Host-based IDS: A review and open issues of an anomaly detection system in IoT

I Martins, JS Resende, PR Sousa, S Silva… - Future Generation …, 2022 - Elsevier
Abstract The Internet of Things (IoT) envisions a smart environment powered by connectivity
and heterogeneity where ensuring reliable services and communications across multiple …

Zero-day attack detection: a systematic literature review

R Ahmad, I Alsmadi, W Alhamdani… - Artificial Intelligence …, 2023 - Springer
With the continuous increase in cyberattacks over the past few decades, the quest to
develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …

The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges

M Waqas, S Tu, Z Halim, SU Rehman, G Abbas… - Artificial Intelligence …, 2022 - Springer
Security is one of the biggest challenges concerning networks and communications. The
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …

[HTML][HTML] Network traffic classification for data fusion: A survey

J Zhao, X Jing, Z Yan, W Pedrycz - Information Fusion, 2021 - Elsevier
Traffic classification groups similar or related traffic data, which is one main stream
technique of data fusion in the field of network management and security. With the rapid …

Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey

V Sharma, I You, K Andersson, F Palmieri… - IEEE …, 2020 - ieeexplore.ieee.org
With an enormous range of applications, the Internet of Things (IoT) has magnetized
industries and academicians from everywhere. IoT facilitates operations through ubiquitous …

Detection of zero-day attacks: An unsupervised port-based approach

A Blaise, M Bouet, V Conan, S Secci - Computer Networks, 2020 - Elsevier
Last years have witnessed more and more DDoS attacks towards high-profile websites, as
the Mirai botnet attack on September 2016, or more recently the memcached attack on …

Zero-day threats detection for critical infrastructures

M Nkongolo, M Tokmak - Annual Conference of South African Institute of …, 2023 - Springer
Technological advancements in various industries, such as network intelligence, vehicle
networks, e-commerce, the Internet of Things (IoT), ubiquitous computing, and cloud-based …

Unknown attack detection based on zero-shot learning

Z Zhang, Q Liu, S Qiu, S Zhou, C Zhang - IEEE Access, 2020 - ieeexplore.ieee.org
In recent years, due to the frequent occurrence of network intrusions, more and more
researchers have begun to focus on network intrusion detection. However, it is still a …

Assessment of security KPIs for 5G network slices for special groups of subscribers

R Odarchenko, M Iavich, G Iashvili, S Fedushko… - Big Data and Cognitive …, 2023 - mdpi.com
It is clear that 5G networks have already become integral to our present. However, a
significant issue lies in the fact that current 5G communication systems are incapable of fully …

Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance

S Gong, C Lee - Electronics, 2020 - mdpi.com
The convergence of fifth-generation (5G) communication and the Internet-of-Things (IoT) has
dramatically increased the diversity and complexity of the network. This change diversifies …