[HTML][HTML] Evolving cybersecurity frontiers: A comprehensive survey on concept drift and feature dynamics aware machine and deep learning in intrusion detection …

MA Shyaa, NF Ibrahim, Z Zainol, R Abdullah… - … Applications of Artificial …, 2024 - Elsevier
Abstract Intrusion Detection Systems (IDS) have become pivotal in safeguarding information
systems against evolving threats. Concurrently, Concept Drift presents a significant …

Investigation on datasets toward intelligent intrusion detection systems for Intra and inter-UAVs communication systems

AB Mohammed, LC Fourati - Computers & Security, 2024 - Elsevier
UAVs, commonly known as drones, are increasingly utilized in various fields such as military
operations, surveillance, agriculture, and delivery services. Given their expanding roles …

A Network Intrusion Detection Model Based on BiLSTM with Multi-Head Attention Mechanism

J Zhang, X Zhang, Z Liu, F Fu, Y Jiao, F Xu - Electronics, 2023 - mdpi.com
A network intrusion detection tool can identify and detect potential malicious activities or
attacks by monitoring network traffic and system logs. The data within intrusion detection …

A Hybrid Modified Deep Learning Architecture for Intrusion Detection System with Optimal Feature Selection

N Kumar, S Sharma - Electronics, 2023 - mdpi.com
With the exponentially evolving trends in technology, IoT networks are vulnerable to serious
security issues, allowing intruders to break into networks without authorization and …

[HTML][HTML] Network-Based Intrusion Detection for Industrial and Robotics Systems: A Comprehensive Survey

R Holdbrook, O Odeyomi, S Yi, K Roy - Electronics, 2024 - mdpi.com
In the face of rapidly evolving cyber threats, network-based intrusion detection systems
(NIDS) have become critical to the security of industrial and robotic systems. This survey …

Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication Network Security

IS NA, A Haldorai, N Naik - IEEE Access, 2024 - ieeexplore.ieee.org
In order to stay current with technology, in-vehicle communication has been enhanced daily.
Control area network (CAN) is widely adopted due to the exceptional efficiency and …

Advancing healthcare 5.0 through federated learning: Opportunity for security enforcement using blockchain

UO Mathew, DZ Rodriguez, RL Rosa… - 2024 International …, 2024 - ieeexplore.ieee.org
As Healthcare 5.0 becomes more widely accepted, the healthcare industry in general is
changing, leading to better patient care and more system efficiency. The degree of digital …

A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks

M Thankappan, H Rifà-Pous, C Garrigues - International Journal of …, 2024 - Springer
Abstract A Multi-Channel Man-in-the-Middle (MC-MitM) attack is an advanced form of MitM
attack, characterized by its ability to manipulate encrypted wireless communications …

Deep Learning Algorithms Used in Intrusion Detection Systems--A Review

R Kimanzi, P Kimanga, D Cherori… - arXiv preprint arXiv …, 2024 - arxiv.org
The increase in network attacks has necessitated the development of robust and efficient
intrusion detection systems (IDS) capable of identifying malicious activities in real-time. In …

Optimizing Intrusion Detection Systems in Three Phases on the CSE-CIC-IDS-2018 Dataset

S Songma, T Sathuphan, T Pamutha - Computers, 2023 - mdpi.com
This article examines intrusion detection systems in depth using the CSE-CIC-IDS-2018
dataset. The investigation is divided into three stages: to begin, data cleaning, exploratory …