Intrusion Detection System

Anomaly-Based Intrusion Detection System for Cyber-Physical System Security

Authors: Riccardo Colelli, Filippo Magri, Stefano Panzieri, Federica Pascucci | Published: 2021-10-25
ML-Based IDS
Simulation Environment
Intrusion Detection System

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17
Dataset evaluation
Intrusion Detection System
Taxonomy of Attacks

Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach

Authors: Noah Oghenfego Ogwara, Krassie Petrova, Mee Loong, Yang, Stephen G. MacDonell | Published: 2020-12-15
Cloud Computing
Intrusion Detection System
Role of Machine Learning

EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection

Authors: Fares Meghdouri, Maximilian Bachl, Tanja Zseby | Published: 2020-07-27 | Updated: 2020-10-15
Intrusion Detection System
Performance Evaluation
Computational Efficiency

Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks

Authors: Keval Doshi, Yasin Yilmaz, Suleyman Uludag | Published: 2020-06-15
DDoS Attack
IoT Security
Intrusion Detection System

Road Context-aware Intrusion Detection System for Autonomous Cars

Authors: Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang | Published: 2019-08-02
Intrusion Detection System
Information Security
Deep Learning Method

Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection

Authors: Simon D. Duque Anton, Mathias Strufe, Hans Dieter Schotten | Published: 2019-05-15 | Updated: 2019-05-16
Challenges in IT Security
Cybersecurity
Intrusion Detection System

End-to-End Adversarial Learning for Intrusion Detection in Computer Networks

Authors: Bahram Mohammadi, Mohammad Sabokrou | Published: 2019-04-25
Intrusion Detection System
Deep Learning Technology
Evaluation Method

Intrusion Detection Mechanism Using Fuzzy Rule Interpolation

Authors: Mohammad Almseidin, Szilveszter Kovacs | Published: 2019-04-18
DDoS Attack
Fuzzy System
Intrusion Detection System

Active Learning for Wireless IoT Intrusion Detection

Authors: Kai Yang, Jie Ren, Yanqiao Zhu, Weiyi Zhang | Published: 2018-08-04
Query Generation Method
Intrusion Detection System
Improvement of Learning