Advancing cybersecurity: a comprehensive review of AI-driven detection techniques

AH Salem, SM Azzam, OE Emam, AA Abohany - Journal of Big Data, 2024 - Springer
As the number and cleverness of cyber-attacks keep increasing rapidly, it's more important
than ever to have good ways to detect and prevent them. Recognizing cyber threats quickly …

A novel anomaly network intrusion detection system for internet of things security

A Guezzaz, S Benkirane, M Azrour - IoT and smart devices for sustainable …, 2022 - Springer
The automatic detection of intrusions becomes an interesting issue due to the needs of
computer system security. A lot of malicious attacks can infect wired and wireless networks …

Effective network intrusion detection using stacking-based ensemble approach

M Ali, M Haque, MH Durad, A Usman… - International Journal of …, 2023 - Springer
The increasing demand for communication between networked devices connected either
through an intranet or the internet increases the need for a reliable and accurate network …

Reproducible and adaptable log data generation for sound cybersecurity experiments

R Uetz, C Hemminghaus, L Hackländer… - Proceedings of the 37th …, 2021 - dl.acm.org
Artifacts such as log data and network traffic are fundamental for cybersecurity research, eg,
in the area of intrusion detection. Yet, most research is based on artifacts that are not …

Technological trends: a focus on citizen security

LAL Cardona - Ingeniería Solidaria, 2021 - revistas.ucc.edu.co
Introduction: This bibliographic review article is the product of research on new
technological trends, focusing on citizen security, carried out at the SIEL research hotbed of …

Detection and localization of cyber attacks on water treatment systems: an entropy-based approach

K Liu, M Wang, R Ma, Z Zhang, Q Wei - Frontiers of Information …, 2022 - Springer
With the advent of Industry 4.0, water treatment systems (WTSs) are recognized as typical
industrial cyber-physical systems (iCPSs) that are connected to the open Internet. Advanced …

Introducing a comprehensive, continuous, and collaborative survey of intrusion detection datasets

P Bönninghausen, R Uetz, M Henze - Proceedings of the 17th Cyber …, 2024 - dl.acm.org
Researchers in the highly active field of intrusion detection largely rely on public datasets for
their experimental evaluations. However, the large number of existing datasets, the …

A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm

A Hashmi, OM Barukab, A Hamza Osman - Plos one, 2024 - journals.plos.org
Due to the recent advances in the Internet and communication technologies, network
systems and data have evolved rapidly. The emergence of new attacks jeopardizes network …

PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphs

MR Al-Eiadeh, M Abdallah - International Journal of Information Security, 2025 - Springer
Interdependent systems confront rapidly growing cybersecurity threats. This paper delves
into the realm of security decision-making within these complex interdependent systems. We …

High-precision intrusion detection for cybersecurity communications based on multi-scale convolutional neural networks

H Yang, J Yu, R Zhai - The Journal of Supercomputing, 2025 - Springer
This study developed an advanced network intrusion detection system based on an
improved multi-scale convolutional neural network architecture aimed at enhancing the …