[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

The role of machine learning in network anomaly detection for cybersecurity

A Yaseen - Sage Science Review of Applied Machine …, 2023 - journals.sagescience.org
This research introduces a theoretical framework for network anomaly detection in
cybersecurity, emphasizing the integration of adaptive machine learning models, ensemble …

Cgan-based collaborative intrusion detection for uav networks: A blockchain-empowered distributed federated learning approach

X He, Q Chen, L Tang, W Wang… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Numerous resource-constrained Internet of Things (IoT) devices make the edge IoT
consisting of unmanned aerial vehicles (UAVs) vulnerable to network intrusion. Therefore, it …

MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection

J Lan, X Liu, B Li, J Sun, B Li, J Zhao - Computers & Security, 2022 - Elsevier
With the continuous occurrence of cybersecurity incidents, network intrusion detection has
become one of the most critical issues in cyber ecosystems. Although previous machine …

[PDF][PDF] Performance analysis of intrusion detection for deep learning model based on CSE-CIC-IDS2018 dataset

BI Farhan, AD Jasim - Indonesian Journal of Electrical Engineering …, 2022 - academia.edu
The evolution of the internet of things as a promising and modern technology has facilitated
daily life. Its emergence was accompanied by challenges represented by its frequent …

Contrastive learning enhanced intrusion detection

Y Yue, X Chen, Z Han, X Zeng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the continuous development of network technology, the diversity of network traffic
constantly increased (intra-class diversity). Nevertheless, the boundary between malicious …

Machine learning for detecting the WestRock ransomware attack using BGP routing records

Z Li, ALG Rios, L Trajković - IEEE Communications Magazine, 2022 - ieeexplore.ieee.org
Border Gateway Protocol (BGP) enables Internet data routing. Hence, its anomalies affect
Internet connectivity and cause routing discon-nections, route flaps, and oscillations …

A novel hierarchical attention-based triplet network with unsupervised domain adaptation for network intrusion detection

J Lan, X Liu, B Li, J Zhao - Applied Intelligence, 2023 - Springer
Abstract Network Intrusion Detection Systems (NIDSs) are crucial for resisting cyber threats.
However, NIDSs equipped with supervised learning models do not generalize well to …

Federated multi-discriminator BiWGAN-GP based collaborative anomaly detection for virtualized network slicing

W Wang, C Liang, L Tang… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Virtualized network slicing allows a multitude of logical networks to be created on a common
substrate infrastructure to support diverse services. A virtualized network slice is a logical …

Using machine learning models to detect different intrusion on NSL-KDD

H Ao - 2021 IEEE International Conference on Computer …, 2021 - ieeexplore.ieee.org
While the network brings great social and economic benefits to mankind, the security
situation of the network is becoming increasingly severe, and various forms of network …