Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review

SW Lee, M Mohammadi, S Rashidi… - Journal of Network and …, 2021 - Elsevier
Providing a high-performance Intrusion Detection System (IDS) can be very effective in
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …

Anomaly detection speed-up by quantum restricted Boltzmann machines

L Moro, E Prati - Communications Physics, 2023 - nature.com
Quantum machine learning promises to revolutionize traditional machine learning by
efficiently addressing hard tasks for classical computation. While claims of quantum speed …

A novel SETA-based gamification framework to raise cybersecurity awareness

F Abu-Amara, R Almansoori, S Alharbi… - International Journal of …, 2021 - Springer
Abstract Information is a critical asset in any organization to achieve its strategic goals. For
this, organizations enforce physical, logical, and administrative controls to protect their …

[HTML][HTML] Deep Learning-driven Methods for Network-based Intrusion Detection Systems: A Systematic Review

R Chinnasamy, M Subramanian, SV Easwaramoorthy… - ICT Express, 2025 - Elsevier
This paper presents a systematic review of deep learning (DL) techniques for Network-
based Intrusion Detection Systems (NIDS) based on Preferred Reporting Items for …

[Retracted] Software Systems Security Vulnerabilities Management by Exploring the Capabilities of Language Models Using NLP

RR Althar, D Samanta, M Kaur… - Computational …, 2021 - Wiley Online Library
Security of the software system is a prime focus area for software development teams. This
paper explores some data science methods to build a knowledge management system that …

Using kernel shap xai method to optimize the network anomaly detection model

K Roshan, A Zafar - 2022 9th International Conference on …, 2022 - ieeexplore.ieee.org
Anomaly detection and its explanation is important in many research areas such as intrusion
detection, fraud detection, unknown attack detection in network traffic and logs. It is …

Unsupervised Machine Learning for Cybersecurity Anomaly Detection in Traditional and Software-Defined Networking Environments

C Rookard, A Khojandi - IEEE Transactions on Network and …, 2024 - ieeexplore.ieee.org
Cybersecurity has become a field of increasing importance within the past years, with the
National Academy of Engineering most recently designating securing cyberspace as one of …

Privacy-Preserving Deep Learning Framework Based on Restricted Boltzmann Machines and Instance Reduction Algorithms

A Alshammari, K El Hindi - Applied Sciences, 2024 - mdpi.com
The combination of collaborative deep learning and Cyber-Physical Systems (CPSs) has the
potential to improve decision-making, adaptability, and efficiency in dynamic and distributed …

Unified model for collective and point anomaly detection using stacked temporal convolution networks

Z Li, Z Xiang, W Gong, H Wang - Applied Intelligence, 2022 - Springer
Time-series anomaly detection utilizing deep learning methods is widely used in fraud
detection, network intrusion detection, and medical anomaly detection. Most deep learning …

Acoustic scene classification using fusion of features and random forest classifier

S Sachdeva, M Mulimani - 2022 9th International Conference …, 2022 - ieeexplore.ieee.org
This paper proposes a model for the task of Acoustic Scene Classification. The proposed
model utilizes convolutional neural networks and a random forest classifier to predict the …