Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions

N Moustafa, N Koroniotis, M Keshk… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The field of Explainable Artificial Intelligence (XAI) has garnered considerable research
attention in recent years, aiming to provide interpretability and confidence to the inner …

Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset

SM Kasongo, Y Sun - Journal of Big Data, 2020 - Springer
Computer networks intrusion detection systems (IDSs) and intrusion prevention systems
(IPSs) are critical aspects that contribute to the success of an organization. Over the past …

Dew-cloud-based hierarchical federated learning for intrusion detection in IoMT

P Singh, GS Gaba, A Kaur, M Hedabou… - IEEE journal of …, 2022 - ieeexplore.ieee.org
The coronavirus pandemic has overburdened medical institutions, forcing physicians to
diagnose and treat their patients remotely. Moreover, COVID-19 has made humans more …

Machine learning for DDoS attack detection in industry 4.0 CPPSs

FB Saghezchi, G Mantas, MA Violas… - Electronics, 2022 - mdpi.com
The Fourth Industrial Revolution (Industry 4.0) has transformed factories into smart Cyber-
Physical Production Systems (CPPSs), where man, product, and machine are fully …

A systematic overview of the machine learning methods for mobile malware detection

Y Kim, JJ Lee, MH Go, HY Kang… - Security and …, 2022 - Wiley Online Library
With the deployment of the 5G cellular system, the upsurge of diverse mobile applications
and devices has increased the potential challenges and threats posed to users. Industry and …

An anomaly-based intrusion detection system for internet of medical things networks

G Zachos, I Essop, G Mantas, K Porfyrakis, JC Ribeiro… - Electronics, 2021 - mdpi.com
Over the past few years, the healthcare sector is being transformed due to the rise of the
Internet of Things (IoT) and the introduction of the Internet of Medical Things (IoMT) …

Android malware detection using network traffic based on sequential deep learning models

S Fallah, AJ Bidgoly - Software: Practice and Experience, 2022 - Wiley Online Library
The increasing trend of smartphone capabilities has caught the attention of many users. This
has led to the emergence of malware that threatening the users' privacy and security. Many …

Hybrid optimization enabled deep learning technique for multi-level intrusion detection

ES GSR, M Azees, CHR Vinodkumar… - … in Engineering Software, 2022 - Elsevier
The intrusion detection system identifies the attack through the reputation and progression of
network methodology and the Internet. Moreover, conventional intrusion recognition …

A novel dynamic approach for risk analysis and simulation using multi-agents model

H Kanj, WHF Aly, S Kanj - Applied Sciences, 2022 - mdpi.com
Static risk analysis techniques (SRATs) use event graphs and risk analysis assessment
models. Those techniques are not time-based techniques and hence are inadequate to …

A hyperledger fabric-based blockchain architecture to secure IoT-based health monitoring systems

FP Oikonomou, J Ribeiro, G Mantas… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
Although blockchain is a promising technology that can bring significant benefits into current
centralized IoT-based health monitoring systems in order to address security challenges, the …