A Thakkar, R Lohiya - Artificial Intelligence Review, 2022 - Springer
With the increase in the usage of the Internet, a large amount of information is exchanged between different communicating devices. The data should be communicated securely …
Y Imrana, Y Xiang, L Ali, Z Abdul-Rauf - Expert Systems with Applications, 2021 - Elsevier
The rise in computer networks and internet attacks has become alarming for most service providers. It has triggered the need for the development and implementation of intrusion …
In this paper, we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used, and a comparative study. Specifically, we provide a review of …
Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML. However, deployment …
The use of deep learning models for the network intrusion detection task has been an active area of research in cybersecurity. Although several excellent surveys cover the growing …
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyberattacks at the network-level and the host …
In the past several years, the world has witnessed an acute surge in the production and usage of smart devices which are referred to as the Internet of Things (IoT). These devices …
Anomaly detection is an important problem that has been well-studied within diverse research areas and application domains. The aim of this survey is two-fold, firstly we present …
A Aldweesh, A Derhab, AZ Emam - Knowledge-Based Systems, 2020 - Elsevier
The massive growth of data that are transmitted through a variety of devices and communication protocols have raised serious security concerns, which have increased the …