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
There has been significant research in incorporating both blockchain and intrusion detection
to improve data privacy and detect existing and emerging cyberattacks, respectively. In …

Machine learning based trust computational model for IoT services

U Jayasinghe, GM Lee, TW Um… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The Internet of Things has facilitated access to a large volume of sensitive information on
each participating object in an ecosystem. This imposes many threats ranging from the risks …

Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments

W Li, W Meng, MH Au - Journal of Network and Computer Applications, 2020 - Elsevier
Collaborative intrusion detection systems (CIDSs) are developing to improve the detection
performance of a single detector in Internet of Things (IoT) networks, through exchanging …

Enhancing medical smartphone networks via blockchain-based trust management against insider attacks

W Meng, W Li, L Zhu - IEEE Transactions on Engineering …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has gradually become one of the most important platforms across
different disciplines, by enabling dedicated physical objects to communicate with other …

Trust‐based attack and defense in wireless sensor networks: a survey

W Fang, W Zhang, W Chen, T Pan… - … and Mobile Computing, 2020 - Wiley Online Library
As a key component of the information sensing and aggregating for big data, cloud
computing, and Internet of Things (IoT), the information security in wireless sensor network …

Intrusion detection systems: A cross-domain overview

LN Tidjon, M Frappier… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …

Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration

W Meng, W Li, J Zhou - Information Fusion, 2021 - Elsevier
With the rapid development of Internet-of-Things (IoT), more smart devices can be
connected to the Internet, resulting in a dramatic increase of data transmission and …

A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions

O Alkadi, N Moustafa, B Turnbull - IEEE Access, 2020 - ieeexplore.ieee.org
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …