A systematic literature review of intrusion detection system for network security: Research trends, datasets and methods

R Ferdiana - … 4th International Conference on Informatics and …, 2020 - ieeexplore.ieee.org
Study on intrusion detection system (IDS) mostly allow network administrators to focus on
development activities in terms of network security and making better use of resource. Many …

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

Robust detection for network intrusion of industrial IoT based on multi-CNN fusion

Y Li, Y Xu, Z Liu, H Hou, Y Zheng, Y Xin, Y Zhao, L Cui - Measurement, 2020 - Elsevier
A robust intrusion detection system plays a very important role in network security. In the
face of complex network data and diverse intrusion methods, traditional machine learning …

Wireless sensor network security: A recent review based on state-of-the-art works

M Faris, MN Mahmud, MFM Salleh… - International Journal of …, 2023 - journals.sagepub.com
Wireless sensor networks (WSNs) are a major part of the telecommunications sector. WSN is
applied in many aspects, including surveillance battlefields, patient medical monitoring …

A statistical approach to detect jamming attacks in wireless sensor networks

O Osanaiye, AS Alfa, GP Hancke - Sensors, 2018 - mdpi.com
Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising
network solutions with a wide variety of applications in the areas of agriculture, environment …

An intrusion detection system for wireless sensor networks using deep neural network

V Gowdhaman, R Dhanapal - Soft Computing, 2022 - Springer
Wireless sensor network comprises of a large number of sensor nodes to acquire and
transmit data to the central location. However, due to resource constrained nodes …

Denial of service defence for resource availability in wireless sensor networks

OA Osanaiye, AS Alfa, GP Hancke - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless sensor networks (WSN) over the years have become one of the most promising
networking solutions with exciting new applications for the near future. Its deployment has …

Hidden Markov models and alert correlations for the prediction of advanced persistent threats

I Ghafir, KG Kyriakopoulos, S Lambotharan… - IEEE …, 2019 - ieeexplore.ieee.org
Cyber security has become a matter of a global interest, and several attacks target industrial
companies and governmental organizations. The advanced persistent threats (APTs) have …

An intrusion detection method based on machine learning and state observer for train-ground communication systems

B Gao, B Bu, W Zhang, X Li - IEEE Transactions on Intelligent …, 2021 - ieeexplore.ieee.org
The communication-based train control (CBTC) system is a typical cyber physical system in
urban rail transit. The train-ground communication system is a very important subsystem of …

[PDF][PDF] A study on intrusion detection system in wireless sensor networks

S Godala, RPV Vaddella - International Journal of Communication …, 2020 - researchgate.net
The technology of Wireless Sensor Networks (WSNs) has become most significant in
present day. WSNs are extensively used in applications like military, industry, health, smart …