[HTML][HTML] Anomaly classification in industrial Internet of things: A review

M Rodríguez, DP Tobón, D Múnera - Intelligent Systems with Applications, 2023 - Elsevier
The fourth industrial revolution (Industry 4.0) has the potential to provide real-time, secure,
and autonomous manufacturing environments. The Industrial Internet of Things (IIoT) is a …

A two-tier hybrid ensemble learning pipeline for intrusion detection systems in IoT networks

D Srivastav, P Srivastava - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
With an increasing number of network devices, the need for a robust intrusion detection
system is also increasing for ensuring ubiquitous and secure Internet of Things (IoT) network …

A snapshot ensemble deep neural network model for attack detection in industrial internet of things

HM Rouzbahani, AH Bahrami, H Karimipour - AI-Enabled Threat Detection …, 2021 - Springer
In the past few years, the Industrial Internet of Things (IIoT) started to emerge in different
industry sectors. IIoT connects different physical equipment and systems in order to operate …

[HTML][HTML] A hybrid intrusion detection model combining SAE with kernel approximation in internet of things

Y Wu, WW Lee, X Gong, H Wang - Sensors, 2020 - mdpi.com
Owing to the constraints of time and space complexity, network intrusion detection systems
(NIDSs) based on support vector machines (SVMs) face the “curse of dimensionality” in a …

MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization

JH Jafarian, A Niakanlahiji - Computers & Security, 2023 - Elsevier
Advanced and persistent multi-staged intrusion attacks are usually conducted by elite well-
resourced cyber threat actors with the goal of bypassing the defense-in-depth and zoning …

[PDF][PDF] An Approach to Improving Intrusion Detection System Performance Against Low Frequent Attacks

YA Mohamed, DA Salih, A Khanan - Journal of Advances in Information …, 2023 - jait.us
Network security is crucial in contemporary company. Hackers and invaders have regularly
disrupted huge company networks and online services. Intrusion Detection Systems (IDS) …

IoT botnet detection with feature reconstruction and interval optimization

H Yang, Z Wang, L Zhang… - International Journal of …, 2022 - Wiley Online Library
The existing botnet detection methods have the problems of uneven sampling, poor feature
selection, and weak generalization ability, resulting in low detection and classification …

工业物联网异常检测技术综述

孙海丽, 龙翔, 韩兰胜, 黄炎, 李清波 - 通信学报, 2022 - infocomm-journal.com
针对不同的异常检测方法的差异及应用于工业物联网(IIoT) 安全防护的适用性问题,
从技术原理出发, 调研分析2000—2021 年发表的关于网络异常检测的论文 …

[PDF][PDF] A Lightweight Deep Autoencoder Scheme for Cyberattack Detection in the Internet of Things.

M Sabir, J Ahmad, DM Alghazzawi - Comput. Syst. Sci. Eng., 2023 - cdn.techscience.cn
The Internet of things (IoT) is an emerging paradigm that integrates devices and services to
collect real-time data from surroundings and process the information at a very high speed to …

MS-ZeroWall: Detecting Zero-Day Multi-Step Attack in Smart Home using VAE and HMM

T Li, Z Hong, W Feng, L Yu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The development of technologies in the smart home provides convenience to our living life,
however, the resourceconstrained characteristics lead to its frequent exposure to various …