Anomaly-Based Intrusion Detection System for Cyber-Physical System Security Authors: Riccardo Colelli, Filippo Magri, Stefano Panzieri, Federica Pascucci | Published: 2021-10-25 ML-Based IDSSimulation EnvironmentIntrusion Detection System 2021.10.25 2025.05.28 Literature Database
Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17 Dataset evaluationIntrusion Detection SystemTaxonomy of Attacks 2020.12.17 2025.05.28 Literature Database
Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach Authors: Noah Oghenfego Ogwara, Krassie Petrova, Mee Loong, Yang, Stephen G. MacDonell | Published: 2020-12-15 Cloud ComputingIntrusion Detection SystemRole of Machine Learning 2020.12.15 2025.05.28 Literature Database
EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection Authors: Fares Meghdouri, Maximilian Bachl, Tanja Zseby | Published: 2020-07-27 | Updated: 2020-10-15 Intrusion Detection SystemPerformance EvaluationComputational Efficiency 2020.07.27 2025.05.28 Literature Database
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks Authors: Keval Doshi, Yasin Yilmaz, Suleyman Uludag | Published: 2020-06-15 DDoS AttackIoT SecurityIntrusion Detection System 2020.06.15 2025.05.28 Literature Database
Road Context-aware Intrusion Detection System for Autonomous Cars Authors: Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang | Published: 2019-08-02 Intrusion Detection SystemInformation SecurityDeep Learning Method 2019.08.02 2025.05.28 Literature Database
Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection Authors: Simon D. Duque Anton, Mathias Strufe, Hans Dieter Schotten | Published: 2019-05-15 | Updated: 2019-05-16 Challenges in IT SecurityCybersecurityIntrusion Detection System 2019.05.15 2025.05.28 Literature Database
End-to-End Adversarial Learning for Intrusion Detection in Computer Networks Authors: Bahram Mohammadi, Mohammad Sabokrou | Published: 2019-04-25 Intrusion Detection SystemDeep Learning TechnologyEvaluation Method 2019.04.25 2025.05.28 Literature Database
Intrusion Detection Mechanism Using Fuzzy Rule Interpolation Authors: Mohammad Almseidin, Szilveszter Kovacs | Published: 2019-04-18 DDoS AttackFuzzy SystemIntrusion Detection System 2019.04.18 2025.05.28 Literature Database
Active Learning for Wireless IoT Intrusion Detection Authors: Kai Yang, Jie Ren, Yanqiao Zhu, Weiyi Zhang | Published: 2018-08-04 Query Generation MethodIntrusion Detection SystemImprovement of Learning 2018.08.04 2025.05.28 Literature Database