Metaheuristic feature selection with deep learning enabled cascaded recurrent neural network for anomaly detection in Industrial Internet of Things environment

N Chander, M Upendra Kumar - Cluster Computing, 2023 - Springer
Abstract Industrial Internet of Things (IIoT) acts as essential part of the revolutionary
transition of conventional industries towards Industry 4.0. By the integration of instruments …

Improving collaborative intrusion detection system using blockchain and pluggable authentication modules for sustainable Smart City

RK Gupta, V Chawla, RK Pateriya, PK Shukla… - Sustainability, 2023 - mdpi.com
The threat of cyber-attacks is ever increasing in today's society. There is a clear need for
better and more effective defensive tools. Intrusion detection can be defined as the detection …

Golden Jackal Optimization with a Deep Learning-Based Cybersecurity Solution in Industrial Internet of Things Systems

LA Maghrabi, IR Alzahrani, D Alsalman, ZM AlKubaisy… - Electronics, 2023 - mdpi.com
Recently, artificial intelligence (AI) has gained an abundance of attention in cybersecurity for
Industry 4.0 and has shown immense benefits in a large number of applications. AI …

Enhanced pelican optimization algorithm with ensemble-based anomaly detection in industrial internet of things environment

N Chander, M Upendra Kumar - Cluster Computing, 2024 - Springer
Anomaly detection (AD) in the industrial internet of things (IIoT) platform is said to be the
major module of security the consistency, safety, and efficacy of industrial procedures. In …

Information-extreme machine learning of a cyber attack detection system

A Dovbysh, V Liubchak, I Shelehov, J Simonovskiy… - 2022 - dspace.library.khai.edu
This study increases the functional efficiency of machine learning of a cyber attack detection
system. An information-extreme machine learning method for a cyber attack detection …

Constraining adversarial attacks on network intrusion detection systems: transferability and defense analysis

N Alhussien, A Aleroud, A Melhem… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Adversarial attacks have been extensively studied in the domain of deep image
classification, but their impacts on other domains such as Machine and Deep Learning …

Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems

JG Medina-Arco, R Magán-Carrión… - Sensors, 2024 - mdpi.com
With the significant increase in cyber-attacks and attempts to gain unauthorised access to
systems and information, Network Intrusion-Detection Systems (NIDSs) have become …

Enhancing the Efficiency of a Cybersecurity Operations Center Using Biomimetic Algorithms Empowered by Deep Q-Learning

R Olivares, O Salinas, C Ravelo, R Soto, B Crawford - Biomimetics, 2024 - mdpi.com
In the complex and dynamic landscape of cyber threats, organizations require sophisticated
strategies for managing Cybersecurity Operations Centers and deploying Security …

[PDF][PDF] Feature Selection with Deep Reinforcement Learning for Intrusion Detection System.

S Priya, KPM Kumar - Comput. Syst. Sci. Eng., 2023 - cdn.techscience.cn
An intrusion detection system (IDS) becomes an important tool for ensuring security in the
network. In recent times, machine learning (ML) and deep learning (DL) models can be …

Self-healing hybrid intrusion detection system: an ensemble machine learning approach

S Kushal, B Shanmugam, J Sundaram… - Discover Artificial …, 2024 - Springer
The increasing complexity and adversity of cyber-attacks have prompted discussions in the
cyber scenario for a prognosticate approach, rather than a reactionary one. In this paper, a …