[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

A survey on data-driven network intrusion detection

D Chou, M Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …

Cyber threats to industrial IoT: a survey on attacks and countermeasures

K Tsiknas, D Taketzis, K Demertzis, C Skianis - IoT, 2021 - mdpi.com
In today's Industrial Internet of Things (IIoT) environment, where different systems interact
with the physical world, the state proposed by the Industry 4.0 standards can lead to …

Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey

PLS Jayalaxmi, R Saha, G Kumar, M Conti… - IEEE Access, 2022 - ieeexplore.ieee.org
The increasing number of connected devices in the era of Internet of Thing (IoT) has also
increased the number intrusions. Intrusion Detection System (IDS) is a secondary intelligent …

IMIDS: An intelligent intrusion detection system against cyber threats in IoT

KH Le, MH Nguyen, TD Tran, ND Tran - Electronics, 2022 - mdpi.com
The increasing popularity of the Internet of Things (IoT) has significantly impacted our daily
lives in the past few years. On one hand, it brings convenience, simplicity, and efficiency for …

Machine learning in identity and access management systems: Survey and deep dive

S Aboukadri, A Ouaddah, A Mezrioui - Computers & Security, 2024 - Elsevier
The evolution of identity and access management (IAM) has been driven by the expansion
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …

[HTML][HTML] Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine

H Lin, Q Xue, J Feng, D Bai - Digital Communications and Networks, 2023 - Elsevier
With the rapid development of the Internet of Things (IoT), there are several challenges
pertaining to security in IoT applications. Compared with the characteristics of the traditional …

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

S Hajj, R El Sibai, J Bou Abdo… - Transactions on …, 2021 - Wiley Online Library
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …

Machine learning-based anomaly detection in NFV: A comprehensive survey

S Zehra, U Faseeha, HJ Syed, F Samad, AO Ibrahim… - Sensors, 2023 - mdpi.com
Network function virtualization (NFV) is a rapidly growing technology that enables the
virtualization of traditional network hardware components, offering benefits such as cost …

Ais-nids: An intelligent and self-sustaining network intrusion detection system

YA Farrukh, S Wali, I Khan, ND Bastian - Computers & Security, 2024 - Elsevier
The ever-evolving landscape of network security is continually molded by the dynamic
evolution of attack vectors and the relentless emergence of new, highly sophisticated …