At the Dawn of Generative AI Era: A tutorial-cum-survey on new frontiers in 6G wireless intelligence

A Celik, AM Eltawil - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
As we transition from the 5G epoch, a new horizon beckons with the advent of 6G, seeking a
profound fusion with novel communication paradigms and emerging technological trends …

VANET network traffic anomaly detection using GRU-based deep learning model

G ALMahadin, Y Aoudni, M Shabaz… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The rise of Vehicular Ad-hoc Networks (VANETs) has led to the growing significance in
intelligent transportation systems. This research suggests a deep learning model for …

[HTML][HTML] Advancements in detecting, preventing, and mitigating DDoS attacks in cloud environments: A comprehensive systematic review of state-of-the-art …

M Ouhssini, K Afdel, M Akouhar, E Agherrabi… - Egyptian Informatics …, 2024 - Elsevier
This comprehensive study examines cutting-edge strategies for combating Distributed
Denial of Service (DDoS) attacks in cloud environments, addressing a critical gap in recent …

TS-IDS: Traffic-aware self-supervised learning for IoT Network Intrusion Detection

H Nguyen, R Kashef - Knowledge-Based Systems, 2023 - Elsevier
With recent advances in the Internet of Things (IoT) technology, more people can have
instant and easy access to the IoT network of vast and diverse interconnected devices (eg …

Quantum walks-based classification model with resistance for cloud computing attacks

X Wu, Z Jin, J Zhou, C Duan - Expert Systems with Applications, 2023 - Elsevier
Cloud computing is considerably investigable and adoptable in both industry and academia,
and Software Defined Networking (SDN) has been applied in cloud computing. Although …

Deep clustering hierarchical latent representation for anomaly-based cyber-attack detection

VQ Nguyen, LT Ngo, VH Nguyen, N Shone - Knowledge-Based Systems, 2024 - Elsevier
In the field of anomaly detection, well-known techniques and state-of-the-art models often
face challenges when interpreting the latent space, which hinders their behavioral …

[PDF][PDF] DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning.

Y Sanjalawe, T Althobaiti - Computers, Materials & Continua, 2023 - cdn.techscience.cn
Intrusion Detection System (IDS) in the cloud Computing (CC) environment has received
paramount interest over the last few years. Among the latest approaches, Deep Learning …

[HTML][HTML] Focal Causal Temporal Convolutional Neural Networks: Advancing IIoT Security with Efficient Detection of Rare Cyber-Attacks

M Miryahyaei, M Fartash, J Akbari Torkestani - Sensors, 2024 - mdpi.com
The Industrial Internet of Things (IIoT) deals with vast amounts of data that must be
safeguarded against tampering or theft. Identifying rare attacks and addressing data …

A marine hydrographic station networks intrusion detection method based on LCVAE and CNN-BiLSTM

T Hou, H Xing, X Liang, X Su, Z Wang - Journal of Marine Science and …, 2023 - mdpi.com
Marine sensors are highly vulnerable to illegal access network attacks. Moreover, the
nation's meteorological and hydrological information is at ever-increasing risk, which calls …

Diff-MTS: Temporal-Augmented Conditional Diffusion-Based AIGC for Industrial Time Series Toward the Large Model Era

L Ren, H Wang, Y Laili - IEEE Transactions on Cybernetics, 2024 - ieeexplore.ieee.org
Industrial multivariate time series (MTS) is a critical view of the industrial field for people to
understand the state of machines. However, due to data collection difficulty and privacy …