Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study
Authors
Keywords
-
Journal
APPLIED ARTIFICIAL INTELLIGENCE
Volume -, Issue -, Pages 1-24
Publisher
Informa UK Limited
Online
2022-03-25
DOI
10.1080/08839514.2022.2055399
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Poisoning and Evasion Attacks Against Deep Learning Algorithms in Autonomous Vehicles
- (2020) Wenbo Jiang et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Secure Estimation Under Causative Attacks
- (2020) Saurabh Sihag et al. IEEE TRANSACTIONS ON INFORMATION THEORY
- A network intrusion detection method based on semantic Re-encoding and deep learning
- (2020) Zhendong Wu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Application of Deep Learning to Cybersecurity: A Survey
- (2019) Samaneh Mahdavifar et al. NEUROCOMPUTING
- Internet of Things: A survey on machine learning-based intrusion detection approaches
- (2019) Kelton A.P. da Costa et al. Computer Networks
- Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset
- (2019) Nickolaos Koroniotis et al. Future Generation Computer Systems-The International Journal of eScience
- A survey of network-based intrusion detection data sets
- (2019) Markus Ring et al. COMPUTERS & SECURITY
- Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
- (2019) Mohamed Amine Ferrag et al. Journal of Information Security and Applications
- Reinforcement learning-based real-time power management for hybrid energy storage system in the plug-in hybrid electric vehicle
- (2018) Rui Xiong et al. APPLIED ENERGY
- Distributed attack detection scheme using deep learning approach for Internet of Things
- (2018) Abebe Abeshu Diro et al. Future Generation Computer Systems-The International Journal of eScience
- Machine Learning and Deep Learning Methods for Cybersecurity
- (2018) Yang Xin et al. IEEE Access
- A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles
- (2018) George Loukas et al. Ad Hoc Networks
- A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
- (2017) Chuanlong Yin et al. IEEE Access
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- Ensemble based collaborative and distributed intrusion detection systems: A survey
- (2016) Gianluigi Folino et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Evaluating Computer Intrusion Detection Systems
- (2015) Aleksandar Milenkoski et al. ACM COMPUTING SURVEYS
- An intrusion detection system using network traffic profiling and online sequential extreme learning machine
- (2015) Raman Singh et al. EXPERT SYSTEMS WITH APPLICATIONS
- Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems
- (2015) Shengyi Pan et al. IEEE Transactions on Smart Grid
- A novel hybrid KPCA and SVM with GA model for intrusion detection
- (2014) Fangjun Kuang et al. APPLIED SOFT COMPUTING
- An empirical comparison of botnet detection methods
- (2014) S. García et al. COMPUTERS & SECURITY
- Fusion of Smartphone Motion Sensors for Physical Activity Recognition
- (2014) Muhammad Shoaib et al. SENSORS
- A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
- (2013) Gideon Creech et al. IEEE TRANSACTIONS ON COMPUTERS
- RePIDS: A multi tier Real-time Payload-based Intrusion Detection System
- (2012) Aruna Jamdagni et al. Computer Networks
- Toward developing a systematic approach to generate benchmark datasets for intrusion detection
- (2012) Ali Shiravi et al. COMPUTERS & SECURITY
- A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
- (2012) Levent Koc et al. EXPERT SYSTEMS WITH APPLICATIONS
- Mutual information-based feature selection for intrusion detection systems
- (2011) Fatemeh Amiri et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started