A survey of intrusion detection systems in wireless sensor networks

I Butun, SD Morgera, R Sankar - IEEE communications surveys …, 2013 - ieeexplore.ieee.org
Wireless Sensor Networking is one of the most promising technologies that have
applications ranging from health care to tactical military. Although Wireless Sensor Networks …

From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods

A Nisioti, A Mylonas, PD Yoo… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …

Taxonomy and survey of collaborative intrusion detection

E Vasilomanolakis, S Karuppayah… - ACM computing …, 2015 - dl.acm.org
The dependency of our society on networked computers has become frightening: In the
economy, all-digital networks have turned from facilitators to drivers; as cyber-physical …

An entropy-based network anomaly detection method

P Bereziński, B Jasiul, M Szpyrka - Entropy, 2015 - mdpi.com
Data mining is an interdisciplinary subfield of computer science involving methods at the
intersection of artificial intelligence, machine learning and statistics. One of the data mining …

Evaluating computer intrusion detection systems: A survey of common practices

A Milenkoski, M Vieira, S Kounev, A Avritzer… - ACM Computing …, 2015 - dl.acm.org
The evaluation of computer intrusion detection systems (which we refer to as intrusion
detection systems) is an active research area. In this article, we survey and systematize …

[图书][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

Towards model generalization for intrusion detection: Unsupervised machine learning techniques

M Verkerken, L D'hooge, T Wauters, B Volckaert… - Journal of Network and …, 2022 - Springer
Through the ongoing digitization of the world, the number of connected devices is
continuously growing without any foreseen decline in the near future. In particular, these …

XG-BoT: An explainable deep graph neural network for botnet detection and forensics

WW Lo, G Kulatilleke, M Sarhan, S Layeghy… - Internet of Things, 2023 - Elsevier
In this paper, we propose XG-BoT, an explainable deep graph neural network model for
botnet node detection. The proposed model comprises a botnet detector and an explainer …

Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors

D Han, Z Wang, Y Zhong, W Chen… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
Machine learning (ML), especially deep learning (DL) techniques have been increasingly
used in anomaly-based network intrusion detection systems (NIDS). However, ML/DL has …

SEHIDS: Self evolving host-based intrusion detection system for IoT networks

M Baz - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) offers unprecedented opportunities to access anything from
anywhere and at any time. It is, therefore, not surprising that the IoT acts as a paramount …