NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 19,374
1.
  • Intrusion Detection System ... Intrusion Detection System Techniques : A Review
    Sulaiman, Noor Suhana; Nasir, Akhyari; Othman, Wan Roslina Wan ... Journal of physics. Conference series, 05/2021, Volume: 1874, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Abstract Nowadays, Internet attacks are increasing rapidly. As a result, information security is a serious global concern among Information Technology users. Intrusion Detection System (IDS) is ...
Full text

PDF
2.
  • TON_IoT Telemetry Dataset: ... TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems
    Alsaedi, Abdullah; Moustafa, Nour; Tari, Zahir ... IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    Although the Internet of Things (IoT) can increase efficiency and productivity through intelligent and remote management, it also increases the risk of cyber-attacks. The potential threats to IoT ...
Full text

PDF
3.
  • A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems
    Benkhelifa, Elhadj; Welsh, Thomas; Hamouda, Walaa IEEE Communications surveys and tutorials, 01/2018, Volume: 20, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous nature of devices and protocols in use, the sensitivity of the data contained within, as well as the legal and ...
Full text

PDF
4.
  • Adversarial machine learnin... Adversarial machine learning in Network Intrusion Detection Systems
    Alhajjar, Elie; Maxwell, Paul; Bastian, Nathaniel Expert systems with applications, 12/2021, Volume: 186
    Journal Article
    Peer reviewed
    Open access

    Adversarial examples are inputs to a machine learning system intentionally crafted by an attacker to fool the model into producing an incorrect output. These examples have achieved a great deal of ...
Full text

PDF
5.
  • Host-based IDS: A review an... Host-based IDS: A review and open issues of an anomaly detection system in IoT
    Martins, Inês; Resende, João S.; Sousa, Patrícia R. ... Future generation computer systems, August 2022, 2022-08-00, Volume: 133
    Journal Article
    Peer reviewed

    The Internet of Things (IoT) envisions a smart environment powered by connectivity and heterogeneity where ensuring reliable services and communications across multiple industries, from financial ...
Full text
6.
  • A survey of network-based i... A survey of network-based intrusion detection data sets
    Ring, Markus; Wunderlich, Sarah; Scheuring, Deniz ... Computers & security, September 2019, 2019-09-00, 20190901, Volume: 86
    Journal Article
    Peer reviewed
    Open access

    Labeled data sets are necessary to train and evaluate anomaly-based network intrusion detection systems. This work provides a focused literature survey of data sets for network-based intrusion ...
Full text

PDF
7.
  • Deep learning approaches fo... Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
    Aldweesh, Arwa; Derhab, Abdelouahid; Emam, Ahmed Z. Knowledge-based systems, 02/2020, Volume: 189
    Journal Article
    Peer reviewed

    The massive growth of data that are transmitted through a variety of devices and communication protocols have raised serious security concerns, which have increased the importance of developing ...
Full text
8.
  • Retracted: An empirical int... Retracted: An empirical intrusion detection system based on XGBoost and bidirectional long‐short term model for 5G and other telecommunication technologies
    Karthikraja, Chinnathangam; Senthilkumar, Jayaprakasam; Hariharan, Rajadurai ... Computational intelligence, 08/2022, Volume: 38, Issue: 4
    Journal Article
    Peer reviewed

    Abstract Recently, intrusion detection system (IDS) has become an essential remedy to protect networks from malicious activities and attacks. The attacks force the network activities under risk and ...
Full text
9.
  • RNNIDS: Enhancing network i... RNNIDS: Enhancing network intrusion detection systems through deep learning
    Sohi, Soroush M.; Seifert, Jean-Pierre; Ganji, Fatemeh Computers & security, March 2021, 2021-03-00, 20210301, Volume: 102
    Journal Article
    Peer reviewed
    Open access

    Security of information passing through the Internet is threatened by today’s most advanced malware ranging from orchestrated botnets to simpler polymorphic worms. These threats, as examples of ...
Full text

PDF
10.
Full text
1 2 3 4 5
hits: 19,374

Load filters