Search dblp for Publications

export results for "network-based intrusion"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/access/AlQuayedAH24,
  author       = {Fatima Al{-}Quayed and
                  Zulfiqar Ahmad and
                  Mamoona Humayun},
  title        = {A Situation Based Predictive Approach for Cybersecurity Intrusion
                  Detection and Prevention Using Machine Learning and Deep Learning
                  Algorithms in Wireless Sensor Networks of Industry 4.0},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {34800--34819},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3372187},
  doi          = {10.1109/ACCESS.2024.3372187},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlQuayedAH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlshehriSAAA24,
  author       = {Mohammed S. Alshehri and
                  Oumaima Saidani and
                  Fatma S. Alrayes and
                  Saadullah Farooq Abbasi and
                  Jawad Ahmad},
  title        = {A Self-Attention-Based Deep Convolutional Neural Networks for IIoT
                  Networks Intrusion Detection},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {45762--45772},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3380816},
  doi          = {10.1109/ACCESS.2024.3380816},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlshehriSAAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CengizLDIK24,
  author       = {Korhan Cengiz and
                  Swati Lipsa and
                  Ranjan Kumar Dash and
                  Nikola Ivkovic and
                  Mario Konecki},
  title        = {A Novel Intrusion Detection System Based on Artificial Neural Network
                  and Genetic Algorithm With a New Dimensionality Reduction Technique
                  for {UAV} Communication},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {4925--4937},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3349469},
  doi          = {10.1109/ACCESS.2024.3349469},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/CengizLDIK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DaiLJH24,
  author       = {Wei Dai and
                  Xinhui Li and
                  Wenxin Ji and
                  Sicheng He},
  title        = {Network Intrusion Detection Method Based on CNN-BiLSTM-Attention Model},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {53099--53111},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3384528},
  doi          = {10.1109/ACCESS.2024.3384528},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DaiLJH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HeZZL24,
  author       = {Kan He and
                  Wei Zhang and
                  Xuejun Zong and
                  Lian Lian},
  title        = {Network Intrusion Detection Based on Feature Image and Deformable
                  Vision Transformer Classification},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {44335--44350},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3376434},
  doi          = {10.1109/ACCESS.2024.3376434},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HeZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuMLL24,
  author       = {Xuntao Hu and
                  Xiancai Meng and
                  Shaoqing Liu and
                  Lizhen Liang},
  title        = {An Improved Algorithm for Network Intrusion Detection Based on Deep
                  Residual Networks},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {66432--66441},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3398007},
  doi          = {10.1109/ACCESS.2024.3398007},
  timestamp    = {Sun, 19 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuMLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JiangFW24,
  author       = {Tingyao Jiang and
                  Xiaobo Fu and
                  Min Wang},
  title        = {{BBO-CFAT:} Network Intrusion Detection Model Based on {BBO} Algorithm
                  and Hierarchical Transformer},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {54191--54201},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3386405},
  doi          = {10.1109/ACCESS.2024.3386405},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JiangFW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RahmanKABIC24,
  author       = {Khaista Rahman and
                  Muhammad Asghar Khan and
                  Fatemeh Afghah and
                  Gordana Barb and
                  Nisreen Innab and
                  Tanveer Ahmed Cheema},
  title        = {An Efficient Authentication and Access Control Protocol for Securing
                  {UAV} Networks Against Anomaly-Based Intrusion},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {62750--62764},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3395494},
  doi          = {10.1109/ACCESS.2024.3395494},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RahmanKABIC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SadiaFHSMBK24,
  author       = {Halima Sadia and
                  Saima Farhan and
                  Yasin Ul Haq and
                  Rabia Sana and
                  Tariq Mahmood and
                  Saeed Ali Omer Bahaj and
                  Amjad Rehman Khan},
  title        = {Intrusion Detection System for Wireless Sensor Networks: {A} Machine
                  Learning Based Approach},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {52565--52582},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3380014},
  doi          = {10.1109/ACCESS.2024.3380014},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SadiaFHSMBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ThankappanRG24,
  author       = {Manesh Thankappan and
                  Helena Rif{\`{a}}{-}Pous and
                  Carles Garrigues},
  title        = {A Signature-Based Wireless Intrusion Detection System Framework for
                  Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {23096--23121},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3362803},
  doi          = {10.1109/ACCESS.2024.3362803},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ThankappanRG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TripathiSSV24,
  author       = {Gaurav Tripathi and
                  Vishal Krishna Singh and
                  Varun Sharma and
                  Majithia Vivek Vinodbhai},
  title        = {Weighted Feature Selection for Machine Learning Based Accurate Intrusion
                  Detection in Communication Networks},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {20973--20982},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3362794},
  doi          = {10.1109/ACCESS.2024.3362794},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/TripathiSSV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/AliLY24,
  author       = {Saqib Ali and
                  Qianmu Li and
                  Abdullah Yousafzai},
  title        = {Blockchain and federated learning-based intrusion detection approaches
                  for edge-enabled industrial IoT networks: a survey},
  journal      = {Ad Hoc Networks},
  volume       = {152},
  pages        = {103320},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103320},
  doi          = {10.1016/J.ADHOC.2023.103320},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/AliLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/SarveshwaranPBGS24,
  author       = {Velliangiri Sarveshwaran and
                  Shanthini Pandiaraj and
                  Garikapati Bindu and
                  Vithya Ganesan and
                  Iwin Thanakumar Joseph Swamidason},
  title        = {Binarized Spiking Neural Network with blockchain based intrusion detection
                  framework for enhancing privacy and security in cloud computing environment},
  journal      = {Appl. Soft Comput.},
  volume       = {154},
  pages        = {111218},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.asoc.2023.111218},
  doi          = {10.1016/J.ASOC.2023.111218},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/SarveshwaranPBGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/ShenCLSWY24,
  author       = {Shigen Shen and
                  Chenpeng Cai and
                  Zhenwei Li and
                  Yizhou Shen and
                  Guowen Wu and
                  Shui Yu},
  title        = {Deep Q-network-based heuristic intrusion detection against edge-based
                  SIoT zero-day attacks},
  journal      = {Appl. Soft Comput.},
  volume       = {150},
  pages        = {111080},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.asoc.2023.111080},
  doi          = {10.1016/J.ASOC.2023.111080},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/ShenCLSWY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cas/VenkataswamyMK24,
  author       = {Srinivas Byatarayanapura Venkataswamy and
                  Indrajit Mandal and
                  Seetharam Keshavarao},
  title        = {Virtual Machine Migration-Based Intrusion Detection System in Cloud
                  Environment Using Deep Recurrent Neural Network},
  journal      = {Cybern. Syst.},
  volume       = {55},
  number       = {2},
  pages        = {450--470},
  year         = {2024},
  url          = {https://doi.org/10.1080/01969722.2022.2122008},
  doi          = {10.1080/01969722.2022.2122008},
  timestamp    = {Fri, 02 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cas/VenkataswamyMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ci/KumarK24,
  author       = {Neeraj Kumar and
                  Upendra Kumar},
  title        = {Artificial intelligence for classification and regression tree based
                  feature selection method for network intrusion detection system in
                  various telecommunication technologies},
  journal      = {Comput. Intell.},
  volume       = {40},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1111/coin.12500},
  doi          = {10.1111/COIN.12500},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ci/KumarK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MohammedFF24,
  author       = {Ahmed Burhan Mohammed and
                  Lamia Chaari Fourati and
                  Ahmed Fakhrudeen},
  title        = {Comprehensive systematic review of intelligent approaches in UAV-based
                  intrusion detection, blockchain, and network security},
  journal      = {Comput. Networks},
  volume       = {239},
  pages        = {110140},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2023.110140},
  doi          = {10.1016/J.COMNET.2023.110140},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/MohammedFF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/IoannouNABKMV24,
  author       = {Iacovos Ioannou and
                  Prabagarane Nagaradjane and
                  Pelin Angin and
                  Palaniappan Balasubramanian and
                  Karthick Jeyagopal Kavitha and
                  Palani Murugan and
                  Vasos Vassiliou},
  title        = {{GEMLIDS-MIOT:} {A} Green Effective Machine Learning Intrusion Detection
                  System based on Federated Learning for Medical IoT network security
                  hardening},
  journal      = {Comput. Commun.},
  volume       = {218},
  pages        = {209--239},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.02.023},
  doi          = {10.1016/J.COMCOM.2024.02.023},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/IoannouNABKMV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/RoshanZH24,
  author       = {Khushnaseeb Roshan and
                  Aasim Zafar and
                  Shiekh Burhan Ul Haque},
  title        = {Untargeted white-box adversarial attack with heuristic defence methods
                  in real-time deep learning based network intrusion detection system},
  journal      = {Comput. Commun.},
  volume       = {218},
  pages        = {97--113},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2023.09.030},
  doi          = {10.1016/J.COMCOM.2023.09.030},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/RoshanZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RekaKRS24,
  author       = {R. Reka and
                  R. Karthick and
                  R. Saravana Ram and
                  Gurkirpal Singh},
  title        = {Multi head self-attention gated graph convolutional network based
                  multi{\unicode{8209}}attack intrusion detection in {MANET}},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103526},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103526},
  doi          = {10.1016/J.COSE.2023.103526},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RekaKRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangWZW24,
  author       = {Zhongjun Yang and
                  Qi Wang and
                  Xuejun Zong and
                  Guogang Wang},
  title        = {Intrusion detection method based on improved social network search
                  algorithm},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103781},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103781},
  doi          = {10.1016/J.COSE.2024.103781},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangWZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChetouaneK24,
  author       = {Ameni Chetouane and
                  Kamel Karoui},
  title        = {Risk based intrusion detection system in software defined networking},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {36},
  number       = {9},
  year         = {2024},
  url          = {https://doi.org/10.1002/cpe.7988},
  doi          = {10.1002/CPE.7988},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/ChetouaneK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/KaurBR24,
  author       = {Prabhjot Kaur and
                  Shalini Batra and
                  Prashant Singh Rana},
  title        = {Border-hunting optimization for mobile agent-based intrusion detection
                  with deep convolutional neural network},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {36},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/cpe.7876},
  doi          = {10.1002/CPE.7876},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/KaurBR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/VibhuteKKPGPS24,
  author       = {Amol D. Vibhute and
                  Minhaj Khan and
                  Anuradha Kanade and
                  Chandrashekhar H. Patil and
                  Sandeep V. Gaikwad and
                  Kanubhai K. Patel and
                  Jatinderkumar R. Saini},
  title        = {An LSTM-based novel near-real-time multiclass network intrusion detection
                  system for complex cloud environments},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {36},
  number       = {11},
  year         = {2024},
  url          = {https://doi.org/10.1002/cpe.8024},
  doi          = {10.1002/CPE.8024},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/VibhuteKKPGPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eait/ShankarHCCP24,
  author       = {S. Siva Shankar and
                  Bui Thanh Hung and
                  Prasun Chakrabarti and
                  Tulika Chakrabarti and
                  Gayatri Parasa},
  title        = {A novel optimization based deep learning with artificial intelligence
                  approach to detect intrusion attack in network system},
  journal      = {Educ. Inf. Technol.},
  volume       = {29},
  number       = {4},
  pages        = {3859--3883},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10639-023-11885-4},
  doi          = {10.1007/S10639-023-11885-4},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eait/ShankarHCCP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/NivaashiniESPB24,
  author       = {Mathappan Nivaashini and
                  Suganya Elavarasan and
                  Sountharrajan Sehar and
                  M. Prabu and
                  Durga Prasad Bavirisetti},
  title        = {{FEDDBN-IDS:} federated deep belief network-based wireless network
                  intrusion detection system},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {8},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00156-5},
  doi          = {10.1186/S13635-024-00156-5},
  timestamp    = {Sun, 26 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/NivaashiniESPB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/es/DuzgunCUD24,
  author       = {Berkant D{\"{u}}zg{\"{u}}n and
                  Aykut {\c{C}}ayir and
                  Ugur {\"{U}}nal and
                  Hasan Dag},
  title        = {Network intrusion detection system by learning jointly from tabular
                  and text-based features},
  journal      = {Expert Syst. J. Knowl. Eng.},
  volume       = {41},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1111/exsy.13518},
  doi          = {10.1111/EXSY.13518},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/es/DuzgunCUD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/DevendiranT24,
  author       = {Ramkumar Devendiran and
                  Anil V. Turukmane},
  title        = {Dugat-LSTM: Deep learning based network intrusion detection system
                  using chaotic optimization strategy},
  journal      = {Expert Syst. Appl.},
  volume       = {245},
  pages        = {123027},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.123027},
  doi          = {10.1016/J.ESWA.2023.123027},
  timestamp    = {Sun, 26 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/DevendiranT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ManocchioLLKSP24,
  author       = {Liam Daly Manocchio and
                  Siamak Layeghy and
                  Wai Weng Lo and
                  Gayan K. Kulatilleke and
                  Mohanad Sarhan and
                  Marius Portmann},
  title        = {FlowTransformer: {A} transformer framework for flow-based network
                  intrusion detection systems},
  journal      = {Expert Syst. Appl.},
  volume       = {241},
  pages        = {122564},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.122564},
  doi          = {10.1016/J.ESWA.2023.122564},
  timestamp    = {Sun, 26 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/ManocchioLLKSP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/SharmaSLR24,
  author       = {Bhawana Sharma and
                  Lokesh Sharma and
                  Chhagan Lal and
                  Satyabrata Roy},
  title        = {Explainable artificial intelligence for intrusion detection in IoT
                  networks: {A} deep learning based approach},
  journal      = {Expert Syst. Appl.},
  volume       = {238},
  number       = {Part {A}},
  pages        = {121751},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.121751},
  doi          = {10.1016/J.ESWA.2023.121751},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/SharmaSLR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/WangJRLWZ24,
  author       = {Qian Wang and
                  Haiyang Jiang and
                  Jiadong Ren and
                  Han Liu and
                  Xuehang Wang and
                  Bing Zhang},
  title        = {An intrusion detection algorithm based on joint symmetric uncertainty
                  and hyperparameter optimized fusion neural network},
  journal      = {Expert Syst. Appl.},
  volume       = {244},
  pages        = {123014},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.123014},
  doi          = {10.1016/J.ESWA.2023.123014},
  timestamp    = {Sun, 26 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/WangJRLWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeenl/BaldiniS24,
  author       = {Gianmarco Baldini and
                  Kandeepan Sithamparanathan},
  title        = {Intrusion Detection System for {MIL-STD-1553} Based on Convolutional
                  Neural Networks With Binary Images and Adaptive Quantization},
  journal      = {{IEEE} Netw. Lett.},
  volume       = {6},
  number       = {1},
  pages        = {50--54},
  year         = {2024},
  url          = {https://doi.org/10.1109/LNET.2023.3324508},
  doi          = {10.1109/LNET.2023.3324508},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeenl/BaldiniS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/Wu24,
  author       = {Hongjiao Wu},
  title        = {Intrusion Detection Model for Wireless Sensor Networks Based on FedAvg
                  and XGBoost Algorithm},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {2024},
  pages        = {1--14},
  year         = {2024},
  url          = {https://doi.org/10.1155/2024/5536615},
  doi          = {10.1155/2024/5536615},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/Wu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AsadAG24,
  author       = {H. Asad and
                  S. Adhikari and
                  Ilir Gashi},
  title        = {A perspective-retrospective analysis of diversity in signature-based
                  open-source network intrusion detection systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {2},
  pages        = {1331--1346},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-023-00794-9},
  doi          = {10.1007/S10207-023-00794-9},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AsadAG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijswis/ZhouS24,
  author       = {Qi Zhou and
                  Chun Shi},
  title        = {A Network Intrusion Detection Method for Various Information Systems
                  Based on Federated and Deep Learning},
  journal      = {Int. J. Semantic Web Inf. Syst.},
  volume       = {20},
  number       = {1},
  pages        = {1--28},
  year         = {2024},
  url          = {https://doi.org/10.4018/ijswis.335495},
  doi          = {10.4018/IJSWIS.335495},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijswis/ZhouS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/SchrotterNS24,
  author       = {Max Schr{\"{o}}tter and
                  Andreas Niemann and
                  Bettina Schnor},
  title        = {A Comparison of Neural-Network-Based Intrusion Detection against Signature-Based
                  Detection in IoT Networks},
  journal      = {Inf.},
  volume       = {15},
  number       = {3},
  pages        = {164},
  year         = {2024},
  url          = {https://doi.org/10.3390/info15030164},
  doi          = {10.3390/INFO15030164},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/SchrotterNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YuZSWZYS24,
  author       = {Shoujian Yu and
                  Rong Zhai and
                  Yizhou Shen and
                  Guowen Wu and
                  Hong Zhang and
                  Shui Yu and
                  Shigen Shen},
  title        = {Deep Q-Network-Based Open-Set Intrusion Detection Solution for Industrial
                  Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {7},
  pages        = {12536--12550},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3333903},
  doi          = {10.1109/JIOT.2023.3333903},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YuZSWZYS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbd/TalukderIUHSAM24,
  author       = {Md. Alamin Talukder and
                  Md. Manowarul Islam and
                  Md. Ashraf Uddin and
                  Khondokar Fida Hasan and
                  Selina Sharmin and
                  Salem A. Alyami and
                  Mohammad Ali Moni},
  title        = {Machine learning-based network intrusion detection for big and imbalanced
                  data using oversampling, stacking feature embedding and feature extraction},
  journal      = {J. Big Data},
  volume       = {11},
  number       = {1},
  pages        = {33},
  year         = {2024},
  url          = {https://doi.org/10.1186/s40537-024-00886-w},
  doi          = {10.1186/S40537-024-00886-W},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbd/TalukderIUHSAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/LongYSZHC24,
  author       = {Zhenyue Long and
                  Huiru Yan and
                  Guiquan Shen and
                  Xiaolu Zhang and
                  Haoyang He and
                  Long Cheng},
  title        = {A Transformer-based network intrusion detection approach for cloud
                  security},
  journal      = {J. Cloud Comput.},
  volume       = {13},
  number       = {1},
  pages        = {5},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13677-023-00574-9},
  doi          = {10.1186/S13677-023-00574-9},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcloudc/LongYSZHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/DuY24,
  author       = {Jiawei Du and
                  Kai Yang},
  title        = {{NIDS-FLGDP:} Network Intrusion Detection Algorithm Based on Gaussian
                  Differential Privacy Federated Learning},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {33},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1142/s0218126624500488},
  doi          = {10.1142/S0218126624500488},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsc/DuY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Deng24,
  author       = {Yongsheng Deng},
  title        = {Design of Industrial IoT Intrusion Security Detection System Based
                  on LightGBM Feature Algorithm and Multi-layer Perception Network},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {13},
  number       = {2},
  pages        = {327--348},
  year         = {2024},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1327},
  doi          = {10.13052/JCSM2245-1439.1327},
  timestamp    = {Sun, 25 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Deng24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/SakthimohanDR24,
  author       = {M. Sakthimohan and
                  J. Deny and
                  G. Elizabeth Rani},
  title        = {Secure deep learning-based energy efficient routing with intrusion
                  detection system for wireless sensor networks},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {46},
  number       = {4},
  pages        = {8587--8603},
  year         = {2024},
  url          = {https://doi.org/10.3233/jifs-235512},
  doi          = {10.3233/JIFS-235512},
  timestamp    = {Fri, 03 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/SakthimohanDR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/WangYCSLYW24,
  author       = {Chia{-}Hung Wang and
                  Qing Ye and
                  Jiongbiao Cai and
                  Yifan Suo and
                  Shengming Lin and
                  Jinchen Yuan and
                  Xiaojing Wu},
  title        = {A novel data-driven integrated detection method for network intrusion
                  classification based on multi-feature imbalanced data},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {46},
  number       = {3},
  pages        = {5893--5910},
  year         = {2024},
  url          = {https://doi.org/10.3233/jifs-234402},
  doi          = {10.3233/JIFS-234402},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/WangYCSLYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/XieC24,
  author       = {Ying Xie and
                  Hong Chen},
  title        = {A novel method for effective intrusion detection based on convolutional
                  speaking neural networks},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {36},
  number       = {2},
  pages        = {101975},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jksuci.2024.101975},
  doi          = {10.1016/J.JKSUCI.2024.101975},
  timestamp    = {Sat, 23 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/XieC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/ZhangCZHGYF24,
  author       = {Jiawei Zhang and
                  Rui Chen and
                  Yanchun Zhang and
                  Weihong Han and
                  Zhaoquan Gu and
                  Shuqiang Yang and
                  Yongquan Fu},
  title        = {{MF2POSE:} Multi-task Feature Fusion Pseudo-Siamese Network for intrusion
                  detection using Category-distance Promotion Loss},
  journal      = {Knowl. Based Syst.},
  volume       = {283},
  pages        = {111110},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.knosys.2023.111110},
  doi          = {10.1016/J.KNOSYS.2023.111110},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/ZhangCZHGYF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/Ravi24,
  author       = {Vinayakumar Ravi},
  title        = {Deep learning-based network intrusion detection in smart healthcare
                  enterprise systems},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {13},
  pages        = {39097--39115},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17300-x},
  doi          = {10.1007/S11042-023-17300-X},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/Ravi24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SaravananMRSRB24,
  author       = {V. Saravanan and
                  M. Madiajagan and
                  Shaik Mohammad Rafee and
                  P. Sanju and
                  Tasneem Bano Rehman and
                  Pattanaik Balachandra},
  title        = {IoT-based blockchain intrusion detection using optimized recurrent
                  neural network},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {11},
  pages        = {31505--31526},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16662-6},
  doi          = {10.1007/S11042-023-16662-6},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/SaravananMRSRB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcs/ChatzimiltisSMT24,
  author       = {Sotiris Chatzimiltis and
                  Mohammad Shojafar and
                  Mahdi Boloursaz Mashhadi and
                  Rahim Tafazolli},
  title        = {A Collaborative Software Defined Network-Based Smart Grid Intrusion
                  Detection System},
  journal      = {{IEEE} Open J. Commun. Soc.},
  volume       = {5},
  pages        = {700--711},
  year         = {2024},
  url          = {https://doi.org/10.1109/OJCOMS.2024.3351088},
  doi          = {10.1109/OJCOMS.2024.3351088},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ojcs/ChatzimiltisSMT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiLYY24,
  author       = {Longlong Li and
                  Yuliang Lu and
                  Guozheng Yang and
                  Xuehu Yan},
  title        = {End-to-End Network Intrusion Detection Based on Contrastive Learning},
  journal      = {Sensors},
  volume       = {24},
  number       = {7},
  pages        = {2122},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24072122},
  doi          = {10.3390/S24072122},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LiLYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/MedinaArcoMRG24,
  author       = {Joaqu{\'{\i}}n Gaspar Medina{-}Arco and
                  Roberto Mag{\'{a}}n{-}Carri{\'{o}}n and
                  Rafael Alejandro Rodr{\'{\i}}guez{-}G{\'{o}}mez and
                  Pedro Garc{\'{\i}}a{-}Teodoro},
  title        = {Methodology for the Detection of Contaminated Training Datasets for
                  Machine Learning-Based Network Intrusion-Detection Systems},
  journal      = {Sensors},
  volume       = {24},
  number       = {2},
  pages        = {479},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24020479},
  doi          = {10.3390/S24020479},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/MedinaArcoMRG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZengZZDW24,
  author       = {Yiming Zeng and
                  Jianwei Zhang and
                  Yuzhong Zhong and
                  Lin Deng and
                  Maoning Wang},
  title        = {STNet: {A} Time-Frequency Analysis-Based Intrusion Detection Network
                  for Distributed Optical Fiber Acoustic Sensing Systems},
  journal      = {Sensors},
  volume       = {24},
  number       = {5},
  pages        = {1570},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24051570},
  doi          = {10.3390/S24051570},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ZengZZDW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/CiricMSM24,
  author       = {Vladimir M. Ciric and
                  Marija S. Milosevic and
                  Danijel Sokolovic and
                  Ivan Z. Milentijevic},
  title        = {Modular deep learning-based network intrusion detection architecture
                  for real-world cyber-attack simulation},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {133},
  pages        = {102916},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.simpat.2024.102916},
  doi          = {10.1016/J.SIMPAT.2024.102916},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simpra/CiricMSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/suscom/KristiantoLH24,
  author       = {Edy Kristianto and
                  Po{-}Ching Lin and
                  Ren{-}Hung Hwang},
  title        = {Sustainable and lightweight domain-based intrusion detection system
                  for in-vehicle network},
  journal      = {Sustain. Comput. Informatics Syst.},
  volume       = {41},
  pages        = {100936},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.suscom.2023.100936},
  doi          = {10.1016/J.SUSCOM.2023.100936},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/suscom/KristiantoLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/UllahSUYZ24,
  author       = {Farhan Ullah and
                  Gautam Srivastava and
                  Shamsher Ullah and
                  Kenji Yoshigoe and
                  Yue Zhao},
  title        = {{NIDS-VSB:} Network Intrusion Detection System for {VANET} Using Spark-Based
                  Big Data Optimization and Transfer Learning},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {70},
  number       = {1},
  pages        = {1798--1809},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCE.2023.3328320},
  doi          = {10.1109/TCE.2023.3328320},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/UllahSUYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YanLZWLZLL24,
  author       = {Haonan Yan and
                  Xiaoguang Li and
                  Wenjing Zhang and
                  Rui Wang and
                  Hui Li and
                  Xingwen Zhao and
                  Fenghua Li and
                  Xiaodong Lin},
  title        = {Automatic Evasion of Machine Learning-Based Network Intrusion Detection
                  Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {153--167},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3247585},
  doi          = {10.1109/TDSC.2023.3247585},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YanLZWLZLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DengLXQ24,
  author       = {Zhouyan Deng and
                  Jiajia Liu and
                  Yijie Xun and
                  Junman Qin},
  title        = {IdentifierIDS: {A} Practical Voltage-Based Intrusion Detection System
                  for Real In-Vehicle Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {661--676},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3327026},
  doi          = {10.1109/TIFS.2023.3327026},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DengLXQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DingSHSC24,
  author       = {Hongwei Ding and
                  Yu Sun and
                  Nana Huang and
                  Zhidong Shen and
                  Xiaohui Cui},
  title        = {{TMG-GAN:} Generative Adversarial Networks-Based Imbalanced Learning
                  for Network Intrusion Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1156--1167},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3331240},
  doi          = {10.1109/TIFS.2023.3331240},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DingSHSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangLJLLL24,
  author       = {Xiangming Wang and
                  Yang Liu and
                  Kexin Jiao and
                  Pengfei Liu and
                  Xiapu Luo and
                  Ting Liu},
  title        = {Intrusion Device Detection in Fieldbus Networks Based on Channel-State
                  Group Fingerprint},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4012--4027},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3374596},
  doi          = {10.1109/TIFS.2024.3374596},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangLJLLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/AliUSKKGANOH24,
  author       = {Bakht Sher Ali and
                  Inam Ullah and
                  Tamara Al Shloul and
                  Izhar Ahmed Khan and
                  Ijaz Khan and
                  Yazeed Yasin Ghadi and
                  Akmalbek Abdusalomov and
                  Rashid Nasimov and
                  Khmaies Ouahada and
                  Habib Hamam},
  title        = {{ICS-IDS:} application of big data analysis in AI-based intrusion
                  detection systems to identify cyberattacks in {ICS} networks},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {6},
  pages        = {7876--7905},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-023-05764-5},
  doi          = {10.1007/S11227-023-05764-5},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/AliUSKKGANOH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/JeongLLK24,
  author       = {Seonghoon Jeong and
                  Sangho Lee and
                  Hwejae Lee and
                  Huy Kang Kim},
  title        = {{X-CANIDS:} Signal-Aware Explainable Intrusion Detection System for
                  Controller Area Network-Based In-Vehicle Network},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {73},
  number       = {3},
  pages        = {3230--3246},
  year         = {2024},
  url          = {https://doi.org/10.1109/TVT.2023.3327275},
  doi          = {10.1109/TVT.2023.3327275},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/JeongLLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/BhuttaMM24,
  author       = {Areeb Ahmed Bhutta and
                  Mehr{-}Un{-}Nisa and
                  Adnan Noor Mian},
  title        = {Lightweight real-time WiFi-based intrusion detection system using
                  LightGBM},
  journal      = {Wirel. Networks},
  volume       = {30},
  number       = {2},
  pages        = {749--761},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11276-023-03516-0},
  doi          = {10.1007/S11276-023-03516-0},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/winet/BhuttaMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/DandapatM24,
  author       = {Asimkiran Dandapat and
                  Bhaskar Mondal},
  title        = {Design of Intrusion Detection System Using {GA} and {CNN} for MQTT-Based
                  IoT Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {134},
  number       = {4},
  pages        = {2059--2082},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11277-024-10984-w},
  doi          = {10.1007/S11277-024-10984-W},
  timestamp    = {Sun, 05 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/DandapatM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/GuptaKJ24,
  author       = {Chetan Gupta and
                  Amit Kumar and
                  Neelesh Kumar Jain},
  title        = {An Enhanced Hybrid Intrusion Detection Based on Crow Search Analysis
                  Optimizations and Artificial Neural Network},
  journal      = {Wirel. Pers. Commun.},
  volume       = {134},
  number       = {1},
  pages        = {43--68},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11277-024-10880-3},
  doi          = {10.1007/S11277-024-10880-3},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/GuptaKJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpits/ZamriiVS24,
  author       = {Iryna Zamrii and
                  Viktor Vyshnivskyi and
                  Valentyn Sobchuk},
  editor       = {Volodymyr Sokolov and
                  Vasyl Ustimenko and
                  Tamara Radivilova and
                  Mariya Nazarkevych},
  title        = {Method of Ensuring the Functional Stability of the Information System
                  based on Detection of Intrusions and Reconfiguration of Virtual Networks},
  booktitle    = {Proceedings of the Workshop Cybersecurity Providing in Information
                  and Telecommunication Systems {(CPITS} 2024), Kyiv, Ukraine, February
                  28, 2024 (online)},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3654},
  pages        = {252--264},
  publisher    = {CEUR-WS.org},
  year         = {2024},
  url          = {https://ceur-ws.org/Vol-3654/paper21.pdf},
  timestamp    = {Thu, 11 Apr 2024 17:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cpits/ZamriiVS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/giis/JiaoM24,
  author       = {Qihang Jiao and
                  Lotfi Mhamdi},
  title        = {Deep Learning based Intrusion Detection for IoT Networks},
  booktitle    = {Global Information Infrastructure and Networking Symposium, {GIIS}
                  2024, Dubai, United Arab Emirates, February 19-21, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/GIIS59465.2024.10449910},
  doi          = {10.1109/GIIS59465.2024.10449910},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/giis/JiaoM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SyneCH24,
  author       = {Lamine Syne and
                  Pino Caballero{-}Gil and
                  Candelaria Hern{\'{a}}ndez{-}Goya},
  editor       = {Jiman Hong and
                  Juw Won Park},
  title        = {Improving Privacy in Federated Learning-Based Intrusion Detection
                  for IoT Networks},
  booktitle    = {Proceedings of the 39th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2024, Avila, Spain, April 8-12, 2024},
  pages        = {580--583},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3605098.3636183},
  doi          = {10.1145/3605098.3636183},
  timestamp    = {Wed, 22 May 2024 10:31:05 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/SyneCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-10207,
  author       = {Jesse Ables and
                  Nathaniel Childers and
                  William Anderson and
                  Sudip Mittal and
                  Shahram Rahimi and
                  Ioana Banicescu and
                  Maria Seale},
  title        = {Eclectic Rule Extraction for Explainability of Deep Neural Network
                  based Intrusion Detection Systems},
  journal      = {CoRR},
  volume       = {abs/2401.10207},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.10207},
  doi          = {10.48550/ARXIV.2401.10207},
  eprinttype    = {arXiv},
  eprint       = {2401.10207},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-10207.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-10691,
  author       = {Hangsheng Zhang and
                  Dongqi Han and
                  Yinlong Liu and
                  Zhiliang Wang and
                  Jiyan Sun and
                  Shangyuan Zhuang and
                  Jiqiang Liu and
                  Jinsong Dong},
  title        = {Explainable and Transferable Adversarial Attack for ML-Based Network
                  Intrusion Detectors},
  journal      = {CoRR},
  volume       = {abs/2401.10691},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.10691},
  doi          = {10.48550/ARXIV.2401.10691},
  eprinttype    = {arXiv},
  eprint       = {2401.10691},
  timestamp    = {Fri, 02 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-10691.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-11968,
  author       = {Jiyuan Shen and
                  Wenzhuo Yang and
                  Zhaowei Chu and
                  Jiani Fan and
                  Dusit Niyato and
                  Kwok{-}Yan Lam},
  title        = {Effective Intrusion Detection in Heterogeneous Internet-of-Things
                  Networks via Ensemble Knowledge Distillation-based Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2401.11968},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.11968},
  doi          = {10.48550/ARXIV.2401.11968},
  eprinttype    = {arXiv},
  eprint       = {2401.11968},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-11968.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-12262,
  author       = {Md. Alamin Talukder and
                  Md. Manowarul Islam and
                  Md. Ashraf Uddin and
                  Khondokar Fida Hasan and
                  Selina Sharmin and
                  Salem A. Alyami and
                  Mohammad Ali Moni},
  title        = {Machine learning-based network intrusion detection for big and imbalanced
                  data using oversampling, stacking feature embedding and feature extraction},
  journal      = {CoRR},
  volume       = {abs/2401.12262},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.12262},
  doi          = {10.48550/ARXIV.2401.12262},
  eprinttype    = {arXiv},
  eprint       = {2401.12262},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-12262.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-14037,
  author       = {Moutaz Alazab and
                  Ruba Abu Khurma and
                  Pedro A. Castillo and
                  Bilal Abu{-}Salih and
                  Alejandro Mart{\'{\i}}n and
                  David Camacho},
  title        = {An Effective Networks Intrusion Detection Approach Based on Hybrid
                  Harris Hawks and Multi-Layer Perceptron},
  journal      = {CoRR},
  volume       = {abs/2402.14037},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.14037},
  doi          = {10.48550/ARXIV.2402.14037},
  eprinttype    = {arXiv},
  eprint       = {2402.14037},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-14037.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-11830,
  author       = {Andrea Venturi and
                  Dario Stabili and
                  Mirco Marchetti},
  title        = {Problem space structural adversarial attacks for Network Intrusion
                  Detection Systems based on Graph Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2403.11830},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.11830},
  doi          = {10.48550/ARXIV.2403.11830},
  eprinttype    = {arXiv},
  eprint       = {2403.11830},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-11830.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Das23,
  author       = {Tapadhir Das},
  title        = {Modeling the Abnormality: Machine Learning-based Anomaly and Intrusion
                  Detection in Software-defined Networks},
  school       = {University of Nevada, Reno, {USA}},
  year         = {2023},
  url          = {http://hdl.handle.net/11714/10016},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Das23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/tr/Almamoori23,
  author       = {Zainab Ali Abbood Almamoori},
  title        = {Embedding intrusion detection in distributed computing artificial
                  intelligence-based routing in {AD} {HOC} networks {()}},
  school       = {Alt{\i}nba{\c{s}} University, Turkey},
  year         = {2023},
  url          = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=2Gr9rGfDEtLbkTrmoaOWsg\&no=u8zNLtshUs6QOFE5E3sEkw},
  timestamp    = {Sun, 29 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/tr/Almamoori23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlmorabeaKAHA23,
  author       = {Omar Mohammed Almorabea and
                  Tariq Jamil Saifullah Khanzada and
                  Muhammad Ahtisham Aslam and
                  Fatheah A. Hendi and
                  Ahmad Mohammed Almorabea},
  title        = {IoT Network-Based Intrusion Detection Framework: {A} Solution to Process
                  Ping Floods Originating From Embedded Devices},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {119118--119145},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3327061},
  doi          = {10.1109/ACCESS.2023.3327061},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AlmorabeaKAHA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DongWL23,
  author       = {Chen Dong and
                  Hao Wu and
                  Qingyuan Li},
  title        = {Multiple Observation HMM-Based {CAN} Bus Intrusion Detection System
                  for In-Vehicle Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {35639--35648},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3265018},
  doi          = {10.1109/ACCESS.2023.3265018},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DongWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DuYHJ23,
  author       = {Jiawei Du and
                  Kai Yang and
                  Yanjing Hu and
                  Lingjie Jiang},
  title        = {{NIDS-CNNLSTM:} Network Intrusion Detection Classification Model Based
                  on Deep Learning},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {24808--24821},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3254915},
  doi          = {10.1109/ACCESS.2023.3254915},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DuYHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhatriLN23,
  author       = {Narayan Khatri and
                  Sihyung Lee and
                  Seung Yeob Nam},
  title        = {Transfer Learning-Based Intrusion Detection System for a Controller
                  Area Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {120963--120982},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3328182},
  doi          = {10.1109/ACCESS.2023.3328182},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KhatriLN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuHLRYX23,
  author       = {Zhipeng Liu and
                  Junyi Hu and
                  Yang Liu and
                  Kaushik Roy and
                  Xiaohong Yuan and
                  Jinsheng Xu},
  title        = {Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial
                  Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {91116--91132},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3307463},
  doi          = {10.1109/ACCESS.2023.3307463},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LiuHLRYX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LucasFTASBPC23,
  author       = {Thiago Jos{\'{e}} Lucas and
                  Ina{\^{e}} Soares de Figueiredo and
                  Carlos Alexandre Carvalho Tojeiro and
                  Alex Marino Gon{\c{c}}alves de Almeida and
                  Rafal Scherer and
                  Jos{\'{e}} Remo Ferreira Brega and
                  Jo{\~{a}}o Paulo Papa and
                  Kelton Augusto Pontara da Costa},
  title        = {A Comprehensive Survey on Ensemble Learning-Based Intrusion Detection
                  Approaches in Computer Networks},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {122638--122676},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3328535},
  doi          = {10.1109/ACCESS.2023.3328535},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LucasFTASBPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MirsadeghiBVI23,
  author       = {Seyed Mohammad Hadi Mirsadeghi and
                  Hayretdin Bahsi and
                  Risto Vaarandi and
                  Wissem Inoubli},
  title        = {Learning From Few Cyber-Attacks: Addressing the Class Imbalance Problem
                  in Machine Learning-Based Intrusion Detection in Software-Defined
                  Networking},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {140428--140442},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3341755},
  doi          = {10.1109/ACCESS.2023.3341755},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MirsadeghiBVI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NayakB23,
  author       = {Nanavath Kiran Singh Nayak and
                  Budhaditya Bhattacharyya},
  title        = {{MAC} Protocol Based IoT Network Intrusion Detection Using Improved
                  Efficient Shuffle Bidirectional {COOT} Channel Attention Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {77385--77402},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3299031},
  doi          = {10.1109/ACCESS.2023.3299031},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/NayakB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NguyenNK23,
  author       = {Trieu Phong Nguyen and
                  Heungwoo Nam and
                  Daehee Kim},
  title        = {Transformer-Based Attention Network for In-Vehicle Intrusion Detection},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {55389--55403},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3282110},
  doi          = {10.1109/ACCESS.2023.3282110},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/NguyenNK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/UllahBKA23,
  author       = {Safi Ullah and
                  Wadii Boulila and
                  Anis Koub{\^{a}}a and
                  Jawad Ahmad},
  title        = {{MAGRU-IDS:} {A} Multi-Head Attention-Based Gated Recurrent Unit for
                  Intrusion Detection in IIoT Networks},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {114590--114601},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3324657},
  doi          = {10.1109/ACCESS.2023.3324657},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/UllahBKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangG23a,
  author       = {Zhen Wang and
                  Fuad A. Ghaleb},
  title        = {An Attention-Based Convolutional Neural Network for Intrusion Detection
                  Model},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {43116--43127},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3271408},
  doi          = {10.1109/ACCESS.2023.3271408},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangG23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YuKXY23,
  author       = {Hongchen Yu and
                  Chunying Kang and
                  Yao Xiao and
                  Yuting Yang},
  title        = {Network Intrusion Detection Method Based on Hybrid Improved Residual
                  Network Blocks and Bidirectional Gated Recurrent Units},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {68961--68971},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3271866},
  doi          = {10.1109/ACCESS.2023.3271866},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YuKXY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZouLZYW23,
  author       = {Li Zou and
                  Xuemei Luo and
                  Yan Zhang and
                  Xiao Yang and
                  Xiangwen Wang},
  title        = {{HC-DTTSVM:} {A} Network Intrusion Detection Method Based on Decision
                  Tree Twin Support Vector Machine and Hierarchical Clustering},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {21404--21416},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3251354},
  doi          = {10.1109/ACCESS.2023.3251354},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZouLZYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/accs/KalininT23,
  author       = {Maxim O. Kalinin and
                  E. I. Tkacheva},
  title        = {A Decentralized Approach to Intrusion Detection in Dynamic Networks
                  of the Internet of Things Based on Multiagent Reinforcement Learning
                  with Interagent Interaction},
  journal      = {Autom. Control. Comput. Sci.},
  volume       = {57},
  number       = {8},
  pages        = {1025--1032},
  year         = {2023},
  url          = {https://doi.org/10.3103/S0146411623080096},
  doi          = {10.3103/S0146411623080096},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/accs/KalininT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/OrsL23,
  author       = {Faik Kerem {\"{O}}rs and
                  Albert Levi},
  title        = {Data driven intrusion detection for 6LoWPAN based IoT systems},
  journal      = {Ad Hoc Networks},
  volume       = {143},
  pages        = {103120},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103120},
  doi          = {10.1016/J.ADHOC.2023.103120},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/OrsL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aghcs/PandeK23,
  author       = {Sagar Pande and
                  Aditya Khamparia},
  title        = {Explainable Deep Neural Network based Analysis on Intrusion Detection
                  Systems},
  journal      = {Comput. Sci.},
  volume       = {24},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.7494/csci.2023.24.1.4551},
  doi          = {10.7494/CSCI.2023.24.1.4551},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aghcs/PandeK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithms/LiMS23,
  author       = {Xue Jun Li and
                  Maode Ma and
                  Yihan Sun},
  title        = {An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based
                  Classifiers for Intrusion Detection in Smart Grids},
  journal      = {Algorithms},
  volume       = {16},
  number       = {6},
  pages        = {288},
  year         = {2023},
  url          = {https://doi.org/10.3390/a16060288},
  doi          = {10.3390/A16060288},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithms/LiMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/HeWSXC23,
  author       = {Jiaxing He and
                  Xiaodan Wang and
                  Yafei Song and
                  Qian Xiang and
                  Chen Chen},
  title        = {Network intrusion detection based on conditional wasserstein variational
                  autoencoder with generative adversarial network and one-dimensional
                  convolutional neural networks},
  journal      = {Appl. Intell.},
  volume       = {53},
  number       = {10},
  pages        = {12416--12436},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10489-022-03995-2},
  doi          = {10.1007/S10489-022-03995-2},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/HeWSXC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/LanLLZ23,
  author       = {Jinghong Lan and
                  Xudong Liu and
                  Bo Li and
                  Jun Zhao},
  title        = {A novel hierarchical attention-based triplet network with unsupervised
                  domain adaptation for network intrusion detection},
  journal      = {Appl. Intell.},
  volume       = {53},
  number       = {10},
  pages        = {11705--11726},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10489-022-04076-0},
  doi          = {10.1007/S10489-022-04076-0},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/LanLLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/PrasadTD23,
  author       = {Mahendra Prasad and
                  Sachin Tripathi and
                  Keshav P. Dahal},
  title        = {A probability estimation-based feature reduction and Bayesian rough
                  set approach for intrusion detection in mobile ad-hoc network},
  journal      = {Appl. Intell.},
  volume       = {53},
  number       = {6},
  pages        = {7169--7185},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10489-022-03763-2},
  doi          = {10.1007/S10489-022-03763-2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/PrasadTD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/XiaoYZCL23,
  author       = {Junchao Xiao and
                  Lin Yang and
                  Fuli Zhong and
                  Hongbo Chen and
                  Xiangxue Li},
  title        = {Robust anomaly-based intrusion detection system for in-vehicle network
                  by graph neural network framework},
  journal      = {Appl. Intell.},
  volume       = {53},
  number       = {3},
  pages        = {3183--3206},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10489-022-03412-8},
  doi          = {10.1007/S10489-022-03412-8},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/XiaoYZCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/array/HossainI23,
  author       = {Md. Alamgir Hossain and
                  Md. Saiful Islam},
  title        = {Ensuring network security with a robust intrusion detection system
                  using ensemble-based machine learning},
  journal      = {Array},
  volume       = {19},
  pages        = {100306},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.array.2023.100306},
  doi          = {10.1016/J.ARRAY.2023.100306},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/array/HossainI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/MohammadianGL23,
  author       = {Hesamodin Mohammadian and
                  Ali A. Ghorbani and
                  Arash Habibi Lashkari},
  title        = {A gradient-based approach for adversarial attack on deep learning-based
                  network intrusion detection systems},
  journal      = {Appl. Soft Comput.},
  volume       = {137},
  pages        = {110173},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.asoc.2023.110173},
  doi          = {10.1016/J.ASOC.2023.110173},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/MohammadianGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bspc/Patel23,
  author       = {Sagarkumar K. Patel},
  title        = {Improving intrusion detection in cloud-based healthcare using neural
                  network},
  journal      = {Biomed. Signal Process. Control.},
  volume       = {83},
  pages        = {104680},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.bspc.2023.104680},
  doi          = {10.1016/J.BSPC.2023.104680},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bspc/Patel23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cas/SontakkeC23,
  author       = {Prakash Vijay Sontakke and
                  Nilkanth B. Chopade},
  title        = {Optimized Deep Neural Model-Based Intrusion Detection and Mitigation
                  System for Vehicular Ad-Hoc Network},
  journal      = {Cybern. Syst.},
  volume       = {54},
  number       = {7},
  pages        = {985--1013},
  year         = {2023},
  url          = {https://doi.org/10.1080/01969722.2022.2137643},
  doi          = {10.1080/01969722.2022.2137643},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cas/SontakkeC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/CaoWDZL23,
  author       = {Yongzhong Cao and
                  Zhihui Wang and
                  Hongwei Ding and
                  Jiale Zhang and
                  Bin Li},
  title        = {An intrusion detection system based on stacked ensemble learning for
                  IoT network},
  journal      = {Comput. Electr. Eng.},
  volume       = {110},
  pages        = {108836},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108836},
  doi          = {10.1016/J.COMPELECENG.2023.108836},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/CaoWDZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LayeghyP23,
  author       = {Siamak Layeghy and
                  Marius Portmann},
  title        = {Explainable Cross-domain Evaluation of ML-based Network Intrusion
                  Detection Systems},
  journal      = {Comput. Electr. Eng.},
  volume       = {108},
  pages        = {108692},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108692},
  doi          = {10.1016/J.COMPELECENG.2023.108692},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/LayeghyP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/PingaleS23,
  author       = {Subhash V. Pingale and
                  Sanjay R. Sutar},
  title        = {Remora based Deep Maxout Network model for network intrusion detection
                  using Convolutional Neural Network features},
  journal      = {Comput. Electr. Eng.},
  volume       = {110},
  pages        = {108831},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108831},
  doi          = {10.1016/J.COMPELECENG.2023.108831},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/PingaleS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/SharmaSLR23,
  author       = {Bhawana Sharma and
                  Lokesh Sharma and
                  Chhagan Lal and
                  Satyabrata Roy},
  title        = {Anomaly based network intrusion detection for IoT attacks using deep
                  learning technique},
  journal      = {Comput. Electr. Eng.},
  volume       = {107},
  pages        = {108626},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108626},
  doi          = {10.1016/J.COMPELECENG.2023.108626},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/SharmaSLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/Song23,
  author       = {Yuqiao Song},
  title        = {Public cloud network intrusion and internet legal supervision based
                  on abnormal feature detection},
  journal      = {Comput. Electr. Eng.},
  volume       = {112},
  pages        = {109015},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.109015},
  doi          = {10.1016/J.COMPELECENG.2023.109015},
  timestamp    = {Mon, 01 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/Song23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/Wang23,
  author       = {Man Wang},
  title        = {Optimization of Network Security in University Laboratories Based
                  on Anomaly Intrusion Detection in Public Cloud Networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {111},
  number       = {Part {B}},
  pages        = {108968},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108968},
  doi          = {10.1016/J.COMPELECENG.2023.108968},
  timestamp    = {Wed, 22 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/Wang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Li23,
  author       = {Long Li},
  title        = {A Network Intrusion Detection Model Based on GA-Improved {NSA}},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {31},
  number       = {2},
  pages        = {91--106},
  year         = {2023},
  url          = {http://cit.fer.hr/index.php/CIT/article/view/5737},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cit/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/SantosGRM23,
  author       = {Leonel Santos and
                  Ramiro Gon{\c{c}}alves and
                  Carlos Rabad{\~{a}}o and
                  Jos{\'{e}} Martins},
  title        = {A flow-based intrusion detection framework for internet of things
                  networks},
  journal      = {Clust. Comput.},
  volume       = {26},
  number       = {1},
  pages        = {37--57},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10586-021-03238-y},
  doi          = {10.1007/S10586-021-03238-Y},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/SantosGRM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/BugshanKKA23,
  author       = {Neda Bugshan and
                  Ibrahim Khalil and
                  Aditya Pribadi Kalapaaking and
                  Mohammed Atiquzzaman},
  title        = {Intrusion Detection-Based Ensemble Learning and Microservices for
                  Zero Touch Networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {61},
  number       = {6},
  pages        = {86--92},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCOM.001.2200535},
  doi          = {10.1109/MCOM.001.2200535},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/BugshanKKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MabroukN23,
  author       = {Abdelfettah Mabrouk and
                  Assia Naja},
  title        = {Intrusion detection game for ubiquitous security in vehicular networks:
                  {A} signaling game based approach},
  journal      = {Comput. Networks},
  volume       = {225},
  pages        = {109649},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109649},
  doi          = {10.1016/J.COMNET.2023.109649},
  timestamp    = {Sun, 02 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/MabroukN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/OliveiraGMJGOF23,
  author       = {Jonathas A. de Oliveira and
                  Vin{\'{\i}}cius P. Gon{\c{c}}alves and
                  Rodolfo Ipolito Meneguette and
                  Rafael Tim{\'{o}}teo de Sousa J{\'{u}}nior and
                  Daniel L. Guidoni and
                  Jos{\'{e}} C. M. Oliveira and
                  Geraldo P. Rocha Filho},
  title        = {{F-NIDS} - {A} Network Intrusion Detection System based on federated
                  learning},
  journal      = {Comput. Networks},
  volume       = {236},
  pages        = {110010},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.110010},
  doi          = {10.1016/J.COMNET.2023.110010},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/OliveiraGMJGOF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SyedGB23,
  author       = {Naeem Firdous Syed and
                  Mengmeng Ge and
                  Zubair A. Baig},
  title        = {Fog-cloud based intrusion detection system using Recurrent Neural
                  Networks and feature selection for IoT networks},
  journal      = {Comput. Networks},
  volume       = {225},
  pages        = {109662},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109662},
  doi          = {10.1016/J.COMNET.2023.109662},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/SyedGB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/UllahAKABKJC23,
  author       = {Safi Ullah and
                  Jawad Ahmad and
                  Muazzam Ali Khan and
                  Mohammed S. Alshehri and
                  Wadii Boulila and
                  Anis Koubaa and
                  Sana Ullah Jan and
                  M. Munawwar Iqbal Ch},
  title        = {{TNN-IDS:} Transformer neural network-based intrusion detection system
                  for MQTT-enabled IoT Networks},
  journal      = {Comput. Networks},
  volume       = {237},
  pages        = {110072},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.110072},
  doi          = {10.1016/J.COMNET.2023.110072},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/UllahAKABKJC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Kasongo23,
  author       = {Sydney Mambwe Kasongo},
  title        = {A deep learning technique for intrusion detection system using a Recurrent
                  Neural Networks based framework},
  journal      = {Comput. Commun.},
  volume       = {199},
  pages        = {113--125},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2022.12.010},
  doi          = {10.1016/J.COMCOM.2022.12.010},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Kasongo23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/MaheswariSN23,
  author       = {K. G. Maheswari and
                  C. Siva and
                  G. NaliniPriya},
  title        = {Optimal cluster based feature selection for intrusion detection system
                  in web and cloud computing environment using hybrid teacher learning
                  optimization enables deep recurrent neural network},
  journal      = {Comput. Commun.},
  volume       = {202},
  pages        = {145--153},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2023.02.003},
  doi          = {10.1016/J.COMCOM.2023.02.003},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/MaheswariSN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HanCLZJL23,
  author       = {Xueying Han and
                  Susu Cui and
                  Song Liu and
                  Chen Zhang and
                  Bo Jiang and
                  Zhigang Lu},
  title        = {Network intrusion detection based on n-gram frequency and time-aware
                  transformer},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103171},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103171},
  doi          = {10.1016/J.COSE.2023.103171},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HanCLZJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangZGWLZ23,
  author       = {Jia{-}Cheng Huang and
                  Guo{-}Qiang Zeng and
                  Guang{-}Gang Geng and
                  Jian Weng and
                  Kang{-}Di Lu and
                  Yu Zhang},
  title        = {Differential evolution-based convolutional neural networks: An automatic
                  architecture design method for intrusion detection in industrial control
                  systems},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103310},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103310},
  doi          = {10.1016/J.COSE.2023.103310},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangZGWLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LopesZAALRP23,
  author       = {Ivandro Ortet Lopes and
                  Deqing Zou and
                  Ihsan H. Abdulqadder and
                  Saeed Akbar and
                  Zhen Li and
                  Francis A. Ruambo and
                  Wagner Pereira},
  title        = {Network intrusion detection based on the temporal convolutional model},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103465},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103465},
  doi          = {10.1016/J.COSE.2023.103465},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LopesZAALRP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PandeyVARV23,
  author       = {Bishwajeet K. Pandey and
                  M. R. M. VeeraManickam and
                  Shabeer Ahmad and
                  Ciro Rodriguez Rodriguez and
                  Doris Esenarro Vargas},
  title        = {ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based
                  Deep maxout network for intrusion detection using big data in cloud
                  computing framework},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102975},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102975},
  doi          = {10.1016/J.COSE.2022.102975},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PandeyVARV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SantosVST23,
  author       = {Roger Robson dos Santos and
                  Eduardo K. Viegas and
                  Altair O. Santin and
                  Pietro Tedeschi},
  title        = {Federated learning for reliable model updates in network-based intrusion
                  detection},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103413},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103413},
  doi          = {10.1016/J.COSE.2023.103413},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SantosVST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TsengC23,
  author       = {Chinyang Henry Tseng and
                  Ya{-}Ting Chang},
  title        = {{EBDM:} Ensemble binary detection models for multi-class wireless
                  intrusion detection based on deep neural network},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103419},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103419},
  doi          = {10.1016/J.COSE.2023.103419},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TsengC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/Awajan23,
  author       = {Albara W. Awajan},
  title        = {A Novel Deep Learning-Based Intrusion Detection System for IoT Networks},
  journal      = {Comput.},
  volume       = {12},
  number       = {2},
  pages        = {34},
  year         = {2023},
  url          = {https://doi.org/10.3390/computers12020034},
  doi          = {10.3390/COMPUTERS12020034},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/Awajan23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/WangYGW23,
  author       = {Minxiao Wang and
                  Ning Yang and
                  Dulaj Gunasinghe and
                  Ning Weng},
  title        = {On the Robustness of ML-Based Network Intrusion Detection Systems:
                  An Adversarial and Distribution Shift Perspective},
  journal      = {Comput.},
  volume       = {12},
  number       = {10},
  pages        = {209},
  year         = {2023},
  url          = {https://doi.org/10.3390/computers12100209},
  doi          = {10.3390/COMPUTERS12100209},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computers/WangYGW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/AlzahraniA23,
  author       = {Abdulsalam O. Alzahrani and
                  Mohammed J. F. Alenazi},
  title        = {{ML-IDSDN:} Machine learning based intrusion detection system for
                  software-defined network},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {35},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/cpe.7438},
  doi          = {10.1002/CPE.7438},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/AlzahraniA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/NarengbamD23,
  author       = {Lenin Narengbam and
                  Shouvik Dey},
  title        = {Harris hawk optimization trained artificial neural network for anomaly
                  based intrusion detection system},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {35},
  number       = {23},
  year         = {2023},
  url          = {https://doi.org/10.1002/cpe.7771},
  doi          = {10.1002/CPE.7771},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/NarengbamD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/SiddharthanT23,
  author       = {Hariprasad Siddharthan and
                  Deepa Thangavel},
  title        = {A novel framework approach for intrusion detection based on improved
                  critical feature selection in Internet of Things networks},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {35},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/cpe.7445},
  doi          = {10.1002/CPE.7445},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/SiddharthanT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/VarmaRV23,
  author       = {P. Ravi Kiran Varma and
                  Sathiya R. R and
                  M. Vanitha},
  title        = {Enhanced Elman spike neural network based intrusion attack detection
                  in software defined Internet of Things network},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {35},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/cpe.7503},
  doi          = {10.1002/CPE.7503},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/VarmaRV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/connection/GebremariamPI23,
  author       = {Gebrekiros Gebreyesus Gebremariam and
                  J. Panda and
                  S. Indu},
  title        = {Design of advanced intrusion detection systems based on hybrid machine
                  learning techniques in hierarchically wireless sensor networks},
  journal      = {Connect. Sci.},
  volume       = {35},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1080/09540091.2023.2246703},
  doi          = {10.1080/09540091.2023.2246703},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/connection/GebremariamPI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/GautamiSK23,
  author       = {A. Gautami and
                  J. Shanthini and
                  S. Karthik},
  title        = {A Quasi-Newton Neural Network Based Efficient Intrusion Detection
                  System for Wireless Sensor Network},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {45},
  number       = {1},
  pages        = {427--443},
  year         = {2023},
  url          = {https://doi.org/10.32604/csse.2023.026688},
  doi          = {10.32604/CSSE.2023.026688},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/GautamiSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/SivananthamMSS23,
  author       = {S. Sivanantham and
                  V. Mohanraj and
                  Y. Suresh and
                  J. Senthilkumar},
  title        = {Association Rule Mining Frequent-Pattern-Based Intrusion Detection
                  in Network},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {44},
  number       = {2},
  pages        = {1617--1631},
  year         = {2023},
  url          = {https://doi.org/10.32604/csse.2023.025893},
  doi          = {10.32604/CSSE.2023.025893},
  timestamp    = {Fri, 16 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/SivananthamMSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/RajapakshaKAPMC23,
  author       = {Sampath Rajapaksha and
                  Harsha K. Kalutarage and
                  M. Omar Al{-}Kadri and
                  Andrei Petrovski and
                  Garikayi Madzudzo and
                  Madeline Cheah},
  title        = {AI-Based Intrusion Detection Systems for In-Vehicle Networks: {A}
                  Survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {11},
  pages        = {237:1--237:40},
  year         = {2023},
  url          = {https://doi.org/10.1145/3570954},
  doi          = {10.1145/3570954},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/RajapakshaKAPMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/FanZLH23,
  author       = {Kaisheng Fan and
                  Weizhe Zhang and
                  Guangrui Liu and
                  Hui He},
  title        = {{FMSA:} a meta-learning framework-based fast model stealing attack
                  technique against intelligent network intrusion detection systems},
  journal      = {Cybersecur.},
  volume       = {6},
  number       = {1},
  pages        = {35},
  year         = {2023},
  url          = {https://doi.org/10.1186/s42400-023-00171-y},
  doi          = {10.1186/S42400-023-00171-Y},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/FanZLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/datascience/LiSS23,
  author       = {Junzhou Li and
                  Qianhui Sun and
                  Feixian Sun},
  title        = {Enhancing Privacy-Preserving Intrusion Detection in Blockchain-Based
                  Networks with Deep Learning},
  journal      = {Data Sci. J.},
  volume       = {22},
  year         = {2023},
  url          = {https://doi.org/10.5334/dsj-2023-031},
  doi          = {10.5334/DSJ-2023-031},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/datascience/LiSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/AlladiKCY23,
  author       = {Tejasvi Alladi and
                  Varun Kohli and
                  Vinay Chamola and
                  F. Richard Yu},
  title        = {A deep learning based misbehavior classification scheme for intrusion
                  detection in cooperative intelligent transportation systems},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {5},
  pages        = {1113--1122},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2022.06.018},
  doi          = {10.1016/J.DCAN.2022.06.018},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcan/AlladiKCY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/LinXFB23,
  author       = {Haifeng Lin and
                  Qilin Xue and
                  Jiayin Feng and
                  Di Bai},
  title        = {Internet of things intrusion detection model and algorithm based on
                  cloud computing and multi-feature extraction extreme learning machine},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {1},
  pages        = {111--124},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2022.09.021},
  doi          = {10.1016/J.DCAN.2022.09.021},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcan/LinXFB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/WeiWDLH23,
  author       = {Pengcheng Wei and
                  Bo Wang and
                  Xiaojun Dai and
                  Li Li and
                  Fangcheng He},
  title        = {A novel intrusion detection model for the {CAN} bus packet of in-vehicle
                  network based on attention mechanism and autoencoder},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {1},
  pages        = {14--21},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2022.04.021},
  doi          = {10.1016/J.DCAN.2022.04.021},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/WeiWDLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eaai/Ninu23,
  author       = {S. B. Ninu},
  title        = {An intrusion detection system using Exponential Henry Gas Solubility
                  Optimization based Deep Neuro Fuzzy Network in {MANET}},
  journal      = {Eng. Appl. Artif. Intell.},
  volume       = {123},
  number       = {Part {A}},
  pages        = {105969},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.engappai.2023.105969},
  doi          = {10.1016/J.ENGAPPAI.2023.105969},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eaai/Ninu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/WangLZ23,
  author       = {Xiaoning Wang and
                  Jia Liu and
                  Chunjiong Zhang},
  title        = {Network intrusion detection based on multi-domain data and ensemble-bidirectional
                  {LSTM}},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {5},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00139-y},
  doi          = {10.1186/S13635-023-00139-Y},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/WangLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/es/XiaCYLZGY23,
  author       = {Zhuoqun Xia and
                  Yaling Chen and
                  Bo Yin and
                  Haolan Liang and
                  Hongmei Zhou and
                  Ke Gu and
                  Fei Yu},
  title        = {Fed{\_}ADBN: An efficient intrusion detection framework based on client
                  selection in {AMI} network},
  journal      = {Expert Syst. J. Knowl. Eng.},
  volume       = {40},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1111/exsy.12983},
  doi          = {10.1111/EXSY.12983},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/es/XiaCYLZGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/AlghanamASA23,
  author       = {Orieb Abu Alghanam and
                  Wesam Almobaideen and
                  Maha Saadeh and
                  Omar Adwan},
  title        = {An improved {PIO} feature selection algorithm for IoT network intrusion
                  detection system based on ensemble learning},
  journal      = {Expert Syst. Appl.},
  volume       = {213},
  number       = {Part},
  pages        = {118745},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2022.118745},
  doi          = {10.1016/J.ESWA.2022.118745},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/AlghanamASA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/IdrissiAMMOYB23,
  author       = {Meryem Janati Idrissi and
                  Hamza Alami and
                  Abdelkader El Mahdaouy and
                  Abdellah El Mekki and
                  Soufiane Oualil and
                  Zakaria Yartaoui and
                  Ismail Berrada},
  title        = {Fed-ANIDS: Federated learning for anomaly-based network intrusion
                  detection systems},
  journal      = {Expert Syst. Appl.},
  volume       = {234},
  pages        = {121000},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2023.121000},
  doi          = {10.1016/J.ESWA.2023.121000},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/IdrissiAMMOYB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/LoukT23,
  author       = {Maya Hilda Lestari Louk and
                  Bayu Adhi Tama},
  title        = {Dual-IDS: {A} bagging-based gradient boosting decision tree model
                  for network anomaly intrusion detection system},
  journal      = {Expert Syst. Appl.},
  volume       = {213},
  number       = {Part},
  pages        = {119030},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2022.119030},
  doi          = {10.1016/J.ESWA.2022.119030},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/LoukT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/DebichaBDDKM23,
  author       = {Islam Debicha and
                  Richard Bauwens and
                  Thibault Debatty and
                  Jean{-}Michel Dricot and
                  Tayeb Kenaza and
                  Wim Mees},
  title        = {{TAD:} Transfer learning-based multi-adversarial detection of evasion
                  attacks against network intrusion detection systems},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {138},
  pages        = {185--197},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.future.2022.08.011},
  doi          = {10.1016/J.FUTURE.2022.08.011},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/DebichaBDDKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/NgoLTPTMP23,
  author       = {Duc{-}Minh Ngo and
                  Dominic Lightbody and
                  Andriy Temko and
                  Cuong Pham{-}Quoc and
                  Ngoc{-}Thinh Tran and
                  Colin C. Murphy and
                  Emanuel M. Popovici},
  title        = {{HH-NIDS:} Heterogeneous Hardware-Based Network Intrusion Detection
                  Framework for IoT Security},
  journal      = {Future Internet},
  volume       = {15},
  number       = {1},
  pages        = {9},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15010009},
  doi          = {10.3390/FI15010009},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/NgoLTPTMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/RangelovLBBDTB23,
  author       = {Denis Rangelov and
                  Philipp L{\"{a}}mmel and
                  Lisa Brunzel and
                  Stephan Borgert and
                  Paul L. Darius and
                  Nikolay Tcholtchev and
                  Michell Boerger},
  title        = {Towards an Integrated Methodology and Toolchain for Machine Learning-Based
                  Intrusion Detection in Urban IoT Networks and Platforms},
  journal      = {Future Internet},
  volume       = {15},
  number       = {3},
  pages        = {98},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15030098},
  doi          = {10.3390/FI15030098},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/RangelovLBBDTB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/FarahCA23,
  author       = {Khamsa Farah and
                  Karim Chabir and
                  Mohamed Naceur Abdelkrim},
  title        = {High level Petri nets-based proposal of an integrated intrusion detection
                  and prevention mechanism in network controlled systems},
  journal      = {{IET} Commun.},
  volume       = {17},
  number       = {4},
  pages        = {469--477},
  year         = {2023},
  url          = {https://doi.org/10.1049/cmu2.12557},
  doi          = {10.1049/CMU2.12557},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/FarahCA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaacs/DengY23,
  author       = {Hongli Deng and
                  Tao Yang},
  title        = {Real time detection of intrusion trace information in sensor network
                  based on Bayesian belief network},
  journal      = {Int. J. Auton. Adapt. Commun. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {48--65},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJAACS.2023.10052877},
  doi          = {10.1504/IJAACS.2023.10052877},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaacs/DengY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaacs/ZhaoCHQZ23,
  author       = {Yun Zhao and
                  Ziwen Cai and
                  Tao Huang and
                  Bin Qian and
                  Mi Zhou},
  title        = {Heuristic positioning method for intrusion nodes in sensor networks
                  based on quantum annealing algorithm},
  journal      = {Int. J. Auton. Adapt. Commun. Syst.},
  volume       = {16},
  number       = {5},
  pages        = {436--450},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJAACS.2023.134094},
  doi          = {10.1504/IJAACS.2023.134094},
  timestamp    = {Wed, 08 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijaacs/ZhaoCHQZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijccbs/GowthamiP23,
  author       = {G. Gowthami and
                  S. Silvia Priscila},
  title        = {Tuna swarm optimisation-based feature selection and deep multimodal-sequential-hierarchical
                  progressive network for network intrusion detection approach},
  journal      = {Int. J. Crit. Comput. Based Syst.},
  volume       = {10},
  number       = {4},
  pages        = {355--374},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJCCBS.2023.136338},
  doi          = {10.1504/IJCCBS.2023.136338},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijccbs/GowthamiP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcisys/AwotundeAPGBB23,
  author       = {Joseph Bamidele Awotunde and
                  Femi Emmanuel Ayo and
                  Ranjit Panigrahi and
                  Amik Garg and
                  Akash Kumar Bhoi and
                  Paolo Barsocchi},
  title        = {A Multi-level Random Forest Model-Based Intrusion Detection Using
                  Fuzzy Inference System for Internet of Things Networks},
  journal      = {Int. J. Comput. Intell. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {31},
  year         = {2023},
  url          = {https://doi.org/10.1007/s44196-023-00205-w},
  doi          = {10.1007/S44196-023-00205-W},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcisys/AwotundeAPGBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcisys/EssaGM23,
  author       = {Mohamed Saied Essa and
                  Shawkat K. Guirguis and
                  Magda M. Madbouly},
  title        = {A Comparative Study of Using Boosting-Based Machine Learning Algorithms
                  for IoT Network Intrusion Detection},
  journal      = {Int. J. Comput. Intell. Syst.},
  volume       = {16},
  number       = {1},
  pages        = {177},
  year         = {2023},
  url          = {https://doi.org/10.1007/s44196-023-00355-x},
  doi          = {10.1007/S44196-023-00355-X},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcisys/EssaGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/LiLW23,
  author       = {Qingfeng Li and
                  Bo Li and
                  Linzhi Wen},
  title        = {An Intrusion Detection Model Based on Feature Selection and Improved
                  One-Dimensional Convolutional Neural Network},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {2023},
  pages        = {1--12},
  year         = {2023},
  url          = {https://doi.org/10.1155/2023/1982173},
  doi          = {10.1155/2023/1982173},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/LiLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PatelMW23,
  author       = {N. D. Patel and
                  B. M. Mehtre and
                  Rajeev Wankar},
  title        = {Artificial neural network-based intrusion detection system using multi-objective
                  genetic algorithm},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {320--335},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132726},
  doi          = {10.1504/IJICS.2023.132726},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PatelMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijiei/SinghV23,
  author       = {C. Edwin Singh and
                  S. Maria Celestin Vigila},
  title        = {An investigation of machine learning-based intrusion detection system
                  in mobile ad hoc network},
  journal      = {Int. J. Intell. Eng. Informatics},
  volume       = {11},
  number       = {1},
  pages        = {54--70},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIEI.2023.130704},
  doi          = {10.1504/IJIEI.2023.130704},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijiei/SinghV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/ChitraSR23,
  author       = {N. Chitra and
                  Safinaz S. and
                  K. Bhanu Rekha},
  title        = {Divergence Based Feature Selection for Pattern Recognizing of the
                  Performance of Intrusion Detection in Mobile Communications Merged
                  with the Computer Communication Networks},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {17},
  number       = {4},
  pages        = {75--88},
  year         = {2023},
  url          = {https://doi.org/10.3991/ijim.v17i04.37733},
  doi          = {10.3991/IJIM.V17I04.37733},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/ChitraSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AliMDUMMM23,
  author       = {Muhammad Ali and
                  Mansoor{-}ul{-}haque and
                  Muhammad Hanif Durad and
                  Anila Usman and
                  Syed Muhammad Mohsin and
                  Hana Mujlid and
                  Carsten Maple},
  title        = {Effective network intrusion detection using stacking-based ensemble
                  approach},
  journal      = {Int. J. Inf. Sec.},
  volume       = {22},
  number       = {6},
  pages        = {1781--1798},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10207-023-00718-7},
  doi          = {10.1007/S10207-023-00718-7},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/AliMDUMMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MazumderKSIA23,
  author       = {Md. Mumtahin Habib Ullah Mazumder and
                  Md. Eusha Kadir and
                  Sadia Sharmin and
                  Md. Shariful Islam and
                  Muhammad Mahbub Alam},
  title        = {cFEM: a cluster based feature extraction method for network intrusion
                  detection},
  journal      = {Int. J. Inf. Sec.},
  volume       = {22},
  number       = {5},
  pages        = {1355--1369},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10207-023-00694-y},
  doi          = {10.1007/S10207-023-00694-Y},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MazumderKSIA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MohamedE23,
  author       = {Safa Mohamed and
                  Ridha Ejbali},
  title        = {Deep SARSA-based reinforcement learning approach for anomaly network
                  intrusion detection system},
  journal      = {Int. J. Inf. Sec.},
  volume       = {22},
  number       = {1},
  pages        = {235--247},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10207-022-00634-2},
  doi          = {10.1007/S10207-022-00634-2},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/MohamedE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitsa/FanY23,
  author       = {Xingliang Fan and
                  Ruimei Yang},
  title        = {A Network Intrusion Detection Method Based on Improved Bi-LSTM in
                  Internet of Things Environment},
  journal      = {Int. J. Inf. Technol. Syst. Approach},
  volume       = {16},
  number       = {3},
  pages        = {1--14},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijitsa.319737},
  doi          = {10.4018/IJITSA.319737},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitsa/FanY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/HeWSX23,
  author       = {Jiaxing He and
                  Xiaodan Wang and
                  Yafei Song and
                  Qian Xiang},
  title        = {A multiscale intrusion detection system based on pyramid depthwise
                  separable convolution neural network},
  journal      = {Neurocomputing},
  volume       = {530},
  pages        = {48--59},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.neucom.2023.01.072},
  doi          = {10.1016/J.NEUCOM.2023.01.072},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijon/HeWSX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsc/DeelipK23,
  author       = {Mali Shrikant Deelip and
                  Govinda Kannayaram},
  title        = {ExpSFROA-Based {DRN:} Exponential Sunflower Rider Optimization Algorithm-Driven
                  Deep Residual Network for the Intrusion Detection in IOT-Based Plant
                  Disease Monitoring},
  journal      = {Int. J. Semantic Comput.},
  volume       = {17},
  number       = {1},
  pages        = {5--31},
  year         = {2023},
  url          = {https://doi.org/10.1142/S1793351X22400165},
  doi          = {10.1142/S1793351X22400165},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsc/DeelipK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhangYSLG23,
  author       = {Hehui Zhang and
                  Yong Yang and
                  Xi Song and
                  Wenhui Li and
                  Shuqiang Guo},
  title        = {An abnormal intrusion detection method based on self-organising model},
  journal      = {Int. J. Secur. Networks},
  volume       = {18},
  number       = {2},
  pages        = {117--124},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJSN.2023.131598},
  doi          = {10.1504/IJSN.2023.131598},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhangYSLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/ThakkarL23,
  author       = {Ankit Thakkar and
                  Ritika Lohiya},
  title        = {Fusion of statistical importance for feature selection in Deep Neural
                  Network-based Intrusion Detection System},
  journal      = {Inf. Fusion},
  volume       = {90},
  pages        = {353--363},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.inffus.2022.09.026},
  doi          = {10.1016/J.INFFUS.2022.09.026},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/ThakkarL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/SongWHJ23,
  author       = {Jiaming Song and
                  Xiaojuan Wang and
                  Mingshu He and
                  Lei Jin},
  title        = {{CSK-CNN:} Network Intrusion Detection Model Based on Two-Layer Convolution
                  Neural Network for Handling Imbalanced Dataset},
  journal      = {Inf.},
  volume       = {14},
  number       = {2},
  pages        = {130},
  year         = {2023},
  url          = {https://doi.org/10.3390/info14020130},
  doi          = {10.3390/INFO14020130},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/information/SongWHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/GaberATAHL23,
  author       = {Tarek Gaber and
                  Joseph Bamidele Awotunde and
                  Mohamed Torky and
                  Sunday Adeola Ajagbe and
                  Mohammad Hammoudeh and
                  Wei Li},
  title        = {Metaverse-IDS: Deep learning-based intrusion detection system for
                  Metaverse-IoT networks},
  journal      = {Internet Things},
  volume       = {24},
  pages        = {100977},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100977},
  doi          = {10.1016/J.IOT.2023.100977},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iot/GaberATAHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GyamfiJ23,
  author       = {Eric Gyamfi and
                  Anca Delia Jurcut},
  title        = {Novel Online Network Intrusion Detection System for Industrial IoT
                  Based on {OI-SVDD} and {AS-ELM}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {5},
  pages        = {3827--3839},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3172393},
  doi          = {10.1109/JIOT.2022.3172393},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/GyamfiJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HeCTWL23,
  author       = {Xiaoqiang He and
                  Qianbin Chen and
                  Lun Tang and
                  Weili Wang and
                  Tong Liu},
  title        = {CGAN-Based Collaborative Intrusion Detection for {UAV} Networks: {A}
                  Blockchain-Empowered Distributed Federated Learning Approach},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {1},
  pages        = {120--132},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3200121},
  doi          = {10.1109/JIOT.2022.3200121},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/HeCTWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HeCTWLLLL23,
  author       = {Xiaoqiang He and
                  Qianbin Chen and
                  Lun Tang and
                  Weili Wang and
                  Tong Liu and
                  Li Li and
                  Qinghai Liu and
                  Jia Luo},
  title        = {Federated Continuous Learning Based on Stacked Broad Learning System
                  Assisted by Digital Twin Networks: An Incremental Learning Approach
                  for Intrusion Detection in {UAV} Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {22},
  pages        = {19825--19838},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3282648},
  doi          = {10.1109/JIOT.2023.3282648},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/HeCTWLLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ParkLKPKH23,
  author       = {Cheolhee Park and
                  Jonghoon Lee and
                  Youngsoo Kim and
                  Jong{-}Geun Park and
                  Hyunjin Kim and
                  Dowon Hong},
  title        = {An Enhanced AI-Based Network Intrusion Detection System Using Generative
                  Adversarial Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {3},
  pages        = {2330--2345},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3211346},
  doi          = {10.1109/JIOT.2022.3211346},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ParkLKPKH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShahriarXMLH23,
  author       = {Md Hasan Shahriar and
                  Yang Xiao and
                  Pablo Moriano and
                  Wenjing Lou and
                  Y. Thomas Hou},
  title        = {CANShield: Deep-Learning-Based Intrusion Detection Framework for Controller
                  Area Networks at the Signal Level},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {24},
  pages        = {22111--22127},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3303271},
  doi          = {10.1109/JIOT.2023.3303271},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ShahriarXMLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ThakkarL23,
  author       = {Ankit Thakkar and
                  Ritika Lohiya},
  title        = {Attack Classification of Imbalanced Intrusion Data for IoT Network
                  Using Ensemble-Learning-Based Deep Neural Network},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {13},
  pages        = {11888--11895},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3244810},
  doi          = {10.1109/JIOT.2023.3244810},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ThakkarL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/RaviPA23,
  author       = {Vinayakumar Ravi and
                  Tuan D. Pham and
                  Mamoun Alazab},
  title        = {Deep Learning-Based Network Intrusion Detection System for Internet
                  of Medical Things},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {6},
  number       = {2},
  pages        = {50--54},
  year         = {2023},
  url          = {https://doi.org/10.1109/IOTM.001.2300021},
  doi          = {10.1109/IOTM.001.2300021},
  timestamp    = {Sat, 17 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotm/RaviPA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/ViegasST23,
  author       = {Eduardo K. Viegas and
                  Altair O. Santin and
                  Pietro Tedeschi},
  title        = {Toward a Reliable Evaluation of Machine Learning Schemes for Network-Based
                  Intrusion Detection},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {6},
  number       = {2},
  pages        = {70--75},
  year         = {2023},
  url          = {https://doi.org/10.1109/IOTM.001.2300106},
  doi          = {10.1109/IOTM.001.2300106},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotm/ViegasST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DuyKHHP23,
  author       = {Phan The Duy and
                  Nghi Hoang Khoa and
                  Do Thi Thu Hien and
                  Hien Do Hoang and
                  Van{-}Hau Pham},
  title        = {Investigating on the robustness of flow-based intrusion detection
                  system against adversarial samples using Generative Adversarial Networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {74},
  pages        = {103472},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103472},
  doi          = {10.1016/J.JISA.2023.103472},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DuyKHHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itl/SuiL23,
  author       = {Qingru Sui and
                  Xiaoyan Liu},
  title        = {Edge computing and AIoT based network intrusion detection mechanism},
  journal      = {Internet Technol. Lett.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/itl2.324},
  doi          = {10.1002/ITL2.324},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itl/SuiL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/EssaG23,
  author       = {Mohamed Saied Essa and
                  Shawkat Kamal Guirguis},
  title        = {Evaluation of Tree-Based Machine Learning Algorithms for Network Intrusion
                  Detection in the Internet of Things},
  journal      = {{IT} Prof.},
  volume       = {25},
  number       = {5},
  pages        = {45--56},
  year         = {2023},
  url          = {https://doi.org/10.1109/MITP.2023.3303919},
  doi          = {10.1109/MITP.2023.3303919},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/EssaG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/AlsarhanAAA023,
  author       = {Ayoub Alsarhan and
                  Mohammad Alauthman and
                  Esra'a Alshdaifat and
                  Abdel{-}Rahman Al{-}Ghuwairi and
                  Ahmed Al{-}Dubai},
  title        = {Machine Learning-driven optimization for SVM-based intrusion detection
                  system in vehicular ad hoc networks},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {6113--6122},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-021-02963-x},
  doi          = {10.1007/S12652-021-02963-X},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/AlsarhanAAA023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/GhanbarzadehHG23,
  author       = {Reza Ghanbarzadeh and
                  Ali Hosseinalipour and
                  Ali Ghaffari},
  title        = {A novel network intrusion detection method based on metaheuristic
                  optimisation algorithms},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {7575--7592},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-023-04571-3},
  doi          = {10.1007/S12652-023-04571-3},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/GhanbarzadehHG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbd/RenZZSZ23,
  author       = {Kezhou Ren and
                  Yifan Zeng and
                  Yuanfu Zhong and
                  Biao Sheng and
                  Yingchao Zhang},
  title        = {{MAFSIDS:} a reinforcement learning-based intrusion detection model
                  for multi-agent feature selection networks},
  journal      = {J. Big Data},
  volume       = {10},
  number       = {1},
  pages        = {137},
  year         = {2023},
  url          = {https://doi.org/10.1186/s40537-023-00814-4},
  doi          = {10.1186/S40537-023-00814-4},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbd/RenZZSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbd/YinJXSZSK23,
  author       = {Yuhua Yin and
                  Julian Jang{-}Jaccard and
                  Wen Xu and
                  Amardeep Singh and
                  Jinting Zhu and
                  Fariza Sabrina and
                  Jin Kwak},
  title        = {{IGRF-RFE:} a hybrid feature selection method for MLP-based network
                  intrusion detection on {UNSW-NB15} dataset},
  journal      = {J. Big Data},
  volume       = {10},
  number       = {1},
  pages        = {15},
  year         = {2023},
  url          = {https://doi.org/10.1186/s40537-023-00694-8},
  doi          = {10.1186/S40537-023-00694-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbd/YinJXSZSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/DingWCL23,
  author       = {Defeng Ding and
                  Yehua Wei and
                  Can Cheng and
                  Jing Long},
  title        = {Intrusion Detection for In-Vehicle {CAN} Bus Based on Lightweight
                  Neural Network},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {32},
  number       = {7},
  pages        = {2350110:1--2350110:16},
  year         = {2023},
  url          = {https://doi.org/10.1142/S0218126623501104},
  doi          = {10.1142/S0218126623501104},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/DingWCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Zhang23a,
  author       = {Junlin Zhang},
  title        = {{WSN} Network Node Malicious Intrusion Detection Method Based on Reputation
                  Score},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {1},
  pages        = {55--76},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1213},
  doi          = {10.13052/JCSM2245-1439.1213},
  timestamp    = {Sat, 25 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Zhang23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdm/LakhotiaDSS23,
  author       = {Parul Lakhotia and
                  Rinky Dwivedi and
                  Deepak Kumar Sharma and
                  Nonita Sharma},
  title        = {Intrusion Detection System for IoE-Based Medical Networks},
  journal      = {J. Database Manag.},
  volume       = {34},
  number       = {2},
  pages        = {1--18},
  year         = {2023},
  url          = {https://doi.org/10.4018/jdm.321465},
  doi          = {10.4018/JDM.321465},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdm/LakhotiaDSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jece/X23ak,
  title        = {Retracted: Intrusion Detection-Data Security Protection Scheme Based
                  on Particle Swarm-BP Network Algorithm in Cloud Computing Environment},
  journal      = {J. Electr. Comput. Eng.},
  volume       = {2023},
  pages        = {9853289:1--9853289:1},
  year         = {2023},
  url          = {https://doi.org/10.1155/2023/9853289},
  doi          = {10.1155/2023/9853289},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jece/X23ak.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/SakthiK23,
  author       = {K. Sakthi and
                  P. Nirmal Kumar},
  title        = {A novel attention-based feature learning and optimal deep learning
                  approach for network intrusion detection},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {45},
  number       = {3},
  pages        = {5123--5140},
  year         = {2023},
  url          = {https://doi.org/10.3233/JIFS-231758},
  doi          = {10.3233/JIFS-231758},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/SakthiK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmm/AmaranMJ23,
  author       = {Sibi Amaran and
                  Ramalingam Madhan Mohan and
                  Rethnaraj Jebakumar},
  title        = {Optimal Machine Learning Based Intrusion Detection System in Wireless
                  Sensor Networks for Surveillance Applications},
  journal      = {J. Mobile Multimedia},
  volume       = {19},
  number       = {2},
  pages        = {437--450},
  year         = {2023},
  url          = {https://doi.org/10.13052/jmm1550-4646.1924},
  doi          = {10.13052/JMM1550-4646.1924},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmm/AmaranMJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KhanIIJK23,
  author       = {Murad{-}Ali Khan and
                  Naeem Iqbal and
                  Imran and
                  Harun Jamil and
                  Do{-}Hyeun Kim},
  title        = {An optimized ensemble prediction model using AutoML based on soft
                  voting classifier for network intrusion detection},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {212},
  pages        = {103560},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jnca.2022.103560},
  doi          = {10.1016/J.JNCA.2022.103560},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/KhanIIJK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/VoDN23,
  author       = {Hoang V. Vo and
                  Hanh Phuong Du and
                  Hoa Ngoc Nguyen},
  title        = {AI-powered intrusion detection in large-scale traffic networks based
                  on flow sensing strategy and parallel deep analysis},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {220},
  pages        = {103735},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jnca.2023.103735},
  doi          = {10.1016/J.JNCA.2023.103735},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/VoDN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YaoSZ23,
  author       = {Wei Yao and
                  Han Shi and
                  Hai Zhao},
  title        = {Scalable anomaly-based intrusion detection for secure Internet of
                  Things using generative adversarial networks in fog environment},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {214},
  pages        = {103622},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jnca.2023.103622},
  doi          = {10.1016/J.JNCA.2023.103622},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/YaoSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/AzarSMHE23,
  author       = {Ahmad Taher Azar and
                  Esraa Shehab and
                  Ahmed M. Mattar and
                  Ibrahim A. Hameed and
                  Shaimaa Ahmed El{-}Said},
  title        = {Deep Learning Based Hybrid Intrusion Detection Systems to Protect
                  Satellite Networks},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {31},
  number       = {4},
  pages        = {82},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10922-023-09767-8},
  doi          = {10.1007/S10922-023-09767-8},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnsm/AzarSMHE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/SarhanLMP23,
  author       = {Mohanad Sarhan and
                  Siamak Layeghy and
                  Nour Moustafa and
                  Marius Portmann},
  title        = {Cyber Threat Intelligence Sharing Scheme Based on Federated Learning
                  for Network Intrusion Detection},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {31},
  number       = {1},
  pages        = {3},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10922-022-09691-3},
  doi          = {10.1007/S10922-022-09691-3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnsm/SarhanLMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/Shiomoto23,
  author       = {Kohei Shiomoto},
  title        = {Network Intrusion Detection System Based on an Adversarial Auto-Encoder
                  with Few Labeled Training Samples},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {31},
  number       = {1},
  pages        = {5},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10922-022-09698-w},
  doi          = {10.1007/S10922-022-09698-W},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnsm/Shiomoto23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/AsgharzadehGMG23,
  author       = {Hossein Asgharzadeh and
                  Ali Ghaffari and
                  Mohammad Masdari and
                  Farhad Soleimanian Gharehchopogh},
  title        = {Anomaly-based intrusion detection system in the Internet of Things
                  using a convolutional neural network and multi-objective enhanced
                  Capuchin Search Algorithm},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {175},
  pages        = {1--21},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jpdc.2022.12.009},
  doi          = {10.1016/J.JPDC.2022.12.009},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/AsgharzadehGMG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrie/HosseiniS23,
  author       = {Soodeh Hosseini and
                  Saman Rafiee Sardo},
  title        = {Network intrusion detection based on deep learning method in internet
                  of thing},
  journal      = {J. Reliab. Intell. Environ.},
  volume       = {9},
  number       = {2},
  pages        = {147--159},
  year         = {2023},
  url          = {https://doi.org/10.1007/s40860-021-00169-8},
  doi          = {10.1007/S40860-021-00169-8},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrie/HosseiniS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/AwadF23,
  author       = {Mohammed Awad and
                  Salam Fraihat},
  title        = {Recursive Feature Elimination with Cross-Validation with Decision
                  Tree: Feature Selection Method for Machine Learning-Based Intrusion
                  Detection Systems},
  journal      = {J. Sens. Actuator Networks},
  volume       = {12},
  number       = {5},
  pages        = {67},
  year         = {2023},
  url          = {https://doi.org/10.3390/jsan12050067},
  doi          = {10.3390/JSAN12050067},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsan/AwadF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/ElsayedHHAE23,
  author       = {Rania A. Elsayed and
                  Reem Hamada and
                  Mohammad Hammoudeh and
                  Mahmoud I. Abdalla and
                  Shaimaa Ahmed Elsaid},
  title        = {A Hierarchical Deep Learning-Based Intrusion Detection Architecture
                  for Clustered Internet of Things},
  journal      = {J. Sens. Actuator Networks},
  volume       = {12},
  number       = {1},
  pages        = {3},
  year         = {2023},
  url          = {https://doi.org/10.3390/jsan12010003},
  doi          = {10.3390/JSAN12010003},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsan/ElsayedHHAE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/SawafiTH23,
  author       = {Yahya Al Sawafi and
                  Abderezak Touzene and
                  Rachid Hedjam},
  title        = {Hybrid Deep Learning-Based Intrusion Detection System for {RPL} IoT
                  Networks},
  journal      = {J. Sens. Actuator Networks},
  volume       = {12},
  number       = {2},
  pages        = {21},
  year         = {2023},
  url          = {https://doi.org/10.3390/jsan12020021},
  doi          = {10.3390/JSAN12020021},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsan/SawafiTH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/LayeghyBP23,
  author       = {Siamak Layeghy and
                  Mahsa Baktashmotlagh and
                  Marius Portmann},
  title        = {{DI-NIDS:} Domain invariant network intrusion detection system},
  journal      = {Knowl. Based Syst.},
  volume       = {273},
  pages        = {110626},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.knosys.2023.110626},
  doi          = {10.1016/J.KNOSYS.2023.110626},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/LayeghyBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/NguyenK23,
  author       = {Hoang Nguyen and
                  Rasha F. Kashef},
  title        = {{TS-IDS:} Traffic-aware self-supervised learning for IoT Network Intrusion
                  Detection},
  journal      = {Knowl. Based Syst.},
  volume       = {279},
  pages        = {110966},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.knosys.2023.110966},
  doi          = {10.1016/J.KNOSYS.2023.110966},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/NguyenK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/KilincerTES23,
  author       = {Ilhan Firat Kilincer and
                  Turker Tuncer and
                  Fatih Ertam and
                  Abdulkadir Seng{\"{u}}r},
  title        = {{SPA-IDS:} An intelligent intrusion detection system based on vertical
                  mode decomposition and iterative feature selection in computer networks},
  journal      = {Microprocess. Microsystems},
  volume       = {96},
  pages        = {104752},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.micpro.2022.104752},
  doi          = {10.1016/J.MICPRO.2022.104752},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/KilincerTES23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mdpinetwork/RashidKERSE23,
  author       = {Md. Mamunur Rashid and
                  Shahriar Usman Khan and
                  Fariha Eusufzai and
                  Md. Azharuddin Redwan and
                  Saifur Rahman Sabuj and
                  Mahmoud A. El{-}Sharief},
  title        = {A Federated Learning-Based Approach for Improving Intrusion Detection
                  in Industrial Internet of Things Networks},
  journal      = {Network},
  volume       = {3},
  number       = {1},
  pages        = {158--179},
  year         = {2023},
  url          = {https://doi.org/10.3390/network3010008},
  doi          = {10.3390/NETWORK3010008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mdpinetwork/RashidKERSE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/MuhammadMSK23,
  author       = {Ali Muhammad and
                  Iqbal Murtza and
                  Ayesha Saadia and
                  Kashif Kifayat},
  title        = {Cortex-inspired ensemble based network intrusion detection system},
  journal      = {Neural Comput. Appl.},
  volume       = {35},
  number       = {21},
  pages        = {15415--15428},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00521-023-08561-6},
  doi          = {10.1007/S00521-023-08561-6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/MuhammadMSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/SivamohanS23,
  author       = {Sivanandam Sivamohan and
                  S. S. Sridhar},
  title        = {An optimized model for network intrusion detection systems in industry
                  4.0 using {XAI} based Bi-LSTM framework},
  journal      = {Neural Comput. Appl.},
  volume       = {35},
  number       = {15},
  pages        = {11459--11475},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00521-023-08319-0},
  doi          = {10.1007/S00521-023-08319-0},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/SivamohanS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/SoleymanzadehK23,
  author       = {Raha Soleymanzadeh and
                  Rasha F. Kashef},
  title        = {Efficient intrusion detection using multi-player generative adversarial
                  networks (GANs): an ensemble-based deep learning architecture},
  journal      = {Neural Comput. Appl.},
  volume       = {35},
  number       = {17},
  pages        = {12545--12563},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00521-023-08398-z},
  doi          = {10.1007/S00521-023-08398-Z},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/SoleymanzadehK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/WangLCWZ23,
  author       = {Yuhang Wang and
                  Yingxu Lai and
                  Ye Chen and
                  Jingwen Wei and
                  Zhaoyi Zhang},
  title        = {Transfer learning-based self-learning intrusion detection system for
                  in-vehicle networks},
  journal      = {Neural Comput. Appl.},
  volume       = {35},
  number       = {14},
  pages        = {10257--10273},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00521-023-08233-5},
  doi          = {10.1007/S00521-023-08233-5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/WangLCWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/ZavrakI23,
  author       = {Sultan Zavrak and
                  Murat Iskefiyeli},
  title        = {Flow-based intrusion detection on software-defined networks: a multivariate
                  time series anomaly detection approach},
  journal      = {Neural Comput. Appl.},
  volume       = {35},
  number       = {16},
  pages        = {12175--12193},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00521-023-08376-5},
  doi          = {10.1007/S00521-023-08376-5},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/ZavrakI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/ZavrakI23a,
  author       = {Sultan Zavrak and
                  Murat Iskefiyeli},
  title        = {Correction: Flow-based intrusion detection on software-defined networks:
                  a multivariate time series anomaly detection approach},
  journal      = {Neural Comput. Appl.},
  volume       = {35},
  number       = {24},
  pages        = {18091},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00521-023-08711-w},
  doi          = {10.1007/S00521-023-08711-W},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/ZavrakI23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npl/KarthicK23,
  author       = {S. Karthic and
                  S. Manoj Kumar},
  title        = {Hybrid Optimized Deep Neural Network with Enhanced Conditional Random
                  Field Based Intrusion Detection on Wireless Sensor Network},
  journal      = {Neural Process. Lett.},
  volume       = {55},
  number       = {1},
  pages        = {459--479},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11063-022-10892-9},
  doi          = {10.1007/S11063-022-10892-9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/npl/KarthicK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/patterns/HoussiauSRSM23,
  author       = {Florimond Houssiau and
                  Piotr Sapiezynski and
                  Laura Radaelli and
                  Erez Shmueli and
                  Yves{-}Alexandre de Montjoye},
  title        = {Detrimental network effects in privacy: {A} graph-theoretic model
                  for node-based intrusions},
  journal      = {Patterns},
  volume       = {4},
  number       = {1},
  pages        = {100662},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.patter.2022.100662},
  doi          = {10.1016/J.PATTER.2022.100662},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/patterns/HoussiauSRSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/LuoWZJLL23,
  author       = {Feng Luo and
                  Jiajia Wang and
                  Xuan Zhang and
                  Yifan Jiang and
                  Zhihao Li and
                  Cheng Luo},
  title        = {In-vehicle network intrusion detection systems: a systematic survey
                  of deep learning-based approaches},
  journal      = {PeerJ Comput. Sci.},
  volume       = {9},
  pages        = {e1648},
  year         = {2023},
  url          = {https://doi.org/10.7717/peerj-cs.1648},
  doi          = {10.7717/PEERJ-CS.1648},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/LuoWZJLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/ZhaoRWHC23,
  author       = {Guosheng Zhao and
                  Cai Ren and
                  Jian Wang and
                  Yuyan Huang and
                  Huan Chen},
  title        = {IoT intrusion detection model based on gated recurrent unit and residual
                  network},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {16},
  number       = {4},
  pages        = {1887--1899},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12083-023-01510-z},
  doi          = {10.1007/S12083-023-01510-Z},
  timestamp    = {Mon, 24 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/ZhaoRWHC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/JothiP23,
  author       = {B. Jothi and
                  M. Pushpalatha},
  title        = {{WILS-TRS} - a novel optimized deep learning based intrusion detection
                  framework for IoT networks},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {27},
  number       = {3},
  pages        = {1285--1301},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00779-021-01578-5},
  doi          = {10.1007/S00779-021-01578-5},
  timestamp    = {Fri, 16 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/JothiP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/WangLZHZWH23,
  author       = {Yalu Wang and
                  Jie Li and
                  Wei Zhao and
                  Zhijie Han and
                  Hang Zhao and
                  Lei Wang and
                  Xin He},
  title        = {{N-STGAT:} Spatio-Temporal Graph Neural Network Based Network Intrusion
                  Detection for Near-Earth Remote Sensing},
  journal      = {Remote. Sens.},
  volume       = {15},
  number       = {14},
  pages        = {3611},
  year         = {2023},
  url          = {https://doi.org/10.3390/rs15143611},
  doi          = {10.3390/RS15143611},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/WangLZHZWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saem/SharmaSS23,
  author       = {Hanjabam Saratchandra Sharma and
                  Arindam Sarkar and
                  Moirangthem Marjit Singh},
  title        = {An efficient deep learning-based solution for network intrusion detection
                  in wireless sensor network},
  journal      = {Int. J. Syst. Assur. Eng. Manag.},
  volume       = {14},
  number       = {6},
  pages        = {2423--2446},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13198-023-02090-0},
  doi          = {10.1007/S13198-023-02090-0},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saem/SharmaSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ZhangZ23,
  author       = {Jinfeng Zhang and
                  Dongdong Zhang},
  title        = {Internet of things network intrusion detection model based on quantum
                  artificial fish group and fuzzy kernel clustering algorithm},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.220},
  doi          = {10.1002/SPY2.220},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ZhangZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AbosataAI23,
  author       = {Nasr Abosata and
                  Saba Al{-}Rubaye and
                  G{\"{o}}khan Inalhan},
  title        = {Customised Intrusion Detection for an Industrial IoT Heterogeneous
                  Network Based on Machine Learning Algorithms Called {FTL-CID}},
  journal      = {Sensors},
  volume       = {23},
  number       = {1},
  pages        = {321},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23010321},
  doi          = {10.3390/S23010321},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AbosataAI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AbualiNA23,
  author       = {Khadija M. Abuali and
                  Liyth Nissirat and
                  Aida Al{-}Samawi},
  title        = {Advancing Network Security with {AI:} SVM-Based Deep Learning for
                  Intrusion Detection},
  journal      = {Sensors},
  volume       = {23},
  number       = {21},
  pages        = {8959},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23218959},
  doi          = {10.3390/S23218959},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AbualiNA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AlHaddadBKEJ23,
  author       = {Ulaa AlHaddad and
                  Abdullah Basuhail and
                  Maher Khemakhem and
                  Fathy Elbouraey Eassa and
                  Kamal Mansur Jambi},
  title        = {Ensemble Model Based on Hybrid Deep Learning for Intrusion Detection
                  in Smart Grid Networks},
  journal      = {Sensors},
  volume       = {23},
  number       = {17},
  pages        = {7464},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23177464},
  doi          = {10.3390/S23177464},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AlHaddadBKEJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AlabsiAR23,
  author       = {Basim Ahmad Alabsi and
                  Mohammed Anbar and
                  Shaza Dawood Ahmed Rihan},
  title        = {Conditional Tabular Generative Adversarial Based Intrusion Detection
                  System for Detecting Ddos and Dos Attacks on the Internet of Things
                  Networks},
  journal      = {Sensors},
  volume       = {23},
  number       = {12},
  pages        = {5644},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23125644},
  doi          = {10.3390/S23125644},
  timestamp    = {Thu, 13 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AlabsiAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AldhaheriA23,
  author       = {Sahar Aldhaheri and
                  Abeer Alhuzali},
  title        = {{SGAN-IDS:} Self-Attention-Based Generative Adversarial Network against
                  Intrusion Detection Systems},
  journal      = {Sensors},
  volume       = {23},
  number       = {18},
  pages        = {7796},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23187796},
  doi          = {10.3390/S23187796},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AldhaheriA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AljebreenASMDAD23,
  author       = {Mohammed Aljebreen and
                  Manal Abdullah Alohali and
                  Muhammad Kashif Saeed and
                  Heba Mohsen and
                  Mesfer Al Duhayyim and
                  Amgad Atta Abdelmageed and
                  Suhanda Drar and
                  Sitelbanat Abdelbagi},
  title        = {Binary Chimp Optimization Algorithm with {ML} Based Intrusion Detection
                  for Secure IoT-Assisted Wireless Sensor Networks},
  journal      = {Sensors},
  volume       = {23},
  number       = {8},
  pages        = {4073},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23084073},
  doi          = {10.3390/S23084073},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AljebreenASMDAD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GouZZ23,
  author       = {Wanting Gou and
                  Haodi Zhang and
                  Ronghui Zhang},
  title        = {Multi-Classification and Tree-Based Ensemble Network for the Intrusion
                  Detection System in the Internet of Vehicles},
  journal      = {Sensors},
  volume       = {23},
  number       = {21},
  pages        = {8788},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23218788},
  doi          = {10.3390/S23218788},
  timestamp    = {Sat, 20 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/GouZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KhanLK23,
  author       = {Junaid Khan and
                  Dae{-}Woon Lim and
                  Young{-}Sik Kim},
  title        = {Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the
                  Statistical Characteristics of Attacks},
  journal      = {Sensors},
  volume       = {23},
  number       = {7},
  pages        = {3554},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23073554},
  doi          = {10.3390/S23073554},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KhanLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/Luo0ZWWW23,
  author       = {Feng Luo and
                  Zhenyu Yang and
                  Zhaojing Zhang and
                  Zitong Wang and
                  Bowen Wang and
                  Mingzhi Wu},
  title        = {A Multi-Layer Intrusion Detection System for SOME/IP-Based In-Vehicle
                  Network},
  journal      = {Sensors},
  volume       = {23},
  number       = {9},
  pages        = {4376},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23094376},
  doi          = {10.3390/S23094376},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/Luo0ZWWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/MaGH23,
  author       = {Wei Ma and
                  Chao Gou and
                  Yunyun Hou},
  title        = {Research on Adaptive 1DCNN Network Intrusion Detection Technology
                  Based on {BSGM} Mixed Sampling},
  journal      = {Sensors},
  volume       = {23},
  number       = {13},
  pages        = {6206},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23136206},
  doi          = {10.3390/S23136206},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/MaGH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/RaoB23,
  author       = {Yamarthi Narasimha Rao and
                  Kunda Suresh Babu},
  title        = {An Imbalanced Generative Adversarial Network-Based Approach for Network
                  Intrusion Detection in an Imbalanced Dataset},
  journal      = {Sensors},
  volume       = {23},
  number       = {1},
  pages        = {550},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23010550},
  doi          = {10.3390/S23010550},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/RaoB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SalmanTHMMK23,
  author       = {Emad Hmood Salman and
                  Montadar Abas Taher and
                  Yousif I. Hammadi and
                  Omar Abdulkareem Mahmood and
                  Ammar Muthanna and
                  Andrey Koucheryavy},
  title        = {An Anomaly Intrusion Detection for High-Density Internet of Things
                  Wireless Communication Network Based Deep Learning Algorithms},
  journal      = {Sensors},
  volume       = {23},
  number       = {1},
  pages        = {206},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23010206},
  doi          = {10.3390/S23010206},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/SalmanTHMMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/TangLLBYY23,
  author       = {Bin Tang and
                  Yan Lu and
                  Qi Li and
                  Yueying Bai and
                  Jie Yu and
                  Xu Yu},
  title        = {A Diffusion Model Based on Network Intrusion Detection Method for
                  Industrial Cyber-Physical Systems},
  journal      = {Sensors},
  volume       = {23},
  number       = {3},
  pages        = {1141},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23031141},
  doi          = {10.3390/S23031141},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/TangLLBYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WangHCT23,
  author       = {Yung{-}Chung Wang and
                  Yi{-}Chun Houng and
                  Han{-}Xuan Chen and
                  Shu{-}Ming Tseng},
  title        = {Network Anomaly Intrusion Detection Based on Deep Learning Approach},
  journal      = {Sensors},
  volume       = {23},
  number       = {4},
  pages        = {2171},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23042171},
  doi          = {10.3390/S23042171},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/WangHCT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZhangZWZ23,
  author       = {Rui Zhang and
                  Jing Zhang and
                  Qiqi Wang and
                  Hehe Zhang},
  title        = {{DOIDS:} An Intrusion Detection Scheme Based on {DBSCAN} for Opportunistic
                  Routing in Underwater Wireless Sensor Networks},
  journal      = {Sensors},
  volume       = {23},
  number       = {4},
  pages        = {2096},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23042096},
  doi          = {10.3390/S23042096},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ZhangZWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/DeoreB23,
  author       = {Bhushan Deore and
                  Surendra Bhosale},
  title        = {Adaptive Dolphin Atom Search Optimization-Based {DRNN} for Network
                  Intrusion Detection System},
  journal      = {{SN} Comput. Sci.},
  volume       = {4},
  number       = {5},
  pages        = {578},
  year         = {2023},
  url          = {https://doi.org/10.1007/s42979-023-02006-6},
  doi          = {10.1007/S42979-023-02006-6},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/DeoreB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/PatelVS23,
  author       = {Bimal Patel and
                  Jalpesh Vasa and
                  Parth Shah},
  title        = {Forwarding Neighbor Based Sink Reputed Trust Based Intrusion Detection
                  System to Mitigate Selective Forwarding Attack in {RPL} for IoT Networks},
  journal      = {{SN} Comput. Sci.},
  volume       = {4},
  number       = {4},
  pages        = {420},
  year         = {2023},
  url          = {https://doi.org/10.1007/s42979-023-01841-x},
  doi          = {10.1007/S42979-023-01841-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/PatelVS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/MeddebJTK23,
  author       = {Rahma Meddeb and
                  Farah Jemili and
                  Bayrem Triki and
                  Ouajdi Korbaa},
  title        = {A deep learning-based intrusion detection approach for mobile Ad-hoc
                  network},
  journal      = {Soft Comput.},
  volume       = {27},
  number       = {14},
  pages        = {9425--9439},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00500-023-08324-4},
  doi          = {10.1007/S00500-023-08324-4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/MeddebJTK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/WangG23a,
  author       = {Shaorong Wang and
                  Long Guiling},
  title        = {Research on campus network security protection system framework based
                  on cloud data and intrusion detection algorithm},
  journal      = {Soft Comput.},
  volume       = {27},
  number       = {10},
  pages        = {6835--6844},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00500-023-08115-x},
  doi          = {10.1007/S00500-023-08115-X},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/WangG23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ChuaS23,
  author       = {Tuan{-}Hong Chua and
                  Iftekhar Salam},
  title        = {Evaluation of Machine Learning Algorithms in Network-Based Intrusion
                  Detection Using Progressive Dataset},
  journal      = {Symmetry},
  volume       = {15},
  number       = {6},
  pages        = {1251},
  year         = {2023},
  url          = {https://doi.org/10.3390/sym15061251},
  doi          = {10.3390/SYM15061251},
  timestamp    = {Thu, 13 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/ChuaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/systems/PerumalSANQ23,
  author       = {Ganeshkumar Perumal and
                  Gopalakrishnan Subburayalu and
                  Qaisar Abbas and
                  Syed Muhammad Naqi and
                  Imran Qureshi},
  title        = {VBQ-Net: {A} Novel Vectorization-Based Boost Quantized Network Model
                  for Maximizing the Security Level of IoT System to Prevent Intrusions},
  journal      = {Syst.},
  volume       = {11},
  number       = {8},
  pages        = {436},
  year         = {2023},
  url          = {https://doi.org/10.3390/systems11080436},
  doi          = {10.3390/SYSTEMS11080436},
  timestamp    = {Thu, 01 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/systems/PerumalSANQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WeiCX23,
  author       = {Yehua Wei and
                  Can Cheng and
                  Guoqi Xie},
  title        = {{OFIDS} : Online Learning-Enabled and Fingerprint-Based Intrusion
                  Detection System in Controller Area Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {6},
  pages        = {4607--4620},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3230501},
  doi          = {10.1109/TDSC.2022.3230501},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WeiCX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenZLFX23,
  author       = {Jiahui Chen and
                  Yi Zhao and
                  Qi Li and
                  Xuewei Feng and
                  Ke Xu},
  title        = {FedDef: Defense Against Gradient Leakage in Federated Learning-Based
                  Network Intrusion Detection Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {4561--4576},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3297369},
  doi          = {10.1109/TIFS.2023.3297369},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenZLFX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/YuLXLLY23,
  author       = {Zhangwei Yu and
                  Yan Liu and
                  Guoqi Xie and
                  Renfa Li and
                  Siming Liu and
                  Laurence T. Yang},
  title        = {{TCE-IDS:} Time Interval Conditional Entropy- Based Intrusion Detection
                  System for Automotive Controller Area Networks},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {19},
  number       = {2},
  pages        = {1185--1195},
  year         = {2023},
  url          = {https://doi.org/10.1109/TII.2022.3202539},
  doi          = {10.1109/TII.2022.3202539},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/YuLXLLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/ChouguleKCY23,
  author       = {Amit Chougule and
                  Varun Kohli and
                  Vinay Chamola and
                  Fei Richard Yu},
  title        = {Multibranch Reconstruction Error (MbRE) Intrusion Detection Architecture
                  for Intelligent Edge-Based Policing in Vehicular Ad-Hoc Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {11},
  pages        = {13068--13077},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2022.3201548},
  doi          = {10.1109/TITS.2022.3201548},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/ChouguleKCY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WangXCSW23,
  author       = {Zhongru Wang and
                  Xinzhou Xie and
                  Lei Chen and
                  Shouyou Song and
                  Zhongjie Wang},
  title        = {Intrusion Detection and Network Information Security Based on Deep
                  Learning Algorithm in Urban Rail Transit Management System},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {2135--2143},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2021.3127681},
  doi          = {10.1109/TITS.2021.3127681},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/WangXCSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WangZSW23,
  author       = {Kai Wang and
                  Aiheng Zhang and
                  Haoran Sun and
                  Bailing Wang},
  title        = {Analysis of Recent Deep-Learning-Based Intrusion Detection Methods
                  for In-Vehicle Network},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {1843--1854},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2022.3222486},
  doi          = {10.1109/TITS.2022.3222486},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/WangZSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/ZhangGWTC23,
  author       = {Jiangjiang Zhang and
                  Bei Gong and
                  Muhammad Waqas and
                  Shanshan Tu and
                  Sheng Chen},
  title        = {Many-Objective Optimization Based Intrusion Detection for in-Vehicle
                  Network Security},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {12},
  pages        = {15051--15065},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2023.3296002},
  doi          = {10.1109/TITS.2023.3296002},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/ZhangGWTC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/LiZLL23,
  author       = {Jieling Li and
                  Hao Zhang and
                  Zhihuang Liu and
                  Yanhua Liu},
  title        = {Network intrusion detection via tri-broad learning system based on
                  spatial-temporal granularity},
  journal      = {J. Supercomput.},
  volume       = {79},
  number       = {8},
  pages        = {9180--9205},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11227-022-05025-x},
  doi          = {10.1007/S11227-022-05025-X},
  timestamp    = {Fri, 21 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/LiZLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/YanZZSHY23,
  author       = {Fengru Yan and
                  Guanghua Zhang and
                  Dongwen Zhang and
                  Xinghua Sun and
                  Botao Hou and
                  Naiwen Yu},
  title        = {{TL-CNN-IDS:} transfer learning-based intrusion detection system using
                  convolutional neural network},
  journal      = {J. Supercomput.},
  volume       = {79},
  number       = {15},
  pages        = {17562--17584},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11227-023-05347-4},
  doi          = {10.1007/S11227-023-05347-4},
  timestamp    = {Sun, 10 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/YanZZSHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/ZhangYHL23,
  author       = {Yichi Zhang and
                  Chunhua Yang and
                  Keke Huang and
                  Yonggang Li},
  title        = {Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed
                  Graph Neural Networks},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {5},
  pages        = {2894--2905},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3184975},
  doi          = {10.1109/TNSE.2022.3184975},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/ZhangYHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/AraujoFilhoNKFZ23,
  author       = {Paulo Freitas de Araujo{-}Filho and
                  Mohamed Naili and
                  Georges Kaddoum and
                  Emmanuel Thepie Fapi and
                  Zhongwen Zhu},
  title        = {Unsupervised GAN-Based Intrusion Detection System Using Temporal Convolutional
                  Networks and Self-Attention},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {4},
  pages        = {4951--4963},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2023.3260039},
  doi          = {10.1109/TNSM.2023.3260039},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/AraujoFilhoNKFZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/DengZPZLX23,
  author       = {Xiaoheng Deng and
                  Jincai Zhu and
                  Xinjun Pei and
                  Lan Zhang and
                  Zhen Ling and
                  Kaiping Xue},
  title        = {Flow Topology-Based Graph Convolutional Network for Intrusion Detection
                  in Label-Limited IoT Networks},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {1},
  pages        = {684--696},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2022.3213807},
  doi          = {10.1109/TNSM.2022.3213807},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/DengZPZLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/TuWBYA23,
  author       = {Shanshan Tu and
                  Muhammad Waqas and
                  Akhtar Badshah and
                  Mingxi Yin and
                  Ghulam Abbas},
  title        = {Network Intrusion Detection System {(NIDS)} Based on Pseudo-Siamese
                  Stacked Autoencoders in Fog Computing},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {6},
  pages        = {4317--4327},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2023.3319953},
  doi          = {10.1109/TSC.2023.3319953},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/TuWBYA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/ShamsRU23,
  author       = {Erfan A. Shams and
                  Ahmet Rizaner and
                  Ali Hakan Ulusoy},
  title        = {Flow-based intrusion detection system in Vehicular Ad hoc Network
                  using context-aware feature extraction},
  journal      = {Veh. Commun.},
  volume       = {41},
  pages        = {100585},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.vehcom.2023.100585},
  doi          = {10.1016/J.VEHCOM.2023.100585},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/ShamsRU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/MaLG23,
  author       = {Xiaoxue Ma and
                  Yun Li and
                  Yan Gao},
  title        = {Decision model of intrusion response based on markov game in fog computing
                  environment},
  journal      = {Wirel. Networks},
  volume       = {29},
  number       = {8},
  pages        = {3383--3392},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11276-023-03382-w},
  doi          = {10.1007/S11276-023-03382-W},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/MaLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ShailajaSTGBP23,
  author       = {K. Shailaja and
                  B. Srinivasulu and
                  Lingala Thirupathi and
                  Rekha Gangula and
                  Thejoramnaresh Reddy Boya and
                  Vemulamma Polem},
  title        = {An Intelligent Deep Feature Based Intrusion Detection System for Network
                  Applications},
  journal      = {Wirel. Pers. Commun.},
  volume       = {129},
  number       = {1},
  pages        = {345--370},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-022-10100-w},
  doi          = {10.1007/S11277-022-10100-W},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/ShailajaSTGBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Wang0LLG23,
  author       = {Yiwen Wang and
                  Lei Xu and
                  Wanli Liu and
                  Rongzhen Li and
                  Junjie Gu},
  title        = {Network Intrusion Detection Based on Explainable Artificial Intelligence},
  journal      = {Wirel. Pers. Commun.},
  volume       = {131},
  number       = {2},
  pages        = {1115--1130},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-023-10472-7},
  doi          = {10.1007/S11277-023-10472-7},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/Wang0LLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FrijiOS23,
  author       = {Hamdi Friji and
                  Alexis Olivereau and
                  Mireille Sarkiss},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {Efficient Network Representation for GNN-Based Intrusion Detection},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13905},
  pages        = {532--554},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33488-7\_20},
  doi          = {10.1007/978-3-031-33488-7\_20},
  timestamp    = {Fri, 02 Jun 2023 14:41:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FrijiOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acr/RaisKNK23,
  author       = {Rao Naveed Bin Rais and
                  Osman Khalid and
                  Jazib{-}e Nazar and
                  Muhammad Usman Shahid Khan},
  editor       = {Kevin Daimi and
                  Abeer Alsadoon},
  title        = {Analysis of Intrusion Detection Using Ensemble Stacking-Based Machine
                  Learning Techniques in IoT Networks},
  booktitle    = {Proceedings of the 2023 International Conference on Advances in Computing
                  Research (ACR'23), Orlando, FL, USA, 8-10 May 2023},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {700},
  pages        = {329--344},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33743-7\_27},
  doi          = {10.1007/978-3-031-33743-7\_27},
  timestamp    = {Mon, 21 Aug 2023 08:35:10 +0200},
  biburl       = {https://dblp.org/rec/conf/acr/RaisKNK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/AlalmaieNH23,
  author       = {Abeer Z. Alalmaie and
                  Priyadarsi Nanda and
                  Xiangjian He},
  title        = {Zero Trust Network Intrusion Detection System {(NIDS)} using Auto
                  Encoder for Attention-based CNN-BiLSTM},
  booktitle    = {Proceedings of the 2023 Australasian Computer Science Week, {ACSW}
                  2023, Melbourne, VIC, Australia, 30 January 2023- 3 February 2023},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579375.3579376},
  doi          = {10.1145/3579375.3579376},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/AlalmaieNH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adma/LiuCQ23,
  author       = {Wanxiao Liu and
                  Jue Chen and
                  Xihe Qiu},
  editor       = {Xiaochun Yang and
                  Heru Suhartanto and
                  Guoren Wang and
                  Bin Wang and
                  Jing Jiang and
                  Bing Li and
                  Huaijie Zhu and
                  Ningning Cui},
  title        = {{CRNN-SA:} {A} Network Intrusion Detection Method Based on Deep Learning},
  booktitle    = {Advanced Data Mining and Applications - 19th International Conference,
                  {ADMA} 2023, Shenyang, China, August 21-23, 2023, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14177},
  pages        = {471--485},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-46664-9\_32},
  doi          = {10.1007/978-3-031-46664-9\_32},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/adma/LiuCQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/BahlaliB23,
  author       = {Ahmed Ramzi Bahlali and
                  Abdelmalik Bachir},
  editor       = {Leonard Barolli},
  title        = {Machine Learning Anomaly-Based Network Intrusion Detection: Experimental
                  Evaluation},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 37th International Conference on Advanced Information Networking
                  and Applications (AINA-2023), Juiz de Fora, Brazil, 29-31 March 2023,
                  Volume 2},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {654},
  pages        = {392--403},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-28451-9\_34},
  doi          = {10.1007/978-3-031-28451-9\_34},
  timestamp    = {Thu, 16 Mar 2023 10:11:29 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/BahlaliB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SoulaMMP23,
  author       = {Meriem Soula and
                  Bacem Mbarek and
                  Aref Meddeb and
                  Tom{\'{a}}s Pitner},
  editor       = {Leonard Barolli},
  title        = {A Survey of Intrusion Detection-Based Trust Management Approaches
                  in IoT Networks},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 37th International Conference on Advanced Information Networking
                  and Applications (AINA-2023), Juiz de Fora, Brazil, 29-31 March 2023,
                  Volume 3},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {655},
  pages        = {504--517},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-28694-0\_48},
  doi          = {10.1007/978-3-031-28694-0\_48},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/SoulaMMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ViegasMOS23,
  author       = {Eduardo K. Viegas and
                  Everton de Matos and
                  Paulo R. de Oliveira and
                  Altair O. Santin},
  editor       = {Leonard Barolli},
  title        = {A Dynamic Machine Learning Scheme for Reliable Network-Based Intrusion
                  Detection},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 37th International Conference on Advanced Information Networking
                  and Applications (AINA-2023), Juiz de Fora, Brazil, 29-31 March 2023,
                  Volume 2},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {654},
  pages        = {439--451},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-28451-9\_39},
  doi          = {10.1007/978-3-031-28451-9\_39},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/ViegasMOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisp/GongJJZ23,
  author       = {Zhongyuan Gong and
                  Jinyun Jiang and
                  Nan Jiang and
                  Yuejin Zhang},
  editor       = {Jaideep Vaidya and
                  Moncef Gabbouj and
                  Jin Li},
  title        = {An Improved Hybrid Sampling Model for Network Intrusion Detection
                  Based on Data Imbalance},
  booktitle    = {Artificial Intelligence Security and Privacy - First International
                  Conference on Artificial Intelligence Security and Privacy, AIS{\&}P
                  2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14510},
  pages        = {164--175},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9788-6\_14},
  doi          = {10.1007/978-981-99-9788-6\_14},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aisp/GongJJZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ant/AssyMEM23,
  author       = {Ahmed Tamer Assy and
                  Yahia Mostafa and
                  Ahmed Abd El{-}Khaleq and
                  Maggie Mashaly},
  editor       = {Elhadi M. Shakshuki and
                  Ansar{-}Ul{-}Haque Yasar},
  title        = {Anomaly-Based Intrusion Detection System using One-Dimensional Convolutional
                  Neural Network},
  booktitle    = {The 14th International Conference on Ambient Systems, Networks and
                  Technologies {(ANT} 2023) / The 6th International Conference on Emerging
                  Data and Industry 4.0 {(EDI40} 2023) / Affiliated Workshops, March
                  15-17, 2023, Leuven, Belgium},
  series       = {Procedia Computer Science},
  volume       = {220},
  pages        = {78--85},
  publisher    = {Elsevier},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.procs.2023.03.013},
  doi          = {10.1016/J.PROCS.2023.03.013},
  timestamp    = {Tue, 12 Sep 2023 15:26:58 +0200},
  biburl       = {https://dblp.org/rec/conf/ant/AssyMEM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apit/Wang23,
  author       = {Wenxi Wang},
  title        = {An Improved {ELM} Wireless Sensor Network Intrusion Detection Model
                  Based on an Optimization Algorithm},
  booktitle    = {Proceedings of the 2023 5th Asia Pacific Information Technology Conference,
                  {APIT} 2023, Ho Chi Minh City, Vietnam, February 9-11, 2023},
  pages        = {95--102},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3588155.3588170},
  doi          = {10.1145/3588155.3588170},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apit/Wang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apnoms/LeeKC23,
  author       = {Beom{-}Su Lee and
                  Jong{-}Wouk Kim and
                  Mi{-}Jung Choi},
  title        = {Federated Learning Based Network Intrusion Detection Model},
  booktitle    = {24st Asia-Pacific Network Operations and Management Symposium, {APNOMS}
                  2023, Sejong, Korea, Republic of, September 6-8, 2023},
  pages        = {330--333},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://ieeexplore.ieee.org/document/10258140},
  timestamp    = {Mon, 02 Oct 2023 20:30:43 +0200},
  biburl       = {https://dblp.org/rec/conf/apnoms/LeeKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcd/PengLLL23,
  author       = {Tzu{-}En Peng and
                  I{-}Hsien Liu and
                  Jung{-}Shian Li and
                  Chuan{-}Kang Liu},
  title        = {Network Intrusion Detection Using CNN-based Classification Method},
  booktitle    = {8th {IEEE/ACIS} International Conference on Big Data, Cloud Computing,
                  and Data Science, {BCD} 2023, Hochimin City, Vietnam, December 14-16,
                  2023},
  pages        = {361--364},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BCD57833.2023.10466285},
  doi          = {10.1109/BCD57833.2023.10466285},
  timestamp    = {Tue, 02 Apr 2024 21:06:06 +0200},
  biburl       = {https://dblp.org/rec/conf/bcd/PengLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdcloud/GaoHLDZ23,
  author       = {Kai Gao and
                  Hao Huang and
                  Linhong Liu and
                  Ronghua Du and
                  Jinlai Zhang},
  title        = {A Multi-attention Based CNN-BiLSTM Intrusion Detection Model for In-vehicle
                  Networks},
  booktitle    = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with
                  Applications, Big Data {\&} Cloud Computing, Sustainable Computing
                  {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom,
                  2023, Wuhan, China, December 21-24, 2023},
  pages        = {809--816},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00138},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM59178.2023.00138},
  timestamp    = {Thu, 18 Apr 2024 16:12:26 +0200},
  biburl       = {https://dblp.org/rec/conf/bdcloud/GaoHLDZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdcloud/LongLC0023,
  author       = {Jing Long and
                  Cuiting Luo and
                  Ruxin Chen and
                  Wei Liang and
                  Zheng Qin},
  title        = {Adaboost-based Graph Convolutional Networks with Channel Attention
                  for Intrusion Detection in Internet-of-Things},
  booktitle    = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with
                  Applications, Big Data {\&} Cloud Computing, Sustainable Computing
                  {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom,
                  2023, Wuhan, China, December 21-24, 2023},
  pages        = {207--212},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00060},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM59178.2023.00060},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bdcloud/LongLC0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdmip/ZengLX23,
  author       = {Jing Zeng and
                  Shuo Li and
                  Xiangsen Xu},
  title        = {Simulation Design of a Network Security Intrusion Detection Model
                  for Cloud Computing Based on Neural Network Model},
  booktitle    = {Proceedings of the International Conference on Big Data Mining and
                  Information Processing, {BDMIP} 2023, Xiamen City, China, China, November
                  17-19, 2023},
  pages        = {111--115},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3645279.3645299},
  doi          = {10.1145/3645279.3645299},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bdmip/ZengLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caasafeproc/ZhangWWWZ23,
  author       = {Lina Zhang and
                  Yang Wang and
                  Minyue Wu and
                  Yanwei Wang and
                  Ying Zheng},
  title        = {Network Intrusion Detection Based on Graph Neural Network and Ensemble
                  Learning},
  booktitle    = {{CAA} Symposium on Fault Detection, Supervision and Safety for Technical
                  Processes, {SAFEPROCESS} 2023, Yibin, China, September 22-24, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SAFEPROCESS58597.2023.10295926},
  doi          = {10.1109/SAFEPROCESS58597.2023.10295926},
  timestamp    = {Thu, 16 Nov 2023 16:58:41 +0100},
  biburl       = {https://dblp.org/rec/conf/caasafeproc/ZhangWWWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccwc/GuoPLLPH23,
  author       = {Ge Guo and
                  Xuefeng Pan and
                  He Liu and
                  Fen Li and
                  Lang Pei and
                  Kewei Hu},
  title        = {An IoT Intrusion Detection System Based on {TON} IoT Network Dataset},
  booktitle    = {13th {IEEE} Annual Computing and Communication Workshop and Conference,
                  {CCWC} 2023, Las Vegas, NV, USA, March 8-11, 2023},
  pages        = {333--338},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CCWC57344.2023.10099144},
  doi          = {10.1109/CCWC57344.2023.10099144},
  timestamp    = {Wed, 26 Apr 2023 16:58:06 +0200},
  biburl       = {https://dblp.org/rec/conf/ccwc/GuoPLLPH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccwc/WangMDF23,
  author       = {Lidong Wang and
                  Reed L. Mosher and
                  Patti Duett and
                  Terril C. Falls},
  title        = {Data Analytics of Network Intrusion Based on Deep Neural Networks
                  with Weights Initialized by Stacked Autoencoders and Deep Belief Networks},
  booktitle    = {13th {IEEE} Annual Computing and Communication Workshop and Conference,
                  {CCWC} 2023, Las Vegas, NV, USA, March 8-11, 2023},
  pages        = {511--515},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CCWC57344.2023.10099108},
  doi          = {10.1109/CCWC57344.2023.10099108},
  timestamp    = {Wed, 26 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccwc/WangMDF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/FarzanehSMT23,
  author       = {Behnam Farzaneh and
                  Nashid Shahriar and
                  Abu Hena Al Muktadir and
                  Md. Shamim Towhid},
  title        = {{DTL-IDS:} Deep Transfer Learning-Based Intrusion Detection System
                  in 5G Networks},
  booktitle    = {19th International Conference on Network and Service Management, {CNSM}
                  2023, Niagara Falls, ON, Canada, October 30 - Nov. 2, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/CNSM59352.2023.10327918},
  doi          = {10.23919/CNSM59352.2023.10327918},
  timestamp    = {Tue, 05 Dec 2023 20:47:36 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsm/FarzanehSMT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/DayIB23,
  author       = {Patrick Day and
                  Stefano Iannucci and
                  Ioana Banicescu},
  editor       = {Hossain Shahriar and
                  Yuuichi Teranishi and
                  Alfredo Cuzzocrea and
                  Moushumi Sharmin and
                  Dave Towey and
                  A. K. M. Jahangir Alam Majumder and
                  Hiroki Kashiwazaki and
                  Ji{-}Jiang Yang and
                  Michiharu Takemoto and
                  Nazmus Sakib and
                  Ryohei Banno and
                  Sheikh Iqbal Ahamed},
  title        = {Generating Host-Based Data from Network Traces for Intrusion Detection},
  booktitle    = {47th {IEEE} Annual Computers, Software, and Applications Conference,
                  {COMPSAC} 2023, Torino, Italy, June 26-30, 2023},
  pages        = {268--273},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMPSAC57700.2023.00041},
  doi          = {10.1109/COMPSAC57700.2023.00041},
  timestamp    = {Mon, 07 Aug 2023 15:56:21 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/DayIB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/RahmanSCHR23,
  author       = {Md. Abdur Rahman and
                  Hossain Shahriar and
                  Victor Clincy and
                  Md Faruque Hossain and
                  Muhammad Asadur Rahman},
  editor       = {Hossain Shahriar and
                  Yuuichi Teranishi and
                  Alfredo Cuzzocrea and
                  Moushumi Sharmin and
                  Dave Towey and
                  A. K. M. Jahangir Alam Majumder and
                  Hiroki Kashiwazaki and
                  Ji{-}Jiang Yang and
                  Michiharu Takemoto and
                  Nazmus Sakib and
                  Ryohei Banno and
                  Sheikh Iqbal Ahamed},
  title        = {A Quantum Generative Adversarial Network-based Intrusion Detection
                  System},
  booktitle    = {47th {IEEE} Annual Computers, Software, and Applications Conference,
                  {COMPSAC} 2023, Torino, Italy, June 26-30, 2023},
  pages        = {1810--1815},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMPSAC57700.2023.00280},
  doi          = {10.1109/COMPSAC57700.2023.00280},
  timestamp    = {Mon, 07 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/RahmanSCHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/CasajusSetienBL23,
  author       = {Jorge Casaj{\'{u}}s{-}Seti{\'{e}}n and
                  Concha Bielza and
                  Pedro Larra{\~{n}}aga},
  title        = {Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer
                  Models},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023},
  pages        = {72--77},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSR57506.2023.10224965},
  doi          = {10.1109/CSR57506.2023.10224965},
  timestamp    = {Wed, 06 Sep 2023 08:09:39 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/CasajusSetienBL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/TermosGBFJZ23,
  author       = {Mortada Termos and
                  Zakariya Ghalmane and
                  Mohamed{-}el{-}Amine Brahmia and
                  Ahmad Fadlallah and
                  Ali Jaber and
                  Mourad Zghal},
  title        = {Intrusion Detection System for IoT Based on Complex Networks and Machine
                  Learning},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2023, Abu Dhabi, United Arab Emirates,
                  November 14-17, 2023},
  pages        = {471--477},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361433},
  doi          = {10.1109/DASC/PICOM/CBDCOM/CY59711.2023.10361433},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/TermosGBFJZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ChenXLLC23,
  author       = {Xiansen Chen and
                  Kun Xiao and
                  Lei Luo and
                  Yun Li and
                  Lirong Chen},
  title        = {{GAN-IVDS:} An Intrusion Detection System for Intelligent Connected
                  Vehicles Based on Generative Adversarial Networks},
  booktitle    = {8th International Conference on Data Science in Cyberspace, {DSC}
                  2023, Hefei, China, August 18-20, 2023},
  pages        = {237--244},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSC59305.2023.00042},
  doi          = {10.1109/DSC59305.2023.00042},
  timestamp    = {Fri, 09 Feb 2024 20:38:47 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/ChenXLLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/LuLQ23,
  author       = {Zhuoer Lu and
                  Xiaoyong Li and
                  Pengfei Qiu},
  title        = {An AdamW-Based Deep Neural Network Using Feature Selection and Data
                  Oversampling for Intrusion Detection},
  booktitle    = {8th International Conference on Data Science in Cyberspace, {DSC}
                  2023, Hefei, China, August 18-20, 2023},
  pages        = {213--220},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSC59305.2023.00039},
  doi          = {10.1109/DSC59305.2023.00039},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/LuLQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dtesi/AliRYNAK23,
  author       = {Mohsin Ali and
                  Abdul Razaque and
                  Damelya M. Yeskendirova and
                  Talgat A. Nurlybayev and
                  Nessibeli Y. Askarbekova and
                  Zarina A. Kashaganova},
  editor       = {Askar Khikmetov and
                  Kateryna Kolesnikova and
                  Madina T. Ipalakova},
  title        = {Enhancing Cloud Computing Security through AI-Based Intelligent Intrusion
                  Detection Leveraging Neural Networks and Artificial Bee Colony Optimization},
  booktitle    = {Workshops and Short Paper Proceedings of the 8th International Conference
                  on Digital Technologies in Education, Science and Industry 2023, Almaty,
                  Kazakhstan, December 6-7, 2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3680},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3680/S4Paper5.pdf},
  timestamp    = {Tue, 21 May 2024 17:19:33 +0200},
  biburl       = {https://dblp.org/rec/conf/dtesi/AliRYNAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DiasVFPMV23,
  author       = {Tiago Fontes Dias and
                  Jo{\~{a}}o Vitorino and
                  Tiago Fonseca and
                  Isabel Pra{\c{c}}a and
                  Eva Maia and
                  Maria Jo{\~{a}}o Viamonte},
  editor       = {Sokratis K. Katsikas and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Rita Maria Ugarelli and
                  Isabel Pra{\c{c}}a and
                  Wenjuan Li and
                  Weizhi Meng and
                  Steven Furnell and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla and
                  Michele Ianni and
                  Mila Dalla Preda and
                  Kim{-}Kwang Raymond Choo and
                  Miguel Pupo Correia and
                  Abhishta Abhishta and
                  Giovanni Sileno and
                  Mina Alishahi and
                  Harsha K. Kalutarage and
                  Naoto Yanai},
  title        = {Unravelling Network-Based Intrusion Detection: {A} Neutrosophic Rule
                  Mining and Optimization Framework},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP,
                  ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The
                  Netherlands, September 25-29, 2023, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14399},
  pages        = {59--75},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54129-2\_4},
  doi          = {10.1007/978-3-031-54129-2\_4},
  timestamp    = {Mon, 25 Mar 2024 20:43:51 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/DiasVFPMV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GiagkosKLP23,
  author       = {Dimitrios Giagkos and
                  Orestis Kompougias and
                  Antonis Litke and
                  Nikolaos Papadakis},
  editor       = {Sokratis K. Katsikas and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Rita Maria Ugarelli and
                  Isabel Pra{\c{c}}a and
                  Wenjuan Li and
                  Weizhi Meng and
                  Steven Furnell and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla and
                  Michele Ianni and
                  Mila Dalla Preda and
                  Kim{-}Kwang Raymond Choo and
                  Miguel Pupo Correia and
                  Abhishta Abhishta and
                  Giovanni Sileno and
                  Mina Alishahi and
                  Harsha K. Kalutarage and
                  Naoto Yanai},
  title        = {ZeekFlow: Deep Learning-Based Network Intrusion Detection a Multimodal
                  Approach},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP,
                  ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The
                  Netherlands, September 25-29, 2023, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14399},
  pages        = {409--425},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54129-2\_24},
  doi          = {10.1007/978-3-031-54129-2\_24},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GiagkosKLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HongPRM23,
  author       = {Xin Hong and
                  Zafeirios C. Papazachos and
                  Jes{\'{u}}s Mart{\'{\i}}nez del Rinc{\'{o}}n and
                  Paul Miller},
  editor       = {Sokratis K. Katsikas and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Rita Maria Ugarelli and
                  Isabel Pra{\c{c}}a and
                  Wenjuan Li and
                  Weizhi Meng and
                  Steven Furnell and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla and
                  Michele Ianni and
                  Mila Dalla Preda and
                  Kim{-}Kwang Raymond Choo and
                  Miguel Pupo Correia and
                  Abhishta Abhishta and
                  Giovanni Sileno and
                  Mina Alishahi and
                  Harsha K. Kalutarage and
                  Naoto Yanai},
  title        = {Network Intrusion Detection by Variational Component-Based Feature
                  Saliency Gaussian Mixture Clustering},
  booktitle    = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP,
                  ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The
                  Netherlands, September 25-29, 2023, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14399},
  pages        = {761--772},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54129-2\_45},
  doi          = {10.1007/978-3-031-54129-2\_45},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HongPRM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/ParkPSK23,
  author       = {Cheolhee Park and
                  Kyungmin Park and
                  Jihyeon Song and
                  Jonghyun Kim},
  title        = {Distributed Learning-Based Intrusion Detection in 5G and Beyond Networks},
  booktitle    = {2023 Joint European Conference on Networks and Communications {\&}
                  6G Summit, EuCNC/6G Summit 2023, Gothenburg, Sweden, June 6-9, 2023},
  pages        = {490--495},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188312},
  doi          = {10.1109/EUCNC/6GSUMMIT58263.2023.10188312},
  timestamp    = {Mon, 31 Jul 2023 13:56:43 +0200},
  biburl       = {https://dblp.org/rec/conf/eucnc/ParkPSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdse/NguyenTL23,
  author       = {Dinh Hoang Nguyen and
                  Nam Khanh Tran and
                  Nhien{-}An Le{-}Khac},
  editor       = {Tran Khanh Dang and
                  Josef K{\"{u}}ng and
                  Tai M. Chung},
  title        = {A Siamese-Based Approach for Network Intrusion Detection Systems in
                  Software-Defined Networks},
  booktitle    = {Future Data and Security Engineering. Big Data, Security and Privacy,
                  Smart City and Industry 4.0 Applications - 10th International Conference,
                  {FDSE} 2023, Da Nang, Vietnam, November 22-24, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1925},
  pages        = {199--211},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8296-7\_14},
  doi          = {10.1007/978-981-99-8296-7\_14},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdse/NguyenTL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/GuidaNMP23,
  author       = {Ciro Guida and
                  Alfredo Nascita and
                  Antonio Montieri and
                  Antonio Pescap{\`{e}}},
  editor       = {Irfan Awan and
                  Muhammad Younas and
                  Markus Aleksy},
  title        = {Cross-Evaluation of Deep Learning-based Network Intrusion Detection
                  Systems},
  booktitle    = {10th International Conference on Future Internet of Things and Cloud,
                  FiCloud 2023, Marrakesh, Morocco, August 14-16, 2023},
  pages        = {328--335},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/FiCloud58648.2023.00055},
  doi          = {10.1109/FICLOUD58648.2023.00055},
  timestamp    = {Tue, 07 May 2024 20:09:20 +0200},
  biburl       = {https://dblp.org/rec/conf/ficloud/GuidaNMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficta/GandhiBSV23,
  author       = {K. Indra Gandhi and
                  Sudharsan Balaji and
                  S. Srikanth and
                  V. Suba Varshini},
  editor       = {Vikrant Bhateja and
                  Xin{-}She Yang and
                  Marta Campos Ferreira and
                  Sandeep Singh Sengar and
                  Carlos M. Travieso{-}Gonz{\'{a}}lez},
  title        = {Ensemble Machine Learning-Based Network Intrusion Detection System},
  booktitle    = {Evolution in Computational Intelligence - Proceedings of the 11th
                  International Conference on Frontiers of Intelligent Computing: Theory
                  and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April, 2023},
  series       = {Smart Innovation, Systems and Technologies},
  volume       = {370},
  pages        = {135--144},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-6702-5\_11},
  doi          = {10.1007/978-981-99-6702-5\_11},
  timestamp    = {Tue, 28 Nov 2023 13:56:20 +0100},
  biburl       = {https://dblp.org/rec/conf/ficta/GandhiBSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/SusskindABDMBLF23,
  author       = {Zachary Susskind and
                  Aman Arora and
                  Alan T. L. Bacellar and
                  Diego Leonel Cadette Dutra and
                  Igor D. S. Miranda and
                  Maur{\'{\i}}cio Breternitz and
                  Priscila M. V. Lima and
                  Felipe M. G. Fran{\c{c}}a and
                  Lizy K. John},
  editor       = {Paolo Ienne and
                  Zhiru Zhang},
  title        = {An FPGA-Based Weightless Neural Network for Edge Network Intrusion
                  Detection},
  booktitle    = {Proceedings of the 2023 {ACM/SIGDA} International Symposium on Field
                  Programmable Gate Arrays, {FPGA} 2023, Monterey, CA, USA, February
                  12-14, 2023},
  pages        = {232},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543622.3573140},
  doi          = {10.1145/3543622.3573140},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpga/SusskindABDMBLF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HoslerSZLG23,
  author       = {Ryan Hosler and
                  Agnideven Palanisamy Sundar and
                  Xukai Zou and
                  Feng Li and
                  Tianchong Gao},
  title        = {Unsupervised Deep Learning for an Image Based Network Intrusion Detection
                  System},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {6825--6831},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10437636},
  doi          = {10.1109/GLOBECOM54140.2023.10437636},
  timestamp    = {Sun, 10 Mar 2024 10:39:12 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/HoslerSZLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiuSNK23,
  author       = {Jinxin Liu and
                  Murat Simsek and
                  Michele Nogueira and
                  Burak Kantarci},
  title        = {Multidomain transformer-based deep learning for early detection of
                  network intrusion},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {6056--6061},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10436976},
  doi          = {10.1109/GLOBECOM54140.2023.10436976},
  timestamp    = {Sun, 10 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiuSNK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/NguyenL23,
  author       = {Thai Vu Nguyen and
                  Long Bao Le},
  title        = {Attention-Based Interpretable Semi-Supervised Federated Learning for
                  Intrusion Detection in IoT Wireless Networks},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {6832--6837},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10437120},
  doi          = {10.1109/GLOBECOM54140.2023.10437120},
  timestamp    = {Sun, 10 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/NguyenL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3/IslamOUY23,
  author       = {Md Rezanur Islam and
                  Insu Oh and
                  Muminov Ibrokhim Botir Ugli and
                  Kangbin Yim},
  title        = {Enhancing In-Vehicle Network Security Through Bitstream Feature Extraction-Based
                  Intrusion Detection},
  booktitle    = {Proceedings of the 2023 Fifteenth International Conference on Contemporary
                  Computing, IC3-2023, Noida, India, August 3-5, 2023},
  pages        = {224--229},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607947.3607989},
  doi          = {10.1145/3607947.3607989},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3/IslamOUY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3i/MishraMPMRK23,
  author       = {Ishaan Mishra and
                  Shalaka S. Mahadik and
                  Pranav M. Pawar and
                  Raja Muthalagu and
                  Elakkiya R and
                  Nandkumar Kulkarni},
  title        = {Learning-Tree Based Network Intrusion Detection for IoT},
  booktitle    = {6th International Conference on Contemporary Computing and Informatics,
                  {IC3I} 2023, Gautam Buddha Nagar, India, September 14-16, 2023},
  pages        = {756--761},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IC3I59117.2023.10398156},
  doi          = {10.1109/IC3I59117.2023.10398156},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3i/MishraMPMRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/DuanCJL23,
  author       = {Yali Duan and
                  Jianming Cui and
                  Yungang Jia and
                  Ming Liu},
  editor       = {Zahir Tari and
                  Keqiu Li and
                  Hongyi Wu},
  title        = {Intrusion Detection Method for Networked Vehicles Based on Data-Enhanced
                  {DBN}},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 23rd International
                  Conference, {ICA3PP} 2023, Tianjin, China, October 20-22, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14488},
  pages        = {40--52},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0801-7\_3},
  doi          = {10.1007/978-981-97-0801-7\_3},
  timestamp    = {Mon, 11 Mar 2024 15:20:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/DuanCJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaart/TalpiniSS23,
  author       = {Jacopo Talpini and
                  Fabio Sartori and
                  Marco Savi},
  editor       = {Ana Paula Rocha and
                  Luc Steels and
                  H. Jaap van den Herik},
  title        = {A Clustering Strategy for Enhanced FL-Based Intrusion Detection in
                  IoT Networks},
  booktitle    = {Proceedings of the 15th International Conference on Agents and Artificial
                  Intelligence, {ICAART} 2023, Volume 3, Lisbon, Portugal, February
                  22-24, 2023},
  pages        = {152--160},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011627500003393},
  doi          = {10.5220/0011627500003393},
  timestamp    = {Tue, 09 May 2023 16:57:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaart/TalpiniSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbase/WangSJZ23,
  author       = {Mengshu Wang and
                  Kai Shi and
                  Anxing Jiang and
                  Zeri Zhang},
  title        = {Constructing Weighted Host Communication Networks for Intrusion Detection
                  based on Complex Network Theory},
  booktitle    = {4th International Conference on Big Data {\&} Artificial Intelligence
                  {\&} Software Engineering, {ICBASE} 2023, Nanjing, China, August
                  25-27, 2023},
  pages        = {424--428},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICBASE59196.2023.10303106},
  doi          = {10.1109/ICBASE59196.2023.10303106},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icbase/WangSJZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KamaliCK23,
  author       = {Anas El Kamali and
                  Khalid Chougdali and
                  Abdellatif Kobbane},
  title        = {A New Intrusion Detection System Based on Convolutional Neural Network},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {2994--2999},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10279012},
  doi          = {10.1109/ICC45041.2023.10279012},
  timestamp    = {Thu, 02 Nov 2023 17:09:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/KamaliCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/YangZXW23,
  author       = {Shuo Yang and
                  Xinran Zheng and
                  Zhengzhuo Xu and
                  Xingjun Wang},
  title        = {A Lightweight Approach for Network Intrusion Detection Based on Self-Knowledge
                  Distillation},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {3000--3005},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10279691},
  doi          = {10.1109/ICC45041.2023.10279691},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/YangZXW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccais/TranNN23,
  author       = {Quoc Trung Tran and
                  Van Quan Nguyen and
                  Thanh Long Ngo},
  title        = {Particle Swarm Optimization of Deep Auto-Encoder Network Architectures
                  for Anomaly-based Intrusion Detection Systems},
  booktitle    = {12th International Conference on Control, Automation and Information
                  Sciences, {ICCAIS} 2023, Hanoi, Vietnam, November 27-29, 2023},
  pages        = {553--559},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCAIS59597.2023.10382282},
  doi          = {10.1109/ICCAIS59597.2023.10382282},
  timestamp    = {Fri, 09 Feb 2024 20:38:50 +0100},
  biburl       = {https://dblp.org/rec/conf/iccais/TranNN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/KarthikeyanBKK23,
  author       = {N. Karthikeyan and
                  Jajjara Bhargav and
                  Muthu Subash Kavitha and
                  S. Karthik},
  title        = {QoS Based Hybrid Swarm Intelligent Intrusion Detection System for
                  Network Security},
  booktitle    = {14th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCNT56998.2023.10307865},
  doi          = {10.1109/ICCCNT56998.2023.10307865},
  timestamp    = {Thu, 30 Nov 2023 16:40:53 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/KarthikeyanBKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/TelidevaraK23,
  author       = {Madhuri Telidevara and
                  D. Kothandaraman},
  title        = {Improving Intrusion Detection in Internet of Things Networks with
                  Feed-Forward Neural Networks Based on the {UNSW-NB15} Dataset},
  booktitle    = {14th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCNT56998.2023.10307804},
  doi          = {10.1109/ICCCNT56998.2023.10307804},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/TelidevaraK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/VMRS23,
  author       = {Harshini Sivakami V and
                  Nivedhidha M and
                  M. P. Ramkumar and
                  G. S. R. Emil Selvan},
  title        = {CopulaGAN Boosted Random Forest based Network Intrusion Detection
                  System for Hospital Network Infrastructure},
  booktitle    = {14th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCNT56998.2023.10306951},
  doi          = {10.1109/ICCCNT56998.2023.10306951},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/VMRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/VenkatesanJB23,
  author       = {C. Venkatesan and
                  S. Jeevanantham and
                  Rebekka B.},
  title        = {Incentive-based Energy-efficient Federated Learning Aggregation for
                  Intrusion Detection in IoT Sensor Network},
  booktitle    = {14th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCNT56998.2023.10306340},
  doi          = {10.1109/ICCCNT56998.2023.10306340},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/VenkatesanJB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsp/SubramaniSKTAK23,
  author       = {Shalini Subramani and
                  Munuswamy Selvi and
                  S. V. N. Santhosh Kumar and
                  K. Thangaramya and
                  M. Anand and
                  Arputharaj Kannan},
  editor       = {Eunika Mercier{-}Laurent and
                  Xavier Fernando and
                  Aravindan Chandrabose},
  title        = {An Intrusion Detection System for Securing IoT Based Sensor Networks
                  from Routing Attacks},
  booktitle    = {Computer, Communication, and Signal Processing. AI, Knowledge Engineering
                  and IoT for Smart Systems - 7th {IFIP} {TC} 12 International Conference,
                  {ICCCSP} 2023, Chennai, India, January 4-6, 2023, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {670},
  pages        = {321--334},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-39811-7\_26},
  doi          = {10.1007/978-3-031-39811-7\_26},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsp/SubramaniSKTAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icce-tw/WuWCLHT23,
  author       = {Ming{-}Yen Wu and
                  Sz{-}Hsien Wu and
                  Yu{-}En Chang and
                  Yu{-}Hsiang Lin and
                  Sin{-}Jie Huang and
                  Hsiao{-}Ting Tseng},
  title        = {Intrusion Detection with Radio Frequency Sensing based on Wi-Fi Mesh
                  Network for Home Security},
  booktitle    = {International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan
                  2023, PingTung, Taiwan, July 17-19, 2023},
  pages        = {329--330},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCE-Taiwan58799.2023.10226838},
  doi          = {10.1109/ICCE-TAIWAN58799.2023.10226838},
  timestamp    = {Fri, 08 Sep 2023 15:28:17 +0200},
  biburl       = {https://dblp.org/rec/conf/icce-tw/WuWCLHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccse2/Lan23,
  author       = {Hai Lan},
  editor       = {Wenxing Hong and
                  Geetha Kanaparan},
  title        = {Research of Network Intrusion Detection Based on Improved Seagull
                  Optimization Algorithm with Deep Learning},
  booktitle    = {Computer Science and Education. Computer Science and Technology -
                  18th International Conference, {ICCSE} 2023, Sepang, Malaysia, December
                  1-7, 2023, Proceedings, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {2023},
  pages        = {100--112},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0730-0\_10},
  doi          = {10.1007/978-981-97-0730-0\_10},
  timestamp    = {Thu, 25 Apr 2024 17:26:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iccse2/Lan23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccse2/YuHZ23,
  author       = {Jun Yu and
                  Jiwei Hu and
                  Yong Zeng},
  editor       = {Wenxing Hong and
                  Geetha Kanaparan},
  title        = {Deep Learning Based Network Intrusion Detection},
  booktitle    = {Computer Science and Education. Computer Science and Technology -
                  18th International Conference, {ICCSE} 2023, Sepang, Malaysia, December
                  1-7, 2023, Proceedings, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {2023},
  pages        = {125--136},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0730-0\_12},
  doi          = {10.1007/978-981-97-0730-0\_12},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccse2/YuHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsie/LiuC23,
  author       = {Xiaomei Liu and
                  Yujing Cao},
  title        = {Research on Network Intrusion Detection Techniques Based on Feature
                  Selection Model and Recurrent Neural Network},
  booktitle    = {Proceedings of the 8th International Conference on Cyber Security
                  and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September
                  22-24, 2023},
  pages        = {45--51},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617184.3617780},
  doi          = {10.1145/3617184.3617780},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsie/LiuC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsie/ZhaoHS23,
  author       = {Xing Zhao and
                  Jie Heng and
                  Qian Sun},
  title        = {Research on Network Intrusion Simulation and Adversarial Strategies
                  Based on Generate Adversarial Networks},
  booktitle    = {Proceedings of the 8th International Conference on Cyber Security
                  and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September
                  22-24, 2023},
  pages        = {356--360},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617184.3630162},
  doi          = {10.1145/3617184.3630162},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsie/ZhaoHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/KhareB23,
  author       = {Nishad Khare and
                  Sonali Bhutad},
  title        = {Intrusion Detection System for Live Anomaly-Based Network Packets},
  booktitle    = {{IEEE} International Carnahan Conference on Security Technology, {ICCST}
                  2023, Pune, India, October 11-15, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCST59048.2023.10474242},
  doi          = {10.1109/ICCST59048.2023.10474242},
  timestamp    = {Tue, 16 Apr 2024 14:15:02 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/KhareB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/PawlickaPKC23,
  author       = {Aleksandra Pawlicka and
                  Marek Pawlicki and
                  Rafal Kozik and
                  Michal Choras},
  editor       = {Jihe Wang and
                  Yi He and
                  Thang N. Dinh and
                  Christan Grant and
                  Meikang Qiu and
                  Witold Pedrycz},
  title        = {The Need for Practical Legal and Ethical Guidelines for Explainable
                  AI-based Network Intrusion Detection Systems},
  booktitle    = {{IEEE} International Conference on Data Mining, {ICDM} 2023 - Workshops,
                  Shanghai, China, December 4, 2023},
  pages        = {253--261},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICDMW60847.2023.00038},
  doi          = {10.1109/ICDMW60847.2023.00038},
  timestamp    = {Tue, 13 Feb 2024 13:22:54 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/PawlickaPKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icise/Chen23,
  author       = {Yao Chen},
  title        = {Design and implementation of a computer network intrusion detection
                  system based on convolutional neural network},
  booktitle    = {8th International Conference on Information Systems Engineering, {ICISE}
                  2023, Dalian, China, June 23-25, 2023},
  pages        = {64--69},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICISE60366.2023.00021},
  doi          = {10.1109/ICISE60366.2023.00021},
  timestamp    = {Thu, 23 Nov 2023 21:16:33 +0100},
  biburl       = {https://dblp.org/rec/conf/icise/Chen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icise/Chen23a,
  author       = {Yao Chen},
  title        = {Construction of a computer network fault analysis and intrusion detection
                  system based on K-means clustering algorithm},
  booktitle    = {8th International Conference on Information Systems Engineering, {ICISE}
                  2023, Dalian, China, June 23-25, 2023},
  pages        = {70--75},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICISE60366.2023.00022},
  doi          = {10.1109/ICISE60366.2023.00022},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icise/Chen23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmtel/MaW23,
  author       = {Xingfei Ma and
                  Wuguang Wang},
  editor       = {Bing Wang and
                  Zuojin Hu and
                  Xianwei Jiang and
                  Yu{-}Dong Zhang},
  title        = {Research on Random Intrusion Depth Detection of Internet of Things
                  Based on 3D Convolutional Neural Network},
  booktitle    = {Multimedia Technology and Enhanced Learning - 5th {EAI} International
                  Conference, {ICMTEL} 2023, Leicester, UK, April 28-29, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {532},
  pages        = {262--276},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50571-3\_19},
  doi          = {10.1007/978-3-031-50571-3\_19},
  timestamp    = {Tue, 30 Apr 2024 13:48:13 +0200},
  biburl       = {https://dblp.org/rec/conf/icmtel/MaW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-dm/KhanAAD23,
  author       = {Inam Ullah Khan and
                  Muhammad Yaseen Ayub and
                  Asrin Abdollahi and
                  Arijit Dutta},
  title        = {A Hybrid Deep Learning Model-Based Intrusion Detection System for
                  Emergency Planning Using IoT-Network},
  booktitle    = {International Conference on Information and Communication Technologies
                  for Disaster Management, {ICT-DM} 2023, Cosenza, Italy, September
                  13-15, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICT-DM58371.2023.10286954},
  doi          = {10.1109/ICT-DM58371.2023.10286954},
  timestamp    = {Wed, 08 Nov 2023 17:21:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ict-dm/KhanAAD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictc/IzuazuKL23,
  author       = {Urslla Uchechi Izuazu and
                  Dong{-}Seong Kim and
                  Jae Min Lee},
  title        = {Unravelling the Black Box: Enhancing Virtual Reality Network Security
                  with Interpretable Deep Learning-Based Intrusion Detection System},
  booktitle    = {14th International Conference on Information and Communication Technology
                  Convergence, {ICTC} 2023, Jeju Island, Korea, Republic of, October
                  11-13, 2023},
  pages        = {928--931},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICTC58733.2023.10392826},
  doi          = {10.1109/ICTC58733.2023.10392826},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ictc/IzuazuKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifipiot/ZambareL23,
  author       = {Pallavi Zambare and
                  Ying Liu},
  editor       = {Deepak Puthal and
                  Saraju P. Mohanty and
                  Baek{-}Young Choi},
  title        = {An Optimized Graph Neural Network-Based Approach for Intrusion Detection
                  in Smart Vehicles},
  booktitle    = {Internet of Things. Advances in Information and Communication Technology
                  - 6th {IFIP} International Cross-Domain Conference, IFIPIoT 2023,
                  Denton, TX, USA, November 2-3, 2023, Proceedings, Part {I}},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {683},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45878-1\_1},
  doi          = {10.1007/978-3-031-45878-1\_1},
  timestamp    = {Tue, 30 Jan 2024 10:11:54 +0100},
  biburl       = {https://dblp.org/rec/conf/ifipiot/ZambareL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/ChenGFSMW23,
  author       = {Junjun Chen and
                  Qiang Guo and
                  Zhongnan Fu and
                  Qun Shang and
                  Hao Ma and
                  Nai Wang},
  title        = {Semi-supervised Campus Network Intrusion Detection Based on Knowledge
                  Distillation},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2023, Gold
                  Coast, Australia, June 18-23, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IJCNN54540.2023.10191988},
  doi          = {10.1109/IJCNN54540.2023.10191988},
  timestamp    = {Wed, 09 Aug 2023 16:25:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/ChenGFSMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/AhmadAKN23,
  author       = {Rayed S. Ahmad and
                  Asmer H. Ali and
                  Syed M. Kazim and
                  Quamar Niyaz},
  title        = {A {GAF} and {CNN} based Wi-Fi Network Intrusion Detection System},
  booktitle    = {{IEEE} {INFOCOM} 2023 - {IEEE} Conference on Computer Communications
                  Workshop, Hoboken, NJ, USA, May 20, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10226036},
  doi          = {10.1109/INFOCOMWKSHPS57453.2023.10226036},
  timestamp    = {Tue, 05 Sep 2023 20:33:23 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/AhmadAKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotsms/BensaidLS23,
  author       = {Radjaa Bensaid and
                  Nabila Labraoui and
                  Haythem Bany Salameh},
  editor       = {Muhannad Quwaider and
                  Yaser Jararweh},
  title        = {Federated Deep Learning-based Intrusion Detection Approach for Enhancing
                  Privacy in Fog-IoT Networks},
  booktitle    = {10th International Conference on Internet of Things: Systems, Management
                  and Security, {IOTSMS} 2023, San Antonio, TX, USA, October 23-25,
                  2023},
  pages        = {156--160},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IOTSMS59855.2023.10325826},
  doi          = {10.1109/IOTSMS59855.2023.10325826},
  timestamp    = {Sat, 09 Dec 2023 09:49:48 +0100},
  biburl       = {https://dblp.org/rec/conf/iotsms/BensaidLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ises/PathakPS23,
  author       = {Manan Pathak and
                  Anuj Patel and
                  Bela Shah},
  title        = {IoT Intrusion Detection: Evaluating ML-Based {IDS} on Image and Network
                  Traffic Datasets},
  booktitle    = {{IEEE} International Symposium on Smart Electronic Systems, iSES 2023,
                  Ahmedabad, India, December 18-20, 2023},
  pages        = {57--62},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/iSES58672.2023.00023},
  doi          = {10.1109/ISES58672.2023.00023},
  timestamp    = {Tue, 02 Apr 2024 12:53:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ises/PathakPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LuongTDP23,
  author       = {Tran Duc Luong and
                  Vuong Minh Tien and
                  Phan The Duy and
                  Van{-}Hau Pham},
  editor       = {Weizhi Meng and
                  Zheng Yan and
                  Vincenzo Piuri},
  title        = {FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion
                  Detection Systems Using Autoencoder-Based Latent Space Representations},
  booktitle    = {Information Security Practice and Experience - 18th International
                  Conference, {ISPEC} 2023, Copenhagen, Denmark, August 24-25, 2023,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14341},
  pages        = {17--35},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7032-2\_2},
  doi          = {10.1007/978-981-99-7032-2\_2},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/LuongTDP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/LiuZLLBZ23,
  author       = {Yao Liu and
                  Le Zhou and
                  Qiao Liu and
                  Tian Lan and
                  Xiaoyu Bai and
                  Tinghao Zhou},
  title        = {Semi-supervised Few-shot Network Intrusion Detection based on Meta-learning},
  booktitle    = {2023 {IEEE} International Conferences on Internet of Things (iThings)
                  and {IEEE} Green Computing {\&} Communications (GreenCom) and
                  {IEEE} Cyber, Physical {\&} Social Computing (CPSCom) and {IEEE}
                  Smart Data (SmartData) and {IEEE} Congress on Cybermatics (Cybermatics),
                  Danzhou, China, December 17-21, 2023},
  pages        = {495--502},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics60724.2023.00097},
  doi          = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA-CYBERMATICS60724.2023.00097},
  timestamp    = {Fri, 10 May 2024 11:45:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ithings/LiuZLLBZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kmo/Sun0SS23,
  author       = {Qilun Sun and
                  Ran Tao and
                  Youqun Shi and
                  Xia Shang},
  editor       = {Lorna Uden and
                  I{-}Hsien Ting},
  title        = {Add-BiGAN: An Add-Based Bidirectional Generative Adversarial Networks
                  for Intrusion Detection},
  booktitle    = {Knowledge Management in Organisations - 17th International Conference,
                  {KMO} 2023, Bangkok, Thailand, July 24-27, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1825},
  pages        = {360--374},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34045-1\_29},
  doi          = {10.1007/978-3-031-34045-1\_29},
  timestamp    = {Wed, 05 Jul 2023 11:47:13 +0200},
  biburl       = {https://dblp.org/rec/conf/kmo/Sun0SS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medi/OueslatiMJ23,
  author       = {Nour Elhouda Oueslati and
                  Hichem Mrabet and
                  Abderrazak Jemai},
  editor       = {Mohamed Mosbah and
                  M. Tahar Kechadi and
                  Ladjel Bellatreche and
                  Fa{\"{\i}}ez Gargouri and
                  Chirine Ghedira Guegan and
                  Hassan Badir and
                  Amin Beheshti and
                  Mohamed Mohsen Gammoudi},
  title        = {A Survey on Intrusion Detection Systems for IoT Networks Based on
                  Long Short-Term Memory},
  booktitle    = {Advances in Model and Data Engineering in the Digitalization Era -
                  {MEDI} 2023 Short and Workshop Papers, Sousse, Tunisia, November 2-4,
                  2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2071},
  pages        = {237--250},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-55729-3\_19},
  doi          = {10.1007/978-3-031-55729-3\_19},
  timestamp    = {Fri, 05 Apr 2024 11:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/medi/OueslatiMJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/GyawaliSRHJ23,
  author       = {Sohan Gyawali and
                  Kamran Sartipi and
                  Benjamin Van Ravesteyn and
                  Jiaqi Huang and
                  Yili Jiang},
  title        = {Enhanced and Explainable Deep Learning-Based Intrusion Detection in
                  IoT Networks},
  booktitle    = {{IEEE} Military Communications Conference, {MILCOM} 2023, Boston,
                  MA, USA, October 30 - Nov. 3, 2023},
  pages        = {649--654},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MILCOM58377.2023.10356373},
  doi          = {10.1109/MILCOM58377.2023.10356373},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/GyawaliSRHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/ZachosMEPBR23,
  author       = {Georgios Zachos and
                  Georgios Mantas and
                  Ismael Essop and
                  Kyriakos Porfyrakis and
                  Joaquim Manuel C. S. Bastos and
                  Jonathan Rodriguez},
  title        = {An IoT/IoMT Security Testbed for Anomaly-based Intrusion Detection
                  Systems},
  booktitle    = {{IFIP} Networking Conference, {IFIP} Networking 2023, Barcelona, Spain,
                  June 12-15, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/IFIPNetworking57963.2023.10186428},
  doi          = {10.23919/IFIPNETWORKING57963.2023.10186428},
  timestamp    = {Mon, 31 Jul 2023 13:58:25 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/ZachosMEPBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netys/MzibriBM23,
  author       = {Adnane Mzibri and
                  R{\'{e}}douane Benaini and
                  Mouad Ben Mamoun},
  editor       = {David Mohaisen and
                  Thomas Wies},
  title        = {Case Study on the Performance of ML-Based Network Intrusion Detection
                  Systems in {SDN}},
  booktitle    = {Networked Systems - 11th International Conference, {NETYS} 2023, Benguerir,
                  Morocco, May 22-24, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14067},
  pages        = {90--95},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37765-5\_7},
  doi          = {10.1007/978-3-031-37765-5\_7},
  timestamp    = {Thu, 13 Jul 2023 14:30:34 +0200},
  biburl       = {https://dblp.org/rec/conf/netys/MzibriBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/AmalapuramCT23,
  author       = {Suresh Kumar Amalapuram and
                  Sumohana S. Channappayya and
                  Bheemarjuna Reddy Tamma},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {Augmented Memory Replay-based Continual Learning Approaches for Network
                  Intrusion Detection},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/3755a02b1035fbadd5f93a022170e46f-Abstract-Conference.html},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/AmalapuramCT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/AlhussienA23,
  author       = {Nour Alhussien and
                  Ahmed Aleroud},
  title        = {A Novel Poisoning Attack on Few-Shot based Network Intrusion Detection},
  booktitle    = {{NOMS} 2023, {IEEE/IFIP} Network Operations and Management Symposium,
                  Miami, FL, USA, May 8-12, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/NOMS56928.2023.10154453},
  doi          = {10.1109/NOMS56928.2023.10154453},
  timestamp    = {Mon, 26 Jun 2023 09:00:05 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/AlhussienA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/BayeSBFBK23,
  author       = {Gaspard Baye and
                  Priscila Silva and
                  Alexandre Broggi and
                  Lance Fiondella and
                  Nathaniel D. Bastian and
                  G{\"{o}}khan Kul},
  title        = {Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms
                  for Network Intrusion Detection Systems},
  booktitle    = {{NOMS} 2023, {IEEE/IFIP} Network Operations and Management Symposium,
                  Miami, FL, USA, May 8-12, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/NOMS56928.2023.10154410},
  doi          = {10.1109/NOMS56928.2023.10154410},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/BayeSBFBK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/RashidTH23,
  author       = {Syed Md. Mukit Rashid and
                  Md. Toufikuzzaman and
                  Md. Shohrab Hossain},
  title        = {A Deep Learning Based Semi-Supervised Network Intrusion Detection
                  System Robust to Adversarial Attacks},
  booktitle    = {10th International Conference on Networking, Systems and Security,
                  10th NSysS 2023, Khulna, Bangladesh, December 21-23, 2023},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3629188.3629189},
  doi          = {10.1145/3629188.3629189},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsyss/RashidTH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rivf/NguyenNL23,
  author       = {Dat{-}Thinh Nguyen and
                  Xuan{-}Ha Nguyen and
                  Kim{-}Hung Le},
  title        = {The Impact of Rotational Invariance on Tree- and Deep Learning-Based
                  Network Intrusion Detection System},
  booktitle    = {International Conference on Computing and Communication Technologies,
                  {RIVF} 2023, Hanoi, Vietnam, December 23-25, 2023},
  pages        = {509--514},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/RIVF60135.2023.10471789},
  doi          = {10.1109/RIVF60135.2023.10471789},
  timestamp    = {Wed, 27 Mar 2024 21:31:51 +0100},
  biburl       = {https://dblp.org/rec/conf/rivf/NguyenNL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rivf/NguyenNNNS23,
  author       = {Van Quan Nguyen and
                  Thanh Long Ngo and
                  Le Minh Nguyen and
                  Viet Hung Nguyen and
                  Nathan Shone},
  title        = {Deep Nested Clustering Auto-Encoder for Anomaly-Based Network Intrusion
                  Detection},
  booktitle    = {International Conference on Computing and Communication Technologies,
                  {RIVF} 2023, Hanoi, Vietnam, December 23-25, 2023},
  pages        = {289--294},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/RIVF60135.2023.10471853},
  doi          = {10.1109/RIVF60135.2023.10471853},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rivf/NguyenNNNS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/VenturiFMC23,
  author       = {Andrea Venturi and
                  Matteo Ferrari and
                  Mirco Marchetti and
                  Michele Colajanni},
  editor       = {Jiman Hong and
                  Maart Lanperne and
                  Juw Won Park and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Hossain Shahriar},
  title        = {{ARGANIDS:} a novel Network Intrusion Detection System based on adversarially
                  Regularized Graph Autoencoder},
  booktitle    = {Proceedings of the 38th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2023, Tallinn, Estonia, March 27-31, 2023},
  pages        = {1540--1548},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3555776.3577651},
  doi          = {10.1145/3555776.3577651},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/VenturiFMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sbrc/LuzAC23,
  author       = {Luigi F. Marques da Luz and
                  Paulo Freitas de Araujo{-}Filho and
                  Divanilson R. Campelo},
  editor       = {Carlos Kamienski and
                  Eduardo Cerqueira},
  title        = {Multi-Criteria Optimized Deep Learning-based Intrusion Detection System
                  for Detecting Cyberattacks in Automotive Ethernet Networks},
  booktitle    = {Proceedings of the 41st Brazilian Symposium on Computer Networks and
                  Distributed Systems, {SBRC} 2023, Bras{\'{\i}}lia, DF, Brazil,
                  May 22-26, 2023},
  pages        = {197--210},
  year         = {2023},
  url          = {https://sol.sbc.org.br/index.php/sbrc/article/view/24539},
  timestamp    = {Thu, 11 Apr 2024 13:34:47 +0200},
  biburl       = {https://dblp.org/rec/conf/sbrc/LuzAC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZaccagninoCGLMZ23,
  author       = {Rocco Zaccagnino and
                  Antonio Cirillo and
                  Alfonso Guarino and
                  Nicola Lettieri and
                  Delfina Malandrino and
                  Gianluca Zaccagnino},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Towards a Geometric Deep Learning-Based Cyber Security: Network System
                  Intrusion Detection Using Graph Neural Networks},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {394--401},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012085700003555},
  doi          = {10.5220/0012085700003555},
  timestamp    = {Mon, 31 Jul 2023 15:34:21 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZaccagninoCGLMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgiot/ChengCC23,
  author       = {Sheng{-}Tzong Cheng and
                  Yu{-}Ling Cheng and
                  Ka{-}Chun Cheung},
  editor       = {Der{-}Jiunn Deng and
                  Jyh{-}Cheng Chen},
  title        = {Rule Generation for Network Intrusion Detection Systems Based on Packets-To-Video
                  Transformation},
  booktitle    = {Smart Grid and Internet of Things - 7th {EAI} International Conference,
                  SGIoT 2023, TaiChung, Taiwan, November 18-19, 2023, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {557},
  pages        = {51--65},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-55976-1\_6},
  doi          = {10.1007/978-3-031-55976-1\_6},
  timestamp    = {Fri, 19 Apr 2024 15:50:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sgiot/ChengCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skima/AriffinMDHBW23,
  author       = {Sharifah Haizah Syed Ariffin and
                  Nordurratul Hikmah Mustaffa and
                  Favian Dewanta and
                  Ida Wahidah Hamzah and
                  Muhammad Ariff Baharudin and
                  Nur Haliza Abdul Wahab},
  title        = {Hybrid Feature Selection Based Lightweight Network Intrusion Detection
                  System for {MQTT} Protocol},
  booktitle    = {15th International Conference on Software, Knowledge, Information
                  Management and Applications, {SKIMA} 2023, Kuala Lumpur, Malaysia,
                  December 8-10, 2023},
  pages        = {226--230},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SKIMA59232.2023.10387337},
  doi          = {10.1109/SKIMA59232.2023.10387337},
  timestamp    = {Tue, 13 Feb 2024 21:33:06 +0100},
  biburl       = {https://dblp.org/rec/conf/skima/AriffinMDHBW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcomp/HoweP23,
  author       = {Alex Howe and
                  Mauricio Papa},
  title        = {Feature Engineering in Machine Learning-Based Intrusion Detection
                  Systems for {OT} Networks},
  booktitle    = {2023 {IEEE} International Conference on Smart Computing, {SMARTCOMP}
                  2023, Nashville, TN, USA, June 26-30, 2023},
  pages        = {361--366},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SMARTCOMP58114.2023.00086},
  doi          = {10.1109/SMARTCOMP58114.2023.00086},
  timestamp    = {Tue, 15 Aug 2023 09:17:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcomp/HoweP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/swarm/LiLP23,
  author       = {Lixiang Li and
                  Yuxuan Liu and
                  Haipeng Peng},
  editor       = {Ying Tan and
                  Yuhui Shi and
                  Wenjian Luo},
  title        = {Intrusion Detection Method Based on Complementary Adversarial Generation
                  Network},
  booktitle    = {Advances in Swarm Intelligence - 14th International Conference, {ICSI}
                  2023, Shenzhen, China, July 14-18, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13969},
  pages        = {260--271},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-36625-3\_21},
  doi          = {10.1007/978-3-031-36625-3\_21},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/swarm/LiLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uemcom/RizviSMS23,
  author       = {Syed Rizvi and
                  Mark Scanlon and
                  Jimmy McGibney and
                  John Sheppard},
  editor       = {Satyajit Chakrabarti and
                  Rajashree Paul},
  title        = {An Evaluation of AI-Based Network Intrusion Detection in Resource-Constrained
                  Environments},
  booktitle    = {14th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile
                  Communication Conference, {UEMCON} 2023, New York, NY, USA, October
                  12-14, 2023},
  pages        = {275--282},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/UEMCON59035.2023.10315971},
  doi          = {10.1109/UEMCON59035.2023.10315971},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uemcom/RizviSMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Wei00H23,
  author       = {Feng Wei and
                  Hongda Li and
                  Ziming Zhao and
                  Hongxin Hu},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {xNIDS: Explaining Deep Learning-based Network Intrusion Detection
                  Systems for Active Intrusion Responses},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4337--4354},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/wei-feng},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Wei00H23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vsip/FengZZZ023,
  author       = {Yanxiang Feng and
                  Enyan Zhang and
                  Yang Zhang and
                  Zhen Zeng and
                  Aili Wang},
  title        = {Network Intrusion Detection Based on Federated Learning with Inherited
                  Private Models},
  booktitle    = {Proceedings of the 5th International Conference on Video, Signal and
                  Image Processing, {VSIP} 2023, Harbin, China, November 24-26, 2023},
  pages        = {16--22},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638682.3638685},
  doi          = {10.1145/3638682.3638685},
  timestamp    = {Mon, 27 May 2024 15:50:40 +0200},
  biburl       = {https://dblp.org/rec/conf/vsip/FengZZZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/LiuBL23,
  author       = {Qian Liu and
                  Weijie Bao and
                  Qilie Liu},
  title        = {Research on Vehicular External Network Intrusion Detection System
                  Based on Ensemble Learning},
  booktitle    = {98th {IEEE} Vehicular Technology Conference, {VTC} Fall 2023, Hong
                  Kong, SAR, China, October 10-13, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VTC2023-Fall60731.2023.10333498},
  doi          = {10.1109/VTC2023-FALL60731.2023.10333498},
  timestamp    = {Wed, 10 Jan 2024 16:12:42 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/LiuBL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/UllahBKK023,
  author       = {Safi Ullah and
                  Wadii Boulila and
                  Anis Koubaa and
                  Zahid Khan and
                  Jawad Ahmad},
  title        = {{ABDNN-IDS:} Attention-Based Deep Neural Networks for Intrusion Detection
                  in Industrial IoT},
  booktitle    = {98th {IEEE} Vehicular Technology Conference, {VTC} Fall 2023, Hong
                  Kong, SAR, China, October 10-13, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VTC2023-Fall60731.2023.10333818},
  doi          = {10.1109/VTC2023-FALL60731.2023.10333818},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/UllahBKK023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ElghalhoudNZS23,
  author       = {Omar Elghalhoud and
                  Kshirasagar Naik and
                  Marzia Zaman and
                  Ricardo Manzano S.},
  title        = {Data Balancing and {CNN} based Network Intrusion Detection System},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2023,
                  Glasgow, UK, March 26-29, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WCNC55385.2023.10118702},
  doi          = {10.1109/WCNC55385.2023.10118702},
  timestamp    = {Fri, 19 May 2023 11:20:49 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/ElghalhoudNZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ShiXZW23,
  author       = {Zhixin Shi and
                  Mengyan Xing and
                  Jing Zhang and
                  B. Hao Wu},
  title        = {Few-Shot Network Intrusion Detection Based on Model-Agnostic Meta-Learning
                  with {L2F} Method},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2023,
                  Glasgow, UK, March 26-29, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WCNC55385.2023.10118898},
  doi          = {10.1109/WCNC55385.2023.10118898},
  timestamp    = {Fri, 19 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/ShiXZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-09394,
  author       = {Anabia Sohail and
                  Bibi Ayisha and
                  Irfan Hameed and
                  Muhammad Mohsin Zafar and
                  Asifullah Khan},
  title        = {Deep Neural Networks based Meta-Learning for Network Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/2302.09394},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.09394},
  doi          = {10.48550/ARXIV.2302.09394},
  eprinttype    = {arXiv},
  eprint       = {2302.09394},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-09394.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-08248,
  author       = {Mohamad T. Sultan and
                  Hesham El{-}Sayed and
                  Manzoor Ahmed Khan},
  title        = {An Intrusion Detection Mechanism for MANETs Based on Deep Learning
                  Artificial Neural Networks (ANNs)},
  journal      = {CoRR},
  volume       = {abs/2303.08248},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.08248},
  doi          = {10.48550/ARXIV.2303.08248},
  eprinttype    = {arXiv},
  eprint       = {2303.08248},
  timestamp    = {Mon, 20 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-08248.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-12278,
  author       = {Seonghoon Jeong and
                  Sangho Lee and
                  Hwejae Lee and
                  Huy Kang Kim},
  title        = {{X-CANIDS:} Signal-Aware Explainable Intrusion Detection System for
                  Controller Area Network-Based In-Vehicle Network},
  journal      = {CoRR},
  volume       = {abs/2303.12278},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.12278},
  doi          = {10.48550/ARXIV.2303.12278},
  eprinttype    = {arXiv},
  eprint       = {2303.12278},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-12278.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-07226,
  author       = {Yalu Wang and
                  Zhijie Han and
                  Jie Li and
                  Xin He},
  title        = {{BS-GAT} Behavior Similarity Based Graph Attention Network for Network
                  Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/2304.07226},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.07226},
  doi          = {10.48550/ARXIV.2304.07226},
  eprinttype    = {arXiv},
  eprint       = {2304.07226},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-07226.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-14746,
  author       = {Liam Daly Manocchio and
                  Siamak Layeghy and
                  Wai Weng Lo and
                  Gayan K. Kulatilleke and
                  Mohanad Sarhan and
                  Marius Portmann},
  title        = {FlowTransformer: {A} Transformer Framework for Flow-based Network
                  Intrusion Detection Systems},
  journal      = {CoRR},
  volume       = {abs/2304.14746},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.14746},
  doi          = {10.48550/ARXIV.2304.14746},
  eprinttype    = {arXiv},
  eprint       = {2304.14746},
  timestamp    = {Thu, 04 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-14746.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-04920,
  author       = {Loc Gia Nguyen and
                  Kohei Watabe},
  title        = {Flow-based Network Intrusion Detection Based on {BERT} Masked Language
                  Model},
  journal      = {CoRR},
  volume       = {abs/2306.04920},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.04920},
  doi          = {10.48550/ARXIV.2306.04920},
  eprinttype    = {arXiv},
  eprint       = {2306.04920},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-04920.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-09451,
  author       = {Zhiyan Chen and
                  Murat Simsek and
                  Burak Kantarci and
                  Mehran Bagheri and
                  Petar Djukic},
  title        = {Host-Based Network Intrusion Detection via Feature Flattening and
                  Two-stage Collaborative Classifier},
  journal      = {CoRR},
  volume       = {abs/2306.09451},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.09451},
  doi          = {10.48550/ARXIV.2306.09451},
  eprinttype    = {arXiv},
  eprint       = {2306.09451},
  timestamp    = {Thu, 22 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-09451.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-10191,
  author       = {Shuo Yang and
                  Xinran Zheng and
                  Zhengzhuo Xu and
                  Xingjun Wang},
  title        = {A Lightweight Approach for Network Intrusion Detection based on Self-Knowledge
                  Distillation},
  journal      = {CoRR},
  volume       = {abs/2307.10191},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.10191},
  doi          = {10.48550/ARXIV.2307.10191},
  eprinttype    = {arXiv},
  eprint       = {2307.10191},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-10191.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-14268,
  author       = {Jacopo Talpini and
                  Fabio Sartori and
                  Marco Savi},
  title        = {A Clustering Strategy for Enhanced FL-Based Intrusion Detection in
                  IoT Networks},
  journal      = {CoRR},
  volume       = {abs/2307.14268},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.14268},
  doi          = {10.48550/ARXIV.2307.14268},
  eprinttype    = {arXiv},
  eprint       = {2307.14268},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-14268.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-00077,
  author       = {Khushnaseeb Roshan and
                  Aasim Zafar and
                  Sheikh Burhan Ul Haque},
  title        = {A Novel Deep Learning based Model to Defend Network Intrusion Detection
                  System against Adversarial Attacks},
  journal      = {CoRR},
  volume       = {abs/2308.00077},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.00077},
  doi          = {10.48550/ARXIV.2308.00077},
  eprinttype    = {arXiv},
  eprint       = {2308.00077},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-00077.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-01070,
  author       = {Jinxin Liu and
                  Murat Simsek and
                  Michele Nogueira and
                  Burak Kantarci},
  title        = {Multidomain transformer-based deep learning for early detection of
                  network intrusion},
  journal      = {CoRR},
  volume       = {abs/2309.01070},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.01070},
  doi          = {10.48550/ARXIV.2309.01070},
  eprinttype    = {arXiv},
  eprint       = {2309.01070},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-01070.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-10173,
  author       = {Maloy Kumar Devnath},
  title        = {{GCNIDS:} Graph Convolutional Network-Based Intrusion Detection System
                  for {CAN} Bus},
  journal      = {CoRR},
  volume       = {abs/2309.10173},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.10173},
  doi          = {10.48550/ARXIV.2309.10173},
  eprinttype    = {arXiv},
  eprint       = {2309.10173},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-10173.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-03334,
  author       = {Khushnaseeb Roshan and
                  Aasim Zafar and
                  Sheikh Burhan Ul Haque},
  title        = {Untargeted White-box Adversarial Attack with Heuristic Defence Methods
                  in Real-time Deep Learning based Network Intrusion Detection System},
  journal      = {CoRR},
  volume       = {abs/2310.03334},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.03334},
  doi          = {10.48550/ARXIV.2310.03334},
  eprinttype    = {arXiv},
  eprint       = {2310.03334},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-03334.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-05956,
  author       = {Hamdi Friji and
                  Alexis Olivereau and
                  Mireille Sarkiss},
  title        = {Efficient Network Representation for GNN-based Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/2310.05956},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.05956},
  doi          = {10.48550/ARXIV.2310.05956},
  eprinttype    = {arXiv},
  eprint       = {2310.05956},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-05956.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-09298,
  author       = {Irfan Khan and
                  Yasir Ali Farrukh and
                  Syed Wali},
  title        = {ByteStack-ID: Integrated Stacked Model Leveraging Payload Byte Frequency
                  for Grayscale Image-based Network Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/2310.09298},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.09298},
  doi          = {10.48550/ARXIV.2310.09298},
  eprinttype    = {arXiv},
  eprint       = {2310.09298},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-09298.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-10655,
  author       = {Jacopo Talpini and
                  Fabio Sartori and
                  Marco Savi},
  title        = {Enhancing Trustworthiness in ML-Based Network Intrusion Detection
                  with Uncertainty Quantification},
  journal      = {CoRR},
  volume       = {abs/2310.10655},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.10655},
  doi          = {10.48550/ARXIV.2310.10655},
  eprinttype    = {arXiv},
  eprint       = {2310.10655},
  timestamp    = {Wed, 25 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-10655.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-04135,
  author       = {Ozlem Ceviz and
                  Pinar Sadioglu and
                  Sevil Sen and
                  Vassilios G. Vassilakis},
  title        = {A Novel Federated Learning-based Intrusion Detection System for Flying
                  Ad Hoc Networks},
  journal      = {CoRR},
  volume       = {abs/2312.04135},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.04135},
  doi          = {10.48550/ARXIV.2312.04135},
  eprinttype    = {arXiv},
  eprint       = {2312.04135},
  timestamp    = {Mon, 01 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-04135.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jece/WangC23,
  title        = {Intrusion Detection-Data Security Protection Scheme Based on Particle
                  Swarm-BP Network Algorithm in Cloud Computing Environment},
  journal      = {J. Electr. Comput. Eng.},
  volume       = {2023},
  pages        = {1128545:1--1128545:10},
  year         = {2023},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1155/2023/1128545},
  doi          = {10.1155/2023/1128545},
  timestamp    = {Thu, 21 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jece/WangC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlikhanovJAMNN22,
  author       = {Jumabek Alikhanov and
                  Rhongho Jang and
                  Mohammed Abuhamad and
                  David Mohaisen and
                  Daehun Nyang and
                  Youngtae Noh},
  title        = {Investigating the Effect of Traffic Sampling on Machine Learning-Based
                  Network Intrusion Detection Approaches},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {5801--5823},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2021.3137318},
  doi          = {10.1109/ACCESS.2021.3137318},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AlikhanovJAMNN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AliyuEMKL22,
  author       = {Ibrahim Aliyu and
                  S{\'{e}}linde van Engelenburg and
                  Muhammed Bashir Mu'azu and
                  Jinsul Kim and
                  Chang Gyoon Lim},
  title        = {Statistical Detection of Adversarial Examples in Blockchain-Based
                  Federated Forest In-Vehicle Network Intrusion Detection Systems},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {109366--109384},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3212412},
  doi          = {10.1109/ACCESS.2022.3212412},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AliyuEMKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FaustoGPM22,
  author       = {Alessandro Fausto and
                  Giovanni Battista Gaggero and
                  Fabio Patrone and
                  Mario Marchese},
  title        = {Reduction of the Delays Within an Intrusion Detection System {(IDS)}
                  Based on Software Defined Networking {(SDN)}},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {109850--109862},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3214974},
  doi          = {10.1109/ACCESS.2022.3214974},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/FaustoGPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GhanemGJNSNAASO22,
  author       = {Waheed Ali H. M. Ghanem and
                  Sanaa Abduljabbar Ahmed Ghaleb and
                  Aman Jantan and
                  Abdullah B. Nasser and
                  Sami Abdulla Mohsen Saleh and
                  Amir Ngah and
                  Arifah Che Alhadi and
                  Humaira Arshad and
                  Abdul{-}Malik H. Y. Saad and
                  Abiodun Esther Omolara and
                  Yousef A. Baker El{-}Ebiary and
                  Oludare Isaac Abiodun},
  title        = {Cyber Intrusion Detection System Based on a Multiobjective Binary
                  Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for
                  Parameter Optimization in Neural Networks},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {76318--76339},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3192472},
  doi          = {10.1109/ACCESS.2022.3192472},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GhanemGJNSNAASO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JanabiKJ22a,
  author       = {Ahmed H. Janabi and
                  Triantafyllos Kanakis and
                  Mark Johnson},
  title        = {Overhead Reduction Technique for Software-Defined Network Based Intrusion
                  Detection Systems},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {66481--66491},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3184722},
  doi          = {10.1109/ACCESS.2022.3184722},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JanabiKJ22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimP22,
  author       = {Taehoon Kim and
                  Wooguil Pak},
  title        = {Robust Network Intrusion Detection System Based on Machine-Learning
                  With Early Classification},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {10754--10767},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3145002},
  doi          = {10.1109/ACCESS.2022.3145002},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KimP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimP22a,
  author       = {Taehoon Kim and
                  Wooguil Pak},
  title        = {Early Detection of Network Intrusions Using a GAN-Based One-Class
                  Classifier},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {119357--119367},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3221400},
  doi          = {10.1109/ACCESS.2022.3221400},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KimP22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LeeJCLC22,
  author       = {Seyoung Lee and
                  Hyo Jin Jo and
                  Aram Cho and
                  Dong Hoon Lee and
                  Wonsuk Choi},
  title        = {{TTIDS:} Transmission-Resuming Time-Based Intrusion Detection System
                  for Controller Area Network {(CAN)}},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {52139--52153},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3174356},
  doi          = {10.1109/ACCESS.2022.3174356},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LeeJCLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SelvarajanKKAK22,
  author       = {Shitharth Selvarajan and
                  Pravin Kshirsagar and
                  Balachandran Praveen Kumar and
                  Khaled Hamed Alyoubi and
                  Alaa O. Khadidos},
  title        = {An Innovative Perceptual Pigeon Galvanized Optimization {(PPGO)} Based
                  Likelihood Na{\"{\i}}ve Bayes {(LNB)} Classification Approach
                  for Network Intrusion Detection System},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {46424--46441},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3171660},
  doi          = {10.1109/ACCESS.2022.3171660},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SelvarajanKKAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SiddiqiP22,
  author       = {Murtaza Ahmed Siddiqi and
                  Wooguil Pak},
  title        = {Tier-Based Optimization for Synthesized Network Intrusion Detection
                  System},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {108530--108544},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3213937},
  doi          = {10.1109/ACCESS.2022.3213937},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SiddiqiP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aes/KurniMYT22,
  author       = {Muralidhar Kurni and
                  S. Md. Mujeeb and
                  Bharath Bhushan Yannam and
                  Arun Singh T},
  title        = {MRPO-Deep maxout: Manta ray political optimization based Deep maxout
                  network for big data intrusion detection using spark architecture},
  journal      = {Adv. Eng. Softw.},
  volume       = {174},
  pages        = {103324},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.advengsoft.2022.103324},
  doi          = {10.1016/J.ADVENGSOFT.2022.103324},
  timestamp    = {Thu, 01 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aes/KurniMYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithms/MijalkovicS22,
  author       = {Jovana Mijalkovic and
                  Angelo Spognardi},
  title        = {Reducing the False Negative Rate in Deep Learning Based Network Intrusion
                  Detection Systems},
  journal      = {Algorithms},
  volume       = {15},
  number       = {8},
  pages        = {258},
  year         = {2022},
  url          = {https://doi.org/10.3390/a15080258},
  doi          = {10.3390/A15080258},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithms/MijalkovicS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithms/YangAZ22,
  author       = {Bin Yang and
                  Muhammad Haseeb Arshad and
                  Qing Zhao},
  title        = {Packet-Level and Flow-Level Network Intrusion Detection Based on Reinforcement
                  Learning and Adversarial Training},
  journal      = {Algorithms},
  volume       = {15},
  number       = {12},
  pages        = {453},
  year         = {2022},
  url          = {https://doi.org/10.3390/a15120453},
  doi          = {10.3390/A15120453},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithms/YangAZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amm/Yu22,
  author       = {Ju{-}zhen Yu},
  title        = {Intrusion Detection Technology for Wireless Sensor Networks Based
                  on Autoregressive Moving Average},
  journal      = {Adv. Multim.},
  volume       = {2022},
  pages        = {2155748:1--2155748:7},
  year         = {2022},
  url          = {https://doi.org/10.1155/2022/2155748},
  doi          = {10.1155/2022/2155748},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amm/Yu22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/RashidKIWG22,
  author       = {Md. Mamunur Rashid and
                  Joarder Kamruzzaman and
                  Tasadduq Imam and
                  Santoso Wibowo and
                  Steven Gordon},
  title        = {A tree-based stacking ensemble technique with feature selection for
                  network intrusion detection},
  journal      = {Appl. Intell.},
  volume       = {52},
  number       = {9},
  pages        = {9768--9781},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10489-021-02968-1},
  doi          = {10.1007/S10489-021-02968-1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/RashidKIWG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bdcc/YounisseAA22,
  author       = {Remah Younisse and
                  Ashraf Ahmad and
                  Qasem Abu Al{-}Haija},
  title        = {Explaining Intrusion Detection-Based Convolutional Neural Networks
                  Using Shapley Additive Explanations {(SHAP)}},
  journal      = {Big Data Cogn. Comput.},
  volume       = {6},
  number       = {4},
  pages        = {126},
  year         = {2022},
  url          = {https://doi.org/10.3390/bdcc6040126},
  doi          = {10.3390/BDCC6040126},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bdcc/YounisseAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bdr/SarhanLP22,
  author       = {Mohanad Sarhan and
                  Siamak Layeghy and
                  Marius Portmann},
  title        = {Evaluating Standard Feature Sets Towards Increased Generalisability
                  and Explainability of ML-Based Network Intrusion Detection},
  journal      = {Big Data Res.},
  volume       = {30},
  pages        = {100359},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.bdr.2022.100359},
  doi          = {10.1016/J.BDR.2022.100359},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bdr/SarhanLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/AlQahtaniK22,
  author       = {Hamed AlQahtani and
                  Gulshan Kumar},
  title        = {A deep learning-based intrusion detection system for in-vehicle networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {104},
  number       = {Part},
  pages        = {108447},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compeleceng.2022.108447},
  doi          = {10.1016/J.COMPELECENG.2022.108447},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/AlQahtaniK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/GuptaSGK22,
  author       = {Karan Gupta and
                  Deepak Kumar Sharma and
                  Koyel Datta Gupta and
                  Anil Kumar},
  title        = {A tree classifier based network intrusion detection model for Internet
                  of Medical Things},
  journal      = {Comput. Electr. Eng.},
  volume       = {102},
  pages        = {108158},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compeleceng.2022.108158},
  doi          = {10.1016/J.COMPELECENG.2022.108158},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/GuptaSGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/RaviCA22,
  author       = {Vinayakumar Ravi and
                  Rajasekhar Chaganti and
                  Mamoun Alazab},
  title        = {Recurrent deep learning-based feature fusion ensemble meta-classifier
                  approach for intelligent network intrusion detection system},
  journal      = {Comput. Electr. Eng.},
  volume       = {102},
  pages        = {108156},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compeleceng.2022.108156},
  doi          = {10.1016/J.COMPELECENG.2022.108156},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/RaviCA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/SabaRSKB22,
  author       = {Tanzila Saba and
                  Amjad Rehman and
                  Tariq Sadad and
                  Hoshang Kolivand and
                  Saeed Ali Bahaj},
  title        = {Anomaly-based intrusion detection system for IoT networks through
                  deep learning model},
  journal      = {Comput. Electr. Eng.},
  volume       = {99},
  pages        = {107810},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compeleceng.2022.107810},
  doi          = {10.1016/J.COMPELECENG.2022.107810},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/SabaRSKB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/SinghSSAYT22,
  author       = {Saurabh Singh and
                  Sparsh Sharma and
                  Surbhi Sharma and
                  Osama Alfarraj and
                  Byungun Yoon and
                  Amr Tolba},
  title        = {Intrusion Detection System-Based Security Mechanism for Vehicular
                  Ad-Hoc Networks for Industrial IoT},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {11},
  number       = {6},
  pages        = {83--92},
  year         = {2022},
  url          = {https://doi.org/10.1109/MCE.2021.3138703},
  doi          = {10.1109/MCE.2021.3138703},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cem/SinghSSAYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiuZLFY22,
  author       = {Guangrui Liu and
                  Weizhe Zhang and
                  Xinjie Li and
                  Kaisheng Fan and
                  Shui Yu},
  title        = {VulnerGAN: a backdoor attack through vulnerability amplification against
                  machine learning-based network intrusion detection systems},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {7},
  pages        = {1--19},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-021-3455-1},
  doi          = {10.1007/S11432-021-3455-1},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiuZLFY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/AjdaniG22,
  author       = {Mahdi Ajdani and
                  Hamid Reza Ghaffary},
  title        = {Improving network intrusion detection by identifying effective features
                  based on probabilistic dependency trees and evolutionary algorithm},
  journal      = {Clust. Comput.},
  volume       = {25},
  number       = {5},
  pages        = {3299--3311},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10586-022-03564-9},
  doi          = {10.1007/S10586-022-03564-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/AjdaniG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/NayerP22,
  author       = {Md. Nayer and
                  Subhash Chandra Pandey},
  title        = {Chromosomes identification based differential evolution {(CIDE):}
                  a new bio-inspired variant for network intrusion detection},
  journal      = {Clust. Comput.},
  volume       = {25},
  number       = {5},
  pages        = {3459--3480},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10586-022-03574-7},
  doi          = {10.1007/S10586-022-03574-7},
  timestamp    = {Tue, 20 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/NayerP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BaldiniA22,
  author       = {Gianmarco Baldini and
                  Irene Amerini},
  title        = {Online Distributed Denial of Service (DDoS) intrusion detection based
                  on adaptive sliding window and morphological fractal dimension},
  journal      = {Comput. Networks},
  volume       = {210},
  pages        = {108923},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.108923},
  doi          = {10.1016/J.COMNET.2022.108923},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BaldiniA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/FuZ22,
  author       = {Juan{-}juan Fu and
                  Xing{-}Lan Zhang},
  title        = {Gradient importance enhancement based feature fusion intrusion detection
                  technique},
  journal      = {Comput. Networks},
  volume       = {214},
  pages        = {109180},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.109180},
  doi          = {10.1016/J.COMNET.2022.109180},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/FuZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HorchulhackVS22,
  author       = {Pedro Horchulhack and
                  Eduardo K. Viegas and
                  Altair O. Santin},
  title        = {Toward feasible machine learning model updates in network-based intrusion
                  detection},
  journal      = {Comput. Networks},
  volume       = {202},
  pages        = {108618},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2021.108618},
  doi          = {10.1016/J.COMNET.2021.108618},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/HorchulhackVS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HouXLSW22,
  author       = {Tianhao Hou and
                  Hongyan Xing and
                  Xinyi Liang and
                  Xin Su and
                  Zenghui Wang},
  title        = {Network intrusion detection based on {DNA} spatial information},
  journal      = {Comput. Networks},
  volume       = {217},
  pages        = {109318},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.109318},
  doi          = {10.1016/J.COMNET.2022.109318},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HouXLSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SouzaWMLWG22,
  author       = {Cristiano Antonio de Souza and
                  Carlos Becker Westphall and
                  Renato Bobsin Machado and
                  Leandro Loffi and
                  Carla Merkle Westphall and
                  Guilherme Arthur Geronimo},
  title        = {Intrusion detection and prevention in fog based IoT environments:
                  {A} systematic literature review},
  journal      = {Comput. Networks},
  volume       = {214},
  pages        = {109154},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.109154},
  doi          = {10.1016/J.COMNET.2022.109154},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/SouzaWMLWG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/AhmedLS22,
  author       = {Usman Ahmed and
                  Jerry Chun{-}Wei Lin and
                  Gautam Srivastava},
  title        = {A resource allocation deep active learning based on load balancer
                  for network intrusion detection in {SDN} sensors},
  journal      = {Comput. Commun.},
  volume       = {184},
  pages        = {56--63},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comcom.2021.12.009},
  doi          = {10.1016/J.COMCOM.2021.12.009},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/AhmedLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AksuA22,
  author       = {Dogukan Aksu and
                  Muhammed Ali Aydin},
  title        = {{MGA-IDS:} Optimal feature subset selection for anomaly detection
                  framework on in-vehicle networks-CAN bus based on genetic algorithm
                  and intrusion detection approach},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102717},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102717},
  doi          = {10.1016/J.COSE.2022.102717},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AksuA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuptaJB22,
  author       = {Neha Gupta and
                  Vinita Jindal and
                  Punam Bedi},
  title        = {{CSE-IDS:} Using cost-sensitive deep learning and ensemble algorithms
                  to handle class imbalance in network-based intrusion detection systems},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102499},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102499},
  doi          = {10.1016/J.COSE.2021.102499},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuptaJB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeCCCHK22,
  author       = {Jung{-}San Lee and
                  Ying{-}Chin Chen and
                  Chit{-}Jie Chew and
                  Chih{-}Lung Chen and
                  Thu{-}Nguyet Huynh and
                  Chung{-}Wei Kuo},
  title        = {CoNN-IDS: Intrusion detection system based on collaborative neural
                  networks and agile training},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102908},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102908},
  doi          = {10.1016/J.COSE.2022.102908},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeCCCHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangJTWH22,
  author       = {Wei Wang and
                  Songlei Jian and
                  Yusong Tan and
                  Qingbo Wu and
                  Chenlin Huang},
  title        = {Representation learning-based network intrusion detection system by
                  capturing explicit and implicit feature interactions},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102537},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102537},
  doi          = {10.1016/J.COSE.2021.102537},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangJTWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangLLWWZH22,
  author       = {Zhen Yang and
                  Xiaodong Liu and
                  Tong Li and
                  Di Wu and
                  Jinjiang Wang and
                  Yunwei Zhao and
                  Han Han},
  title        = {A systematic literature review of methods and datasets for anomaly-based
                  network intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102675},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102675},
  doi          = {10.1016/J.COSE.2022.102675},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangLLWWZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangJWWLY22,
  author       = {Chunying Zhang and
                  Donghao Jia and
                  Liya Wang and
                  Wenjie Wang and
                  Fengchun Liu and
                  Aimin Yang},
  title        = {Comparative research on network intrusion detection methods based
                  on machine learning},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102861},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102861},
  doi          = {10.1016/J.COSE.2022.102861},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangJWWLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/AlavizadehAJ22,
  author       = {Hooman Alavizadeh and
                  Hootan Alavizadeh and
                  Julian Jang{-}Jaccard},
  title        = {Deep Q-Learning Based Reinforcement Learning Approach for Network
                  Intrusion Detection},
  journal      = {Comput.},
  volume       = {11},
  number       = {3},
  pages        = {41},
  year         = {2022},
  url          = {https://doi.org/10.3390/computers11030041},
  doi          = {10.3390/COMPUTERS11030041},
  timestamp    = {Tue, 10 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/AlavizadehAJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/XuJLSK22,
  author       = {Wen Xu and
                  Julian Jang{-}Jaccard and
                  Tong Liu and
                  Fariza Sabrina and
                  Jin Kwak},
  title        = {Improved Bidirectional GAN-Based Approach for Network Intrusion Detection
                  Using One-Class Classifier},
  journal      = {Comput.},
  volume       = {11},
  number       = {6},
  pages        = {85},
  year         = {2022},
  url          = {https://doi.org/10.3390/computers11060085},
  doi          = {10.3390/COMPUTERS11060085},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/XuJLSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/GangulaVM22,
  author       = {Rekha Gangula and
                  Murali Mohan V. and
                  Ranjeeth Kumar M},
  title        = {Network intrusion detection system for Internet of Things based on
                  enhanced flower pollination algorithm and ensemble classifier},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {34},
  number       = {21},
  year         = {2022},
  url          = {https://doi.org/10.1002/cpe.7103},
  doi          = {10.1002/CPE.7103},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/GangulaVM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/KrishnaveniSSP22,
  author       = {Sivamohan Krishnaveni and
                  Sivanandam Sivamohan and
                  Subramanian Sridhar and
                  Subramani Prabhakaran},
  title        = {Network intrusion detection based on ensemble classification and feature
                  selection method for cloud computing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {34},
  number       = {11},
  year         = {2022},
  url          = {https://doi.org/10.1002/cpe.6838},
  doi          = {10.1002/CPE.6838},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/KrishnaveniSSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/SugithaPK22,
  author       = {George Sugitha and
                  B. C. Preethi and
                  G. Kavitha},
  title        = {Intrusion detection framework using stacked auto encoder based deep
                  neural network in {IOT} network},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {34},
  number       = {28},
  year         = {2022},
  url          = {https://doi.org/10.1002/cpe.7401},
  doi          = {10.1002/CPE.7401},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/SugithaPK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/ArivazhagiK22,
  author       = {A. Arivazhagi and
                  S. Raja Kumar},
  title        = {An Efficient Stabbing Based Intrusion Detection Framework for Sensor
                  Networks},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {43},
  number       = {1},
  pages        = {141--157},
  year         = {2022},
  url          = {https://doi.org/10.32604/csse.2022.021851},
  doi          = {10.32604/CSSE.2022.021851},
  timestamp    = {Tue, 10 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/ArivazhagiK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/elektrik/CanerEE22,
  author       = {Serhat Caner and
                  Nesli Erdogmus and
                  Yusuf Murat Erten},
  title        = {Performance analysis and feature selection for network-based intrusion
                  detectionwith deep learning},
  journal      = {Turkish J. Electr. Eng. Comput. Sci.},
  volume       = {30},
  number       = {3},
  pages        = {629--643},
  year         = {2022},
  url          = {https://doi.org/10.55730/1300-0632.3802},
  doi          = {10.55730/1300-0632.3802},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/elektrik/CanerEE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/es/HabeebB22,
  author       = {Mohammed Sayeeduddin Habeeb and
                  Tummala Ranga Babu},
  title        = {Network intrusion detection system: {A} survey on artificial intelligence-based
                  techniques},
  journal      = {Expert Syst. J. Knowl. Eng.},
  volume       = {39},
  number       = {9},
  year         = {2022},
  url          = {https://doi.org/10.1111/exsy.13066},
  doi          = {10.1111/EXSY.13066},
  timestamp    = {Tue, 16 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/es/HabeebB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/AsadG22,
  author       = {Hafizul Asad and
                  Ilir Gashi},
  title        = {Dynamical analysis of diversity in rule-based open source network
                  intrusion detection systems},
  journal      = {Empir. Softw. Eng.},
  volume       = {27},
  number       = {1},
  pages        = {4},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10664-021-10046-w},
  doi          = {10.1007/S10664-021-10046-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ese/AsadG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/GavelRT22,
  author       = {Shashank Gavel and
                  Ajay Singh Raghuvanshi and
                  Sudarshan Tiwari},
  title        = {Maximum correlation based mutual information scheme for intrusion
                  detection in the data networks},
  journal      = {Expert Syst. Appl.},
  volume       = {189},
  pages        = {116089},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2021.116089},
  doi          = {10.1016/J.ESWA.2021.116089},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/GavelRT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/KannaS22,
  author       = {P. Rajesh Kanna and
                  P. Santhi},
  title        = {Hybrid Intrusion Detection using MapReduce based Black Widow Optimized
                  Convolutional Long Short-Term Memory Neural Networks},
  journal      = {Expert Syst. Appl.},
  volume       = {194},
  pages        = {116545},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2022.116545},
  doi          = {10.1016/J.ESWA.2022.116545},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/KannaS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/PingaleS22,
  author       = {Subhash V. Pingale and
                  Sanjay R. Sutar},
  title        = {Remora whale optimization-based hybrid deep learning for network intrusion
                  detection using {CNN} features},
  journal      = {Expert Syst. Appl.},
  volume       = {210},
  pages        = {118476},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2022.118476},
  doi          = {10.1016/J.ESWA.2022.118476},
  timestamp    = {Thu, 13 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/PingaleS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/WangLHC22,
  author       = {Zhendong Wang and
                  Zeyu Li and
                  Daojing He and
                  Sammy Chan},
  title        = {A lightweight approach for network intrusion detection in industrial
                  cyber-physical systems based on knowledge distillation and deep metric
                  learning},
  journal      = {Expert Syst. Appl.},
  volume       = {206},
  pages        = {117671},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2022.117671},
  doi          = {10.1016/J.ESWA.2022.117671},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/WangLHC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ZhaoHJGL22,
  author       = {Xu Zhao and
                  Guangqiu Huang and
                  Jin Jiang and
                  Lin Gao and
                  Maozhen Li},
  title        = {Task offloading of cooperative intrusion detection system based on
                  Deep {Q} Network in mobile edge computing},
  journal      = {Expert Syst. Appl.},
  volume       = {206},
  pages        = {117860},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2022.117860},
  doi          = {10.1016/J.ESWA.2022.117860},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/ZhaoHJGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AnsariBL22,
  author       = {Mohammad Samar Ansari and
                  V{\'{a}}clav Bartos and
                  Brian A. Lee},
  title        = {GRU-based deep learning approach for network intrusion alert prediction},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {128},
  pages        = {235--247},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2021.09.040},
  doi          = {10.1016/J.FUTURE.2021.09.040},
  timestamp    = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/AnsariBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/DingCDFC22,
  author       = {Hongwei Ding and
                  Leiyang Chen and
                  Liang Dong and
                  Zhongwang Fu and
                  Xiaohui Cui},
  title        = {Imbalanced data classification: {A} {KNN} and generative adversarial
                  networks-based hybrid approach for intrusion detection},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {131},
  pages        = {240--254},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2022.01.026},
  doi          = {10.1016/J.FUTURE.2022.01.026},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/DingCDFC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiuMZAW22,
  author       = {Zhiqiang Liu and
                  Ghulam Mohiuddin and
                  Jiangbin Zheng and
                  Muhammad Asim and
                  Sifei Wang},
  title        = {Intrusion detection in wireless sensor network using enhanced empirical
                  based component analysis},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {135},
  pages        = {181--193},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2022.04.024},
  doi          = {10.1016/J.FUTURE.2022.04.024},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiuMZAW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/YuYL22,
  author       = {Jing Yu and
                  Xiaojun Ye and
                  Hongbo Li},
  title        = {A high precision intrusion detection system for network security communication
                  based on multi-scale convolutional neural network},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {129},
  pages        = {399--406},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2021.10.018},
  doi          = {10.1016/J.FUTURE.2021.10.018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/YuYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhangZGYL22,
  author       = {Zhao Zhang and
                  Yong Zhang and
                  Da Guo and
                  Lei Yao and
                  Zhao Li},
  title        = {SecFedNIDS: Robust defense for poisoning attack against federated
                  learning-based network intrusion detection system},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {134},
  pages        = {154--169},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2022.04.010},
  doi          = {10.1016/J.FUTURE.2022.04.010},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhangZGYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/grid/FotohiAG22,
  author       = {Reza Fotohi and
                  Masoud Abdan and
                  Sanaz Ghasemi},
  title        = {A Self-Adaptive Intrusion Detection System for Securing UAV-to-UAV
                  Communications Based on the Human Immune System in {UAV} Networks},
  journal      = {J. Grid Comput.},
  volume       = {20},
  number       = {3},
  pages        = {22},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10723-022-09614-1},
  doi          = {10.1007/S10723-022-09614-1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/grid/FotohiAG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iajit/NtiNAS22,
  author       = {Isaac Kofi Nti and
                  Owusu Narko{-}Boateng and
                  Adebayo Felix Adekoya and
                  Arjun Remadevi Somanathan},
  title        = {Stacknet based decision fusion classifier for network intrusion detection},
  journal      = {Int. Arab J. Inf. Technol.},
  volume       = {19},
  number       = {3A},
  pages        = {478--490},
  year         = {2022},
  url          = {https://doi.org/10.34028/iajit/19/3A/8},
  doi          = {10.34028/IAJIT/19/3A/8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iajit/NtiNAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/WeiCLWZ22,
  author       = {Jingwen Wei and
                  Ye Chen and
                  Yingxu Lai and
                  Yuhang Wang and
                  Zhaoyi Zhang},
  title        = {Domain Adversarial Neural Network-Based Intrusion Detection System
                  for In-Vehicle Network Variant Attacks},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {26},
  number       = {11},
  pages        = {2547--2551},
  year         = {2022},
  url          = {https://doi.org/10.1109/LCOMM.2022.3195486},
  doi          = {10.1109/LCOMM.2022.3195486},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/WeiCLWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/LiWMLS22,
  author       = {Wenjuan Li and
                  Yu Wang and
                  Weizhi Meng and
                  Jin Li and
                  Chunhua Su},
  title        = {BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection
                  in Software Defined Networking},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {105-D},
  number       = {2},
  pages        = {272--279},
  year         = {2022},
  url          = {https://doi.org/10.1587/transinf.2021bcp0013},
  doi          = {10.1587/TRANSINF.2021BCP0013},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/LiWMLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaacs/Li22,
  author       = {Linlin Li},
  title        = {The intrusion data mining method for distributed network based on
                  fuzzy kernel clustering algorithm},
  journal      = {Int. J. Auton. Adapt. Commun. Syst.},
  volume       = {15},
  number       = {1},
  pages        = {32--45},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAACS.2022.122942},
  doi          = {10.1504/IJAACS.2022.122942},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaacs/Li22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaci/ParganihaSS22,
  author       = {Vivek Parganiha and
                  Soorya Prakash Shukla and
                  Lokesh Kumar Sharma},
  title        = {Cloud Intrusion Detection Model Based on Deep Belief Network and Grasshopper
                  Optimization},
  journal      = {Int. J. Ambient Comput. Intell.},
  volume       = {13},
  number       = {1},
  pages        = {1--24},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijaci.293123},
  doi          = {10.4018/IJACI.293123},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaci/ParganihaSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaec/ChaibiAM22,
  author       = {Nassima Chaibi and
                  Baghdad Atmani and
                  Most{\'{e}}fa Mokaddem},
  title        = {A Convolutional Neural Network With Feature Selection-Based Network
                  Intrusion Detection},
  journal      = {Int. J. Appl. Evol. Comput.},
  volume       = {13},
  number       = {1},
  pages        = {1--21},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijaec.302014},
  doi          = {10.4018/IJAEC.302014},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaec/ChaibiAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaip/MakaniR22,
  author       = {Ruchi Makani and
                  B. V. R. Reddy},
  title        = {Trust-based-tuning of Bayesian-watchdog intrusion detection for fast
                  and improved detection of black hole attacks in mobile ad hoc networks},
  journal      = {Int. J. Adv. Intell. Paradigms},
  volume       = {21},
  number       = {1/2},
  pages        = {53--71},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAIP.2022.121029},
  doi          = {10.1504/IJAIP.2022.121029},
  timestamp    = {Mon, 14 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijaip/MakaniR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChenniappanadarSSK22,
  author       = {Santhosh Kumar Chenniappanadar and
                  Gnanamurthy Sundharamurthy and
                  Vinoth Kumar Sakthivelu and
                  Vishnu Kumar Kaliappan},
  title        = {A Supervised Machine Learning Based Intrusion Detection Model for
                  Detecting Cyber-Attacks Against Computer System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {16--25},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i3.5567},
  doi          = {10.17762/IJCNIS.V14I3.5567},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChenniappanadarSSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YuwonoU22,
  author       = {Imam Yuwono and
                  Eviani Damastuti Utomo},
  title        = {Neurological Disorders Detection Based on Computer Brain Interface
                  Using Centralized Blockchain with Intrusion System},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {168--178},
  year         = {2022},
  url          = {https://doi.org/10.17762/ijcnis.v14i2.5498},
  doi          = {10.17762/IJCNIS.V14I2.5498},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YuwonoU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/JyothsnaPGD22,
  author       = {V. Jyothsna and
                  K. Munivara Prasad and
                  GopiChand G and
                  Durga Bhavani D},
  title        = {{DLMHS:} Flow-based intrusion detection system using deep learning
                  neural network and meta-heuristic scale},
  journal      = {Int. J. Commun. Syst.},
  volume       = {35},
  number       = {10},
  year         = {2022},
  url          = {https://doi.org/10.1002/dac.5159},
  doi          = {10.1002/DAC.5159},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/JyothsnaPGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/WeiRLZ22,
  author       = {Min Wei and
                  Chunmeng Rong and
                  Erxiong Liang and
                  Yuan Zhuang},
  title        = {An intrusion detection mechanism for IPv6-based wireless sensor networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {18},
  number       = {3},
  pages        = {155013292210779},
  year         = {2022},
  url          = {https://doi.org/10.1177/15501329221077922},
  doi          = {10.1177/15501329221077922},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/WeiRLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdst/PawarJ22,
  author       = {Mohandas V. Pawar and
                  Anuradha Jagadeesan},
  title        = {Opposition-Based Deer Hunting Optimization-Based Hybrid Classifier
                  for Intrusion Detection in Wireless Sensor Networks},
  journal      = {Int. J. Distributed Syst. Technol.},
  volume       = {13},
  number       = {5},
  pages        = {1--29},
  year         = {2022},
  url          = {https://doi.org/10.4018/IJDST.300356},
  doi          = {10.4018/IJDST.300356},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdst/PawarJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/CuiMLW22,
  author       = {Ajun Cui and
                  Yan{-}hong Ma and
                  Chen Li and
                  Xiao{-}ming Wang},
  title        = {Retrieval method for multi-level network malicious intrusion information
                  based on sequential logic model},
  journal      = {Int. J. Inf. Commun. Technol.},
  volume       = {21},
  number       = {4},
  pages        = {386--397},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICT.2022.10051126},
  doi          = {10.1504/IJICT.2022.10051126},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijict/CuiMLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/MoZ22,
  author       = {Lianguang Mo and
                  Yucai Zhou},
  title        = {Small area purification and recognition of network intrusion signals
                  based on the second-order matching filter detection},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {15},
  number       = {1},
  pages        = {1--7},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJIPT.2022.122031},
  doi          = {10.1504/IJIPT.2022.122031},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/MoZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijira/Boopathi22,
  author       = {Mythili Boopathi},
  title        = {Henry MaxNet: tversky index based feature selection and competitive
                  swarm henry gas solubility optimization integrated Deep Maxout network
                  for intrusion detection in IoT},
  journal      = {Int. J. Intell. Robotics Appl.},
  volume       = {6},
  number       = {2},
  pages        = {365--383},
  year         = {2022},
  url          = {https://doi.org/10.1007/s41315-022-00234-2},
  doi          = {10.1007/S41315-022-00234-2},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijira/Boopathi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GongDA22,
  author       = {Qian Gong and
                  Phil DeMar and
                  Mine Altunay},
  title        = {ThunderSecure: deploying real-time intrusion detection for 100G research
                  networks by leveraging stream-based features and one-class classification
                  network},
  journal      = {Int. J. Inf. Sec.},
  volume       = {21},
  number       = {4},
  pages        = {799--812},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10207-022-00584-9},
  doi          = {10.1007/S10207-022-00584-9},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/GongDA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/MathurLGL22,
  author       = {Nitin O. Mathur and
                  Chengcheng Li and
                  Bilal Gonen and
                  Kijung Lee},
  title        = {Application of Representation Learning-Based Chronological Modeling
                  for Network Intrusion Detection},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {1--32},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijisp.291701},
  doi          = {10.4018/IJISP.291701},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisp/MathurLGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitm/WangZ22,
  author       = {Xifeng Wang and
                  Xiaoluan Zhang},
  title        = {Network intrusion detection method based on improved ant colony algorithm
                  combined with cluster analysis in cloud computing environment},
  journal      = {Int. J. Inf. Technol. Manag.},
  volume       = {21},
  number       = {4},
  pages        = {345--358},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJITM.2022.10051595},
  doi          = {10.1504/IJITM.2022.10051595},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijitm/WangZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KagadeJ22,
  author       = {Ranjeet B. Kagade and
                  Santhosh Jayagopalan},
  title        = {Optimization assisted deep learning based intrusion detection system
                  in wireless sensor network with two-tier trust evaluation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2196},
  doi          = {10.1002/NEM.2196},
  timestamp    = {Wed, 14 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KagadeJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpp/NaqashSN22,
  author       = {Talha Naqash and
                  Sajjad Hussain Shah and
                  Muhammad Najam{-}ul{-}Islam},
  title        = {Statistical Analysis Based Intrusion Detection System for Ultra-High-Speed
                  Software Defined Network},
  journal      = {Int. J. Parallel Program.},
  volume       = {50},
  number       = {1},
  pages        = {89--114},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10766-021-00715-0},
  doi          = {10.1007/S10766-021-00715-0},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijpp/NaqashSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/WangZWRGZ22,
  author       = {Qian Wang and
                  Wenfang Zhao and
                  Xiaoyu Wei and
                  Jiadong Ren and
                  Yuying Gao and
                  Bing Zhang},
  title        = {Intrusion Detection Algorithm Based on Convolutional Neural Network
                  and Light Gradient Boosting Machine},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {32},
  number       = {8},
  pages        = {1229--1245},
  year         = {2022},
  url          = {https://doi.org/10.1142/S0218194022500462},
  doi          = {10.1142/S0218194022500462},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/WangZWRGZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsir/DeelipK22,
  author       = {Mali Shrikant Deelip and
                  Govinda Kannayaram},
  title        = {ESREHO-MaxNet: Deep Maxout Network For Intrusion Detection And Attack
                  Mitigation In Iot With Wrapper Based Feature Selection Approach},
  journal      = {Int. J. Swarm Intell. Res.},
  volume       = {13},
  number       = {1},
  pages        = {1--26},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsir.304901},
  doi          = {10.4018/IJSIR.304901},
  timestamp    = {Fri, 12 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsir/DeelipK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsir/KambleM22,
  author       = {Arvind Kamble and
                  Virendra S. Malemath},
  title        = {Adam Improved Rider Optimization-Based Deep Recurrent Neural Network
                  for the Intrusion Detection in Cyber Physical Systems},
  journal      = {Int. J. Swarm Intell. Res.},
  volume       = {13},
  number       = {3},
  pages        = {1--22},
  year         = {2022},
  url          = {https://doi.org/10.4018/ijsir.304402},
  doi          = {10.4018/IJSIR.304402},
  timestamp    = {Fri, 09 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsir/KambleM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KherbacheAE22,
  author       = {Meriem Kherbache and
                  Kamal Amroun and
                  David Espes},
  title        = {A new wrapper feature selection model for anomaly-based intrusion
                  detection systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {2},
  pages        = {107--123},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.123298},
  doi          = {10.1504/IJSN.2022.123298},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KherbacheAE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/NishaP22,
  author       = {T. N. Nisha and
                  Dhanya Pramod},
  title        = {Network event-based model using finite state machine to detect and
                  predict insider intrusion on enterprise networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {17},
  number       = {4},
  pages        = {269--283},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJSN.2022.10051286},
  doi          = {10.1504/IJSN.2022.10051286},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/NishaP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informatics/AntunesOSVSM22,
  author       = {M{\'{a}}rio J. Antunes and
                  Lu{\'{\i}}s M. L. Oliveira and
                  Afonso Seguro and
                  Jo{\~{a}}o Ver{\'{\i}}ssimo and
                  Ruben Salgado and
                  Tiago Murteira},
  title        = {Benchmarking Deep Learning Methods for Behaviour-Based Network Intrusion
                  Detection},
  journal      = {Informatics},
  volume       = {9},
  number       = {1},
  pages        = {29},
  year         = {2022},
  url          = {https://doi.org/10.3390/informatics9010029},
  doi          = {10.3390/INFORMATICS9010029},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informatics/AntunesOSVSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/AnwarHZ22,
  author       = {Anika Anwar and
                  Talal Halabi and
                  Mohammad Zulkernine},
  title        = {Scalable Collaborative Intrusion Detection in Autonomous Vehicular
                  Networks: {A} hierarchical framework based on game theory},
  journal      = {Internet Things},
  volume       = {20},
  pages        = {100631},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.iot.2022.100631},
  doi          = {10.1016/J.IOT.2022.100631},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iot/AnwarHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DaoL22,
  author       = {Thi{-}Nga Dao and
                  HyungJune Lee},
  title        = {Stacked Autoencoder-Based Probabilistic Feature Extraction for On-Device
                  Network Intrusion Detection},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {16},
  pages        = {14438--14451},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3078292},
  doi          = {10.1109/JIOT.2021.3078292},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/DaoL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhaoGXYOAG22,
  author       = {Ruijie Zhao and
                  Guan Gui and
                  Zhi Xue and
                  Jie Yin and
                  Tomoaki Ohtsuki and
                  Bamidele Adebisi and
                  Haris Gacanin},
  title        = {A Novel Intrusion Detection Method Based on Lightweight Neural Network
                  for Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {12},
  pages        = {9960--9972},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3119055},
  doi          = {10.1109/JIOT.2021.3119055},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhaoGXYOAG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhouLLYSW22,
  author       = {Xiaokang Zhou and
                  Wei Liang and
                  Weimin Li and
                  Ke Yan and
                  Shohei Shimizu and
                  Kevin I{-}Kai Wang},
  title        = {Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based
                  IoT Network Intrusion Detection System},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {12},
  pages        = {9310--9319},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3130434},
  doi          = {10.1109/JIOT.2021.3130434},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhouLLYSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/RaviCA22,
  author       = {Vinayakumar Ravi and
                  Rajasekhar Chaganti and
                  Mamoun Alazab},
  title        = {Deep Learning Feature Fusion Approach for an Intrusion Detection System
                  in SDN-Based IoT Networks},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {5},
  number       = {2},
  pages        = {24--29},
  year         = {2022},
  url          = {https://doi.org/10.1109/IOTM.003.2200001},
  doi          = {10.1109/IOTM.003.2200001},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotm/RaviCA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SommestadHS22,
  author       = {Teodor Sommestad and
                  Hannes Holm and
                  Daniel Steinvall},
  title        = {Variables influencing the effectiveness of signature-based network
                  intrusion detection systems},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {31},
  number       = {6},
  pages        = {711--728},
  year         = {2022},
  url          = {https://doi.org/10.1080/19393555.2021.1975853},
  doi          = {10.1080/19393555.2021.1975853},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SommestadHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IborOOA22,
  author       = {Ayei E. Ibor and
                  Olusoji B. Okunoye and
                  Florence A. Oladeji and
                  Khadeejah A. Abdulsalam},
  title        = {Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems'
                  Communication Networks based on Bio-inspired Deep Neural Network Structure},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103107},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103107},
  doi          = {10.1016/J.JISA.2021.103107},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/IborOOA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iswa/HassanAMAA22,
  author       = {Ibrahim Hayatu Hassan and
                  Mohammed Abdullahi and
                  Mansur Aliyu Masama and
                  Yusuf Sahabi Ali and
                  Abdulrazaq Abdulrahim},
  title        = {An improved binary manta ray foraging optimization algorithm based
                  feature selection and random forest classifier for network intrusion
                  detection},
  journal      = {Intell. Syst. Appl.},
  volume       = {16},
  pages        = {200114},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.iswa.2022.200114},
  doi          = {10.1016/J.ISWA.2022.200114},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iswa/HassanAMAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/0001LWZZH22,
  author       = {Jia Zhao and
                  Song Li and
                  Runxiu Wu and
                  Yiying Zhang and
                  Bo Zhang and
                  Longzhe Han},
  title        = {Tri-training algorithm based on cross entropy and K-nearest neighbors
                  for network intrusion detection},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {16},
  number       = {12},
  pages        = {3889--3903},
  year         = {2022},
  url          = {https://doi.org/10.3837/tiis.2022.12.006},
  doi          = {10.3837/TIIS.2022.12.006},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/0001LWZZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaciii/XuSMZWL22,
  author       = {Yuzhao Xu and
                  Yanjing Sun and
                  Zhanguo Ma and
                  Hongjie Zhao and
                  Yanfen Wang and
                  Nannan Lu},
  title        = {Attribute Selection Based Genetic Network Programming for Intrusion
                  Detection System},
  journal      = {J. Adv. Comput. Intell. Intell. Informatics},
  volume       = {26},
  number       = {5},
  pages        = {671--683},
  year         = {2022},
  url          = {https://doi.org/10.20965/jaciii.2022.p0671},
  doi          = {10.20965/JACIII.2022.P0671},
  timestamp    = {Mon, 10 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaciii/XuSMZWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/OnyemaDRSYW22,
  author       = {Edeh Michael Onyema and
                  Surjeet Dalal and
                  Carlos Andr{\'{e}}s Tavera Romero and
                  Bijeta Seth and
                  Praise Young and
                  Mohd Anas Wajid},
  title        = {Design of Intrusion Detection System based on Cyborg intelligence
                  for security of Cloud Network Traffic of Smart Cities},
  journal      = {J. Cloud Comput.},
  volume       = {11},
  pages        = {26},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13677-022-00305-6},
  doi          = {10.1186/S13677-022-00305-6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcloudc/OnyemaDRSYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/ZhangZXZ22,
  author       = {Ling Zhang and
                  Jian{-}Wei Zhang and
                  Xiang{-}Jun Xin and
                  Kai{-}Lai Zhou},
  title        = {Intrusion detection model based on coordinative immune and random
                  antibody forest},
  journal      = {J. High Speed Networks},
  volume       = {28},
  number       = {3},
  pages        = {205--220},
  year         = {2022},
  url          = {https://doi.org/10.3233/JHS-220691},
  doi          = {10.3233/JHS-220691},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/ZhangZXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/SinghGR22,
  author       = {Ghanshyam Singh and
                  Shashank Gavel and
                  Ajay Singh Raghuvanshi},
  title        = {A cross-layer based optimized feature selection scheme for intrusion
                  detection in wireless sensor network},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {42},
  number       = {6},
  pages        = {4949--4958},
  year         = {2022},
  url          = {https://doi.org/10.3233/JIFS-210700},
  doi          = {10.3233/JIFS-210700},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/SinghGR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jikm/AbdussamiF22,
  author       = {Aftab Alam Abdussami and
                  Mohammed Faizan Farooqui},
  title        = {Optimal Feature Selection with Weight Optimised Deep Neural Network
                  for Incremental Learning-Based Intrusion Detection in Fog Environment},
  journal      = {J. Inf. Knowl. Manag.},
  volume       = {21},
  number       = {3},
  pages        = {2250042:1--2250042:33},
  year         = {2022},
  url          = {https://doi.org/10.1142/S0219649222500423},
  doi          = {10.1142/S0219649222500423},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jikm/AbdussamiF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/UdasKR22,
  author       = {Pritom Biswas Udas and
                  Md. Ebtidaul Karim and
                  Kowshik Sankar Roy},
  title        = {{SPIDER:} {A} shallow {PCA} based network intrusion detection system
                  with enhanced recurrent neural networks},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {34},
  number       = {10 Part {B}},
  pages        = {10246--10272},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jksuci.2022.10.019},
  doi          = {10.1016/J.JKSUCI.2022.10.019},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/UdasKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/IoulianouVS22,
  author       = {Philokypros P. Ioulianou and
                  Vassilios G. Vassilakis and
                  Siamak F. Shahandashti},
  title        = {A Trust-Based Intrusion Detection System for {RPL} Networks: Detecting
                  a Combination of Rank and Blackhole Attacks},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {124--152},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2010009},
  doi          = {10.3390/JCP2010009},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/IoulianouVS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/LiWL22,
  author       = {Wenjuan Li and
                  Yu Wang and
                  Jin Li},
  title        = {Enhancing blockchain-based filtration mechanism via {IPFS} for collaborative
                  intrusion detection in IoT networks},
  journal      = {J. Syst. Archit.},
  volume       = {127},
  pages        = {102510},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sysarc.2022.102510},
  doi          = {10.1016/J.SYSARC.2022.102510},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/LiWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/AlimiOARA22,
  author       = {Kuburat Oyeranti Adefemi Alimi and
                  Khmaies Ouahada and
                  Adnan M. Abu{-}Mahfouz and
                  Suvendi Rimer and
                  Oyeniyi Akeem Alimi},
  title        = {Refined {LSTM} Based Intrusion Detection for Denial-of-Service Attack
                  in Internet of Things},
  journal      = {J. Sens. Actuator Networks},
  volume       = {11},
  number       = {3},
  pages        = {32},
  year         = {2022},
  url          = {https://doi.org/10.3390/jsan11030032},
  doi          = {10.3390/JSAN11030032},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsan/AlimiOARA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/RatheeKF22,
  author       = {Geetanjali Rathee and
                  Chaker Abdelaziz Kerrache and
                  Mohamed Amine Ferrag},
  title        = {A Blockchain-Based Intrusion Detection System Using Viterbi Algorithm
                  and Indirect Trust for IIoT Systems},
  journal      = {J. Sens. Actuator Networks},
  volume       = {11},
  number       = {4},
  pages        = {71},
  year         = {2022},
  url          = {https://doi.org/10.3390/jsan11040071},
  doi          = {10.3390/JSAN11040071},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsan/RatheeKF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/CavilleLLP22,
  author       = {Evan Caville and
                  Wai Weng Lo and
                  Siamak Layeghy and
                  Marius Portmann},
  title        = {Anomal-E: {A} self-supervised network intrusion detection system based
                  on graph neural networks},
  journal      = {Knowl. Based Syst.},
  volume       = {258},
  pages        = {110030},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.knosys.2022.110030},
  doi          = {10.1016/J.KNOSYS.2022.110030},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/CavilleLLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/ChenLWJWC22,
  author       = {Yi Chen and
                  Qiuzhen Lin and
                  Wenhong Wei and
                  Junkai Ji and
                  Ka{-}Chun Wong and
                  Carlos A. Coello Coello},
  title        = {Intrusion detection using multi-objective evolutionary convolutional
                  neural network for Internet of Things in Fog computing},
  journal      = {Knowl. Based Syst.},
  volume       = {244},
  pages        = {108505},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.knosys.2022.108505},
  doi          = {10.1016/J.KNOSYS.2022.108505},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/ChenLWJWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/KumarMR22,
  author       = {Ravinder Kumar and
                  Amita Malik and
                  Virender Ranga},
  title        = {An intellectual intrusion detection system using Hybrid Hunger Games
                  Search and Remora Optimization Algorithm for IoT wireless networks},
  journal      = {Knowl. Based Syst.},
  volume       = {256},
  pages        = {109762},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.knosys.2022.109762},
  doi          = {10.1016/J.KNOSYS.2022.109762},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/KumarMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/MoizuddinJ22,
  author       = {M. D. Moizuddin and
                  M. Victor Jose},
  title        = {A bio-inspired hybrid deep learning model for network intrusion detection},
  journal      = {Knowl. Based Syst.},
  volume       = {238},
  pages        = {107894},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.knosys.2021.107894},
  doi          = {10.1016/J.KNOSYS.2021.107894},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/MoizuddinJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/DingKW22,
  author       = {Shanshuo Ding and
                  Liang Kou and
                  Ting Wu},
  title        = {A GAN-Based Intrusion Detection Model for 5G Enabled Future Metaverse},
  journal      = {Mob. Networks Appl.},
  volume       = {27},
  number       = {6},
  pages        = {2596--2610},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11036-022-02075-6},
  doi          = {10.1007/S11036-022-02075-6},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/DingKW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/DuLLT22,
  author       = {Ruizhong Du and
                  Yun Li and
                  Xiaoyan Liang and
                  Junfeng Tian},
  title        = {Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog
                  Collaboration},
  journal      = {Mob. Networks Appl.},
  volume       = {27},
  number       = {1},
  pages        = {431--440},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11036-021-01838-x},
  doi          = {10.1007/S11036-021-01838-X},
  timestamp    = {Thu, 31 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/DuLLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ChowdhurySRS22,
  author       = {Ratul Chowdhury and
                  Shibaprasad Sen and
                  Arindam Roy and
                  Banani Saha},
  title        = {An optimal feature based network intrusion detection system using
                  bagging ensemble method for real-time traffic analysis},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {28},
  pages        = {41225--41247},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-022-12330-3},
  doi          = {10.1007/S11042-022-12330-3},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/ChowdhurySRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/PustokhinaPLGKS22,
  author       = {Irina Valeryevna Pustokhina and
                  Denis Alexandrovich Pustokhin and
                  E. Laxmi Lydia and
                  Puneet Garg and
                  Amarender Kadian and
                  K. Shankar},
  title        = {Hyperparameter search based convolution neural network with Bi-LSTM
                  model for intrusion detection system in multimedia big data environment},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {24},
  pages        = {34951--34968},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-021-11271-7},
  doi          = {10.1007/S11042-021-11271-7},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/PustokhinaPLGKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ChenYZJ22,
  author       = {Haoyu Chen and
                  Bin Yuan and
                  Deqing Zou and
                  Hai Jin},
  title        = {A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems
                  in 6G Networks},
  journal      = {{IEEE} Netw.},
  volume       = {36},
  number       = {4},
  pages        = {150--158},
  year         = {2022},
  url          = {https://doi.org/10.1109/MNET.002.2100655},
  doi          = {10.1109/MNET.002.2100655},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/ChenYZJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/WangLWWF22,
  author       = {Tingting Wang and
                  Jianqing Li and
                  Wei Wei and
                  Wei Wang and
                  Kai Fang},
  title        = {Deep-Learning-Based Weak Electromagnetic Intrusion Detection Method
                  for Zero Touch Networks on Industrial IoT},
  journal      = {{IEEE} Netw.},
  volume       = {36},
  number       = {6},
  pages        = {236--242},
  year         = {2022},
  url          = {https://doi.org/10.1109/MNET.001.2100754},
  doi          = {10.1109/MNET.001.2100754},
  timestamp    = {Wed, 08 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/WangLWWF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/BalamuruganMKYK22,
  author       = {E. Balamurugan and
                  Abolfazl Mehbodniya and
                  Elham Kariri and
                  Kusum Yadav and
                  Anil Kumar and
                  Mohd Anul Haq},
  title        = {Network optimization using defender system in cloud computing security
                  based intrusion detection system withgame theory deep neural network
                  {(IDSGT-DNN)}},
  journal      = {Pattern Recognit. Lett.},
  volume       = {156},
  pages        = {142--151},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.patrec.2022.02.013},
  doi          = {10.1016/J.PATREC.2022.02.013},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/prl/BalamuruganMKYK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/WangGYZDCK22,
  author       = {Jian Wang and
                  Shibin Gao and
                  Long Yu and
                  Dongkai Zhang and
                  Chugang Ding and
                  Ke Chen and
                  Lei Kou},
  title        = {Predicting wind-caused floater intrusion risk for overhead contact
                  lines based on Bayesian neural network with spatiotemporal correlation
                  analysis},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {225},
  pages        = {108603},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ress.2022.108603},
  doi          = {10.1016/J.RESS.2022.108603},
  timestamp    = {Sat, 13 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ress/WangGYZDCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KimLLKCW22,
  author       = {Wansoo Kim and
                  Jungho Lee and
                  Yousik Lee and
                  Yeon{-}Jin Kim and
                  Jingyun Chung and
                  Samuel Woo},
  title        = {Vehicular Multilevel Data Arrangement-Based Intrusion Detection System
                  for In-Vehicle {CAN}},
  journal      = {Secur. Commun. Networks},
  volume       = {2022},
  pages        = {4322148:1--4322148:11},
  year         = {2022},
  url          = {https://doi.org/10.1155/2022/4322148},
  doi          = {10.1155/2022/4322148},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KimLLKCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AlbasheerSMTSHK22,
  author       = {Hashim Albasheer and
                  Maheyzah Md Siraj and
                  Azath Mubarakali and
                  Omer Elsier Tayfour and
                  Sayeed Haider Salih and
                  Mosab Hamdan and
                  Suleman Khan and
                  Anazida Zainal and
                  Sameer Kamarudeen},
  title        = {Cyber-Attack Prediction Based on Network Intrusion Detection Systems
                  for Alert Correlation Techniques: {A} Survey},
  journal      = {Sensors},
  volume       = {22},
  number       = {4},
  pages        = {1494},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22041494},
  doi          = {10.3390/S22041494},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AlbasheerSMTSHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/Baz22,
  author       = {Mohammed Baz},
  title        = {{SEHIDS:} Self Evolving Host-Based Intrusion Detection System for
                  IoT Networks},
  journal      = {Sensors},
  volume       = {22},
  number       = {17},
  pages        = {6505},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22176505},
  doi          = {10.3390/S22176505},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/Baz22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/RodriguezVOCVPC22,
  author       = {Eva Rodr{\'{\i}}guez and
                  Pol Valls and
                  Beatriz Otero and
                  Juan Jos{\'{e}} Costa and
                  Javier Verd{\'{u}} and
                  Manuel Alejandro Pajuelo and
                  Ramon Canal},
  title        = {Transfer-Learning-Based Intrusion Detection Framework in IoT Networks},
  journal      = {Sensors},
  volume       = {22},
  number       = {15},
  pages        = {5621},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22155621},
  doi          = {10.3390/S22155621},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/RodriguezVOCVPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SheikhiK22,
  author       = {Saeid Sheikhi and
                  Panos Kostakos},
  title        = {A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized
                  {BP} Neural Network and GA-Based Feature Selection},
  journal      = {Sensors},
  volume       = {22},
  number       = {23},
  pages        = {9318},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22239318},
  doi          = {10.3390/S22239318},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/SheikhiK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SinghANSL22,
  author       = {Abhilash Singh and
                  J. Amutha and
                  Jaiprakash Nagar and
                  Sandeep Sharma and
                  Cheng{-}Chi Lee},
  title        = {{LT-FS-ID:} Log-Transformed Feature Learning and Feature-Scaling-Based
                  Machine Learning Algorithms to Predict the k-Barriers for Intrusion
                  Detection Using Wireless Sensor Network},
  journal      = {Sensors},
  volume       = {22},
  number       = {3},
  pages        = {1070},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22031070},
  doi          = {10.3390/S22031070},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/SinghANSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sis/PatilP22,
  author       = {Dharmaraj R. Patil and
                  Tareek M. Pattewar},
  title        = {Majority Voting and Feature Selection Based Network Intrusion Detection
                  System},
  journal      = {{EAI} Endorsed Trans. Scalable Inf. Syst.},
  volume       = {9},
  number       = {6},
  pages        = {e6},
  year         = {2022},
  url          = {https://doi.org/10.4108/eai.4-4-2022.173780},
  doi          = {10.4108/EAI.4-4-2022.173780},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sis/PatilP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/SinghK22,
  author       = {Krishan Pal Singh and
                  Nishtha Kesswani},
  title        = {An Anomaly-Based Intrusion Detection System for IoT Networks Using
                  Trust Factor},
  journal      = {{SN} Comput. Sci.},
  volume       = {3},
  number       = {2},
  pages        = {168},
  year         = {2022},
  url          = {https://doi.org/10.1007/s42979-022-01053-9},
  doi          = {10.1007/S42979-022-01053-9},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/SinghK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/ThirimanneJYLH22,
  author       = {Sharuka Promodya Thirimanne and
                  Lasitha Jayawardana and
                  Lasith Yasakethu and
                  Pushpika Liyanaarachchi and
                  Chaminda Hewage},
  title        = {Deep Neural Network Based Real-Time Intrusion Detection System},
  journal      = {{SN} Comput. Sci.},
  volume       = {3},
  number       = {2},
  pages        = {145},
  year         = {2022},
  url          = {https://doi.org/10.1007/s42979-022-01031-1},
  doi          = {10.1007/S42979-022-01031-1},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/ThirimanneJYLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/suscom/SamriyaTCSSK22,
  author       = {Jitendra Kumar Samriya and
                  Rajeev Tiwari and
                  Xiaochun Cheng and
                  Rahul Kumar Singh and
                  Achyut Shankar and
                  Manoj Kumar},
  title        = {Network intrusion detection using {ACO-DNN} model with {DVFS} based
                  energy optimization in cloud framework},
  journal      = {Sustain. Comput. Informatics Syst.},
  volume       = {35},
  pages        = {100746},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.suscom.2022.100746},
  doi          = {10.1016/J.SUSCOM.2022.100746},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/suscom/SamriyaTCSSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/swevo/CaoLFWJT22,
  author       = {Zijian Cao and
                  Jian Li and
                  Yanfang Fu and
                  Zhenyu Wang and
                  Haowen Jia and
                  Feng Tian},
  title        = {An adaptive biogeography-based optimization with cumulative covariance
                  matrix for rule-based network intrusion detection},
  journal      = {Swarm Evol. Comput.},
  volume       = {75},
  pages        = {101199},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.swevo.2022.101199},
  doi          = {10.1016/J.SWEVO.2022.101199},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/swevo/CaoLFWJT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/HanKK22,
  author       = {Hyojoon Han and
                  Hyukho Kim and
                  Yangwoo Kim},
  title        = {An Efficient Hyperparameter Control Method for a Network Intrusion
                  Detection System Based on Proximal Policy Optimization},
  journal      = {Symmetry},
  volume       = {14},
  number       = {1},
  pages        = {161},
  year         = {2022},
  url          = {https://doi.org/10.3390/sym14010161},
  doi          = {10.3390/SYM14010161},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/HanKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/MhawiAH22,
  author       = {Doaa N. Mhawi and
                  Ammar Aldallal and
                  Soukeana Hassan},
  title        = {Advanced Feature-Selection-Based Hybrid Ensemble Learning Algorithms
                  for Network Intrusion Detection Systems},
  journal      = {Symmetry},
  volume       = {14},
  number       = {7},
  pages        = {1461},
  year         = {2022},
  url          = {https://doi.org/10.3390/sym14071461},
  doi          = {10.3390/SYM14071461},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/MhawiAH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/NieWWGWGL22,
  author       = {Laisen Nie and
                  Yixuan Wu and
                  Xiaojie Wang and
                  Lei Guo and
                  Guoyin Wang and
                  Xinbo Gao and
                  Shengtao Li},
  title        = {Intrusion Detection for Secure Social Internet of Things Based on
                  Collaborative Edge Computing: {A} Generative Adversarial Network-Based
                  Approach},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {9},
  number       = {1},
  pages        = {134--145},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSS.2021.3063538},
  doi          = {10.1109/TCSS.2021.3063538},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/NieWWGWGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/XieWGW22,
  author       = {Jialiang Xie and
                  Honghui Wang and
                  Jonathan M. Garibaldi and
                  Dongrui Wu},
  title        = {Network Intrusion Detection Based on Dynamic Intuitionistic Fuzzy
                  Sets},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {30},
  number       = {9},
  pages        = {3460--3472},
  year         = {2022},
  url          = {https://doi.org/10.1109/TFUZZ.2021.3117441},
  doi          = {10.1109/TFUZZ.2021.3117441},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tfs/XieWGW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/NandyAKMV22,
  author       = {Sudarshan Nandy and
                  Mainak Adhikari and
                  Mohammad Ayoub Khan and
                  Varun G. Menon and
                  Sandeep Verma},
  title        = {An Intrusion Detection Mechanism for Secured IoMT Framework Based
                  on Swarm-Neural Network},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {26},
  number       = {5},
  pages        = {1969--1976},
  year         = {2022},
  url          = {https://doi.org/10.1109/JBHI.2021.3101686},
  doi          = {10.1109/JBHI.2021.3101686},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/NandyAKMV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/DerhabBMKK22,
  author       = {Abdelouahid Derhab and
                  Mohamed Belaoued and
                  Irfan Mohiuddin and
                  Fajri Kurniawan and
                  Muhammad Khurram Khan},
  title        = {Histogram-Based Intrusion Detection and Filtering Framework for Secure
                  and Safe In-Vehicle Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {3},
  pages        = {2366--2379},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2021.3088998},
  doi          = {10.1109/TITS.2021.3088998},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/DerhabBMKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/IslamRYM22,
  author       = {Riadul Islam and
                  Rafi Ud Daula Refat and
                  Sai Manikanta Yerram and
                  Hafiz Malik},
  title        = {Graph-Based Intrusion Detection System for Controller Area Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {3},
  pages        = {1727--1736},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2020.3025685},
  doi          = {10.1109/TITS.2020.3025685},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/IslamRYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/GanCDGW22,
  author       = {Baiqiang Gan and
                  Yuqiang Chen and
                  Qiuping Dong and
                  Jianlan Guo and
                  Rongxia Wang},
  title        = {A convolutional neural network intrusion detection method based on
                  data imbalance},
  journal      = {J. Supercomput.},
  volume       = {78},
  number       = {18},
  pages        = {19401--19434},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11227-022-04633-x},
  doi          = {10.1007/S11227-022-04633-X},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/GanCDGW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/ApruzzesePC22,
  author       = {Giovanni Apruzzese and
                  Luca Pajola and
                  Mauro Conti},
  title        = {The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection
                  Systems},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {5152--5169},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSM.2022.3157344},
  doi          = {10.1109/TNSM.2022.3157344},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/ApruzzesePC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ZhangCP22,
  author       = {Chaoyun Zhang and
                  Xavier Costa{-}P{\'{e}}rez and
                  Paul Patras},
  title        = {Adversarial Attacks Against Deep Learning-Based Network Intrusion
                  Detection Systems and Defense Mechanisms},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {30},
  number       = {3},
  pages        = {1294--1311},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNET.2021.3137084},
  doi          = {10.1109/TNET.2021.3137084},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/ZhangCP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/LoATACK22,
  author       = {Wei Lo and
                  Hamed AlQahtani and
                  Kutub Thakur and
                  Ahmad S. Almadhor and
                  Subhash Chander and
                  Gulshan Kumar},
  title        = {A hybrid deep learning based intrusion detection system using spatial-temporal
                  representation of in-vehicle network traffic},
  journal      = {Veh. Commun.},
  volume       = {35},
  pages        = {100471},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.vehcom.2022.100471},
  doi          = {10.1016/J.VEHCOM.2022.100471},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/LoATACK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/GavelRT22,
  author       = {Shashank Gavel and
                  Ajay Singh Raghuvanshi and
                  Sudarshan Tiwari},
  title        = {An optimized maximum correlation based feature reduction scheme for
                  intrusion detection in data networks},
  journal      = {Wirel. Networks},
  volume       = {28},
  number       = {6},
  pages        = {2609--2624},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11276-022-02988-w},
  doi          = {10.1007/S11276-022-02988-W},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/GavelRT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/OtairIAAS22,
  author       = {Mohammed Otair and
                  Osama Talab Ibrahim and
                  Laith Abualigah and
                  Maryam Altalhi and
                  Putra Sumari},
  title        = {An enhanced Grey Wolf Optimizer based Particle Swarm Optimizer for
                  intrusion detection system in wireless sensor networks},
  journal      = {Wirel. Networks},
  volume       = {28},
  number       = {2},
  pages        = {721--744},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11276-021-02866-x},
  doi          = {10.1007/S11276-021-02866-X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/winet/OtairIAAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/KhannaRGSK22,
  author       = {Ashish Khanna and
                  Poonam Rani and
                  Puneet Garg and
                  Prakash Kumar Singh and
                  Aditya Khamparia},
  title        = {An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion
                  Detection Based Wireless Network System},
  journal      = {Wirel. Pers. Commun.},
  volume       = {127},
  number       = {3},
  pages        = {2021--2038},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-021-08766-9},
  doi          = {10.1007/S11277-021-08766-9},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/KhannaRGSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/KhannaRGSK22a,
  author       = {Ashish Khanna and
                  Poonam Rani and
                  Puneet Garg and
                  Prakash Kumar Singh and
                  Aditya Khamparia},
  title        = {Correction to: An Enhanced Crow Search Inspired Feature Selection
                  Technique for Intrusion Detection Based Wireless Network System},
  journal      = {Wirel. Pers. Commun.},
  volume       = {127},
  number       = {3},
  pages        = {2039},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-021-09144-1},
  doi          = {10.1007/S11277-021-09144-1},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/KhannaRGSK22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/KrishnanKRJLSSK22,
  author       = {Rajkumar Krishnan and
                  R. Santhana Krishnan and
                  Y. Harold Robinson and
                  Eanoch Golden Julie and
                  Hoang Viet Long and
                  A. Sangeetha and
                  M. Subramanian and
                  Raghvendra Kumar},
  title        = {An Intrusion Detection and Prevention Protocol for Internet of Things
                  Based Wireless Sensor Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {124},
  number       = {4},
  pages        = {3461--3483},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-022-09521-4},
  doi          = {10.1007/S11277-022-09521-4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/KrishnanKRJLSSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LabiodKG22,
  author       = {Yasmine Labiod and
                  Abdelaziz Amara Korba and
                  Nassira Ghoualmi},
  title        = {Fog Computing-Based Intrusion Detection Architecture to Protect IoT
                  Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {125},
  number       = {1},
  pages        = {231--259},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-022-09548-7},
  doi          = {10.1007/S11277-022-09548-7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/LabiodKG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/PrakashL22a,
  author       = {P. Jaya Prakash and
                  B. Lalitha},
  title        = {Optimized Ensemble Classifier Based Network Intrusion Detection System
                  for {RPL} Based Internet of Things},
  journal      = {Wirel. Pers. Commun.},
  volume       = {125},
  number       = {4},
  pages        = {3603--3626},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-022-09726-7},
  doi          = {10.1007/S11277-022-09726-7},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/PrakashL22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ZhangHMWL22,
  author       = {Ting Zhang and
                  Dezhi Han and
                  Mario Donato Marino and
                  Lin Wang and
                  Kuan{-}Ching Li},
  title        = {An Evolutionary-Based Approach for Low-Complexity Intrusion Detection
                  in Wireless Sensor Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {126},
  number       = {3},
  pages        = {2019--2042},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-021-08757-w},
  doi          = {10.1007/S11277-021-08757-W},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ZhangHMWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ZhangSH22a,
  author       = {Jie Zhang and
                  Jinguang Sun and
                  Hua He},
  title        = {Clustering Detection Method of Network Intrusion Feature Based on
                  Support Vector Machine and {LCA} Block Algorithm},
  journal      = {Wirel. Pers. Commun.},
  volume       = {127},
  number       = {1},
  pages        = {599--613},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-021-08353-y},
  doi          = {10.1007/S11277-021-08353-Y},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/ZhangSH22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MerzoukDNCBY22,
  author       = {Mohamed Amine Merzouk and
                  Jos{\'{e}}phine Delas and
                  Christopher Neal and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Boulahia{-}Cuppens and
                  Reda Yaich},
  title        = {Evading Deep Reinforcement Learning-based Network Intrusion Detection
                  with Adversarial Attacks},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {31:1--31:6},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3539006},
  doi          = {10.1145/3538969.3539006},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MerzoukDNCBY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acit3/AhmedHA22,
  author       = {Lubna Ali Hassan Ahmed and
                  Yahia Abdalla Mohamed Hamad and
                  Ahmed Abdallah Mohamed Ali Abdalla},
  title        = {Network-based Intrusion Detection Datasets: {A} Survey},
  booktitle    = {International Arab Conference on Information Technology, {ACIT} 2022,
                  Abu Dhabi, United Arab Emirates, November 22-24, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACIT57182.2022.9994201},
  doi          = {10.1109/ACIT57182.2022.9994201},
  timestamp    = {Wed, 11 Jan 2023 17:54:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acit3/AhmedHA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiam/Ren22,
  author       = {Yifan Ren},
  title        = {Analysis of network intrusion detection based on machine learning},
  booktitle    = {4th International Conference on Artificial Intelligence and Advanced
                  Manufacturing, {AIAM} 2022, Hamburg, Germany, October 7-9, 2022},
  pages        = {699--702},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AIAM57466.2022.00142},
  doi          = {10.1109/AIAM57466.2022.00142},
  timestamp    = {Tue, 11 Apr 2023 21:46:10 +0200},
  biburl       = {https://dblp.org/rec/conf/aiam/Ren22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/AlkhatibMGD22,
  author       = {Natasha Alkhatib and
                  Maria Mushtaq and
                  Hadi Ghauch and
                  Jean{-}Luc Danger},
  title        = {{CAN-BERT} do it? Controller Area Network Intrusion Detection System
                  based on {BERT} Language Model},
  booktitle    = {19th {IEEE/ACS} International Conference on Computer Systems and Applications,
                  {AICCSA} 2022, Abu Dhabi, United Arab Emirates, December 5-8, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AICCSA56895.2022.10017800},
  doi          = {10.1109/AICCSA56895.2022.10017800},
  timestamp    = {Thu, 26 Jan 2023 11:35:09 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/AlkhatibMGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiiot/SaurabhSKSV0K22,
  author       = {Kumar Saurabh and
                  Saksham Sood and
                  P. Aditya Kumar and
                  Uphar Singh and
                  Ranjana Vyas and
                  O. P. Vyas and
                  Rahamatullah Khondoker},
  title        = {{LBDMIDS:} {LSTM} Based Deep Learning Model for Intrusion Detection
                  Systems for IoT Networks},
  booktitle    = {2022 {IEEE} World {AI} IoT Congress (AIIoT), Seattle, WA, USA, June
                  6-9, 2022},
  pages        = {753--759},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AIIoT54504.2022.9817245},
  doi          = {10.1109/AIIOT54504.2022.9817245},
  timestamp    = {Wed, 19 Jul 2023 12:22:41 +0200},
  biburl       = {https://dblp.org/rec/conf/aiiot/SaurabhSKSV0K22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiipcc/DingJ22,
  author       = {Yuhang Ding and
                  Wenrong Jiang},
  title        = {Intrusion Detection Method Based On Improved Conditional Generative
                  Adversarial Network},
  booktitle    = {International Conference on Artificial Intelligence, Information Processing
                  and Cloud Computing, {AIIPCC} 2022, Kunming, China, August 19-21,
                  2022},
  pages        = {37--40},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AIIPCC57291.2022.00016},
  doi          = {10.1109/AIIPCC57291.2022.00016},
  timestamp    = {Tue, 11 Apr 2023 21:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/aiipcc/DingJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiipcc/YeSC22,
  author       = {Chengqiong Ye and
                  Mali Sun and
                  Yang Chen},
  title        = {Research on Key Technologies of Network Intrusion Detection Based
                  on Machine Learning},
  booktitle    = {International Conference on Artificial Intelligence, Information Processing
                  and Cloud Computing, {AIIPCC} 2022, Kunming, China, August 19-21,
                  2022},
  pages        = {342--349},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AIIPCC57291.2022.00079},
  doi          = {10.1109/AIIPCC57291.2022.00079},
  timestamp    = {Tue, 11 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aiipcc/YeSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/AlatwiM22,
  author       = {Huda Ali Alatwi and
                  Charles Morisset},
  editor       = {Shusaku Tsumoto and
                  Yukio Ohsawa and
                  Lei Chen and
                  Dirk Van den Poel and
                  Xiaohua Hu and
                  Yoichi Motomura and
                  Takuya Takagi and
                  Lingfei Wu and
                  Ying Xie and
                  Akihiro Abe and
                  Vijay Raghavan},
  title        = {Threat Modeling for Machine Learning-Based Network Intrusion Detection
                  Systems},
  booktitle    = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka,
                  Japan, December 17-20, 2022},
  pages        = {4226--4235},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BigData55660.2022.10020368},
  doi          = {10.1109/BIGDATA55660.2022.10020368},
  timestamp    = {Fri, 18 Aug 2023 17:39:03 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/AlatwiM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/camad/ZachosMEPRR22,
  author       = {Georgios Zachos and
                  Georgios Mantas and
                  Ismael Essop and
                  Kyriakos Porfyrakis and
                  Jos{\'{e}} Carlos Ribeiro and
                  Jonathan Rodriguez},
  title        = {Prototyping an Anomaly-Based Intrusion Detection System for Internet
                  of Medical Things Networks},
  booktitle    = {27th {IEEE} International Workshop on Computer Aided Modeling and
                  Design of Communication Links and Networks, {CAMAD} 2022, Paris, France,
                  November 2-3, 2022},
  pages        = {179--183},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CAMAD55695.2022.9966912},
  doi          = {10.1109/CAMAD55695.2022.9966912},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/camad/ZachosMEPRR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/TarekMSISA22,
  author       = {Md. Hasan Tarek and
                  Md. Mumtahin Habib Ullah Mazumder and
                  Sadia Sharmin and
                  Md. Shariful Islam and
                  Mohammad Shoyaib and
                  Muhammad Mahbub Alam},
  title        = {{RHC:} Cluster based Feature Reduction for Network Intrusion Detections},
  booktitle    = {19th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2022, Las Vegas, NV, USA, January 8-11, 2022},
  pages        = {378--384},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CCNC49033.2022.9700680},
  doi          = {10.1109/CCNC49033.2022.9700680},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/TarekMSISA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccwc/SGZJN22,
  author       = {Ricardo Manzano S. and
                  Nishith Goel and
                  Marzia Zaman and
                  Rohit Joshi and
                  Kshirasagar Naik},
  title        = {Design of a Machine Learning Based Intrusion Detection Framework and
                  Methodology for IoT Networks},
  booktitle    = {12th {IEEE} Annual Computing and Communication Workshop and Conference,
                  {CCWC} 2022, Las Vegas, NV, USA, January 26-29, 2022},
  pages        = {191--198},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CCWC54503.2022.9720857},
  doi          = {10.1109/CCWC54503.2022.9720857},
  timestamp    = {Sat, 19 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccwc/SGZJN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/LiYL22,
  author       = {Yangmin Li and
                  Xinhang Yuan and
                  Wengen Li},
  editor       = {Mohammad Al Hasan and
                  Li Xiong},
  title        = {An Extreme Semi-supervised Framework Based on Transformer for Network
                  Intrusion Detection},
  booktitle    = {Proceedings of the 31st {ACM} International Conference on Information
                  {\&} Knowledge Management, Atlanta, GA, USA, October 17-21, 2022},
  pages        = {4204--4208},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3511808.3557549},
  doi          = {10.1145/3511808.3557549},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/LiYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/SinglaB22,
  author       = {Ankush Singla and
                  Elisa Bertino},
  title        = {{DP-ADA:} Differentially Private Adversarial Domain Adaptation for
                  Training Deep Learning based Network Intrusion Detection Systems},
  booktitle    = {8th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2022, Atlanta, GA, USA, December 14-16, 2022},
  pages        = {89--98},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CIC56439.2022.00023},
  doi          = {10.1109/CIC56439.2022.00023},
  timestamp    = {Fri, 24 Mar 2023 09:22:05 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/SinglaB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/DestaOAF22,
  author       = {Araya Kibrom Desta and
                  Shuji Ohira and
                  Ismail Arai and
                  Kazutoshi Fujikawa},
  editor       = {Hong Va Leong and
                  Sahra Sedigh Sarvestani and
                  Yuuichi Teranishi and
                  Alfredo Cuzzocrea and
                  Hiroki Kashiwazaki and
                  Dave Towey and
                  Ji{-}Jiang Yang and
                  Hossain Shahriar},
  title        = {{U-CAN:} {A} Convolutional Neural Network Based Intrusion Detection
                  for Controller Area Networks},
  booktitle    = {46th {IEEE} Annual Computers, Software, and Applications Conferenc,
                  {COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022},
  pages        = {1481--1488},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/COMPSAC54236.2022.00235},
  doi          = {10.1109/COMPSAC54236.2022.00235},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/DestaOAF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/AmalapuramTVCT22,
  author       = {Suresh Kumar Amalapuram and
                  Akash Tadwai and
                  Reethu Vinta and
                  Sumohana S. Channappayya and
                  Bheemarjuna Reddy Tamma},
  title        = {Continual Learning for Anomaly based Network Intrusion Detection},
  booktitle    = {14th International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2022, Bangalore, India, January 4-8, 2022},
  pages        = {497--505},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/COMSNETS53615.2022.9668482},
  doi          = {10.1109/COMSNETS53615.2022.9668482},
  timestamp    = {Tue, 25 Jan 2022 16:35:12 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/AmalapuramTVCT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/NguyenW22,
  author       = {Loc Gia Nguyen and
                  Kohei Watabe},
  editor       = {Narseo Vallina{-}Rodriguez and
                  Jon Crowcroft},
  title        = {Flow-based network intrusion detection based on {BERT} masked language
                  model},
  booktitle    = {Proceedings of the 3rd International CoNEXT Student Workshop, CoNEXT-SW
                  2022, Rome, Italy, 9 December 2022},
  pages        = {7--8},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3565477.3569152},
  doi          = {10.1145/3565477.3569152},
  timestamp    = {Mon, 05 Dec 2022 10:35:38 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/NguyenW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csci/EfiongAOA22,
  author       = {John E. Efiong and
                  Bodunde O. Akinyemi and
                  Emmanuel Ajayi Olajubu and
                  Ganiyu Adesola Aderounmu},
  title        = {GRASSMARLIN-based Metadata Extraction of Cyber-Physical Systems Intrusion
                  Detection in CyberSCADA Networks},
  booktitle    = {International Conference on Computational Science and Computational
                  Intelligence, {CSCI} 2022, Las Vegas, NV, USA, December 14-16, 2022},
  pages        = {1122--1128},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSCI58124.2022.00201},
  doi          = {10.1109/CSCI58124.2022.00201},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csci/EfiongAOA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/HughesMS22,
  author       = {Kieran Hughes and
                  Kieran McLaughlin and
                  Sakir Sezer},
  title        = {Policy-Based Profiles for Network Intrusion Response Systems},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2022, Rhodes, Greece, July 27-29, 2022},
  pages        = {279--286},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSR54599.2022.9850304},
  doi          = {10.1109/CSR54599.2022.9850304},
  timestamp    = {Fri, 19 Aug 2022 14:18:24 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/HughesMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/HalisdemirKPLC22,
  author       = {Emre Halisdemir and
                  Hacer Karacan and
                  Mauno Pihelgas and
                  Toomas Lepik and
                  Sungbaek Cho},
  editor       = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and
                  G{\'{a}}bor Visky and
                  I. Winther},
  title        = {Data Quality Problem in AI-Based Network Intrusion Detection Systems
                  Studies and a Solution Proposal},
  booktitle    = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon
                  2022, Tallinn, Estonia, May 31 - June 3, 2022},
  pages        = {367--383},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/CyCon55549.2022.9811014},
  doi          = {10.23919/CYCON55549.2022.9811014},
  timestamp    = {Fri, 15 Jul 2022 10:39:16 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/HalisdemirKPLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/FanLS22,
  author       = {Chun{-}I Fan and
                  Yen{-}Lin Lai and
                  Cheng{-}Han Shie},
  title        = {Clustering-Based Network Intrusion Detection System},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022,
                  Edinburgh, UK, June 22-24, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSC54232.2022.9888886},
  doi          = {10.1109/DSC54232.2022.9888886},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/FanLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsa/LiuLM22,
  author       = {Zhiyu Liu and
                  Meishu Luo and
                  Baoying Ma},
  title        = {Network Intrusion Detection based on {RBF} Neural Networks and Fuzzy
                  Cluster},
  booktitle    = {9th International Conference on Dependable Systems and Their Applications,
                  {DSA} 2022, Wulumuqi, China, August 4-5, 2022},
  pages        = {236--240},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSA56465.2022.00040},
  doi          = {10.1109/DSA56465.2022.00040},
  timestamp    = {Tue, 08 Nov 2022 21:42:41 +0100},
  biburl       = {https://dblp.org/rec/conf/dsa/LiuLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/OzdelAAKA22,
  author       = {S{\"{u}}leyman {\"{O}}zdel and
                  {\c{C}}agatay Ates and
                  Pelin Damla Ates and
                  Mutlu Koca and
                  Emin Anarim},
  title        = {Payload-Based Network Traffic Analysis for Application Classification
                  and Intrusion Detection},
  booktitle    = {30th European Signal Processing Conference, {EUSIPCO} 2022, Belgrade,
                  Serbia, August 29 - Sept. 2, 2022},
  pages        = {638--642},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://ieeexplore.ieee.org/document/9909683},
  timestamp    = {Tue, 25 Oct 2022 21:20:45 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/OzdelAAKA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/Calugar0022,
  author       = {Andrei Nicolae Calugar and
                  Weizhi Meng and
                  Haijun Zhang},
  title        = {Towards Artificial Neural Network Based Intrusion Detection with Enhanced
                  Hyperparameter Tuning},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro,
                  Brazil, December 4-8, 2022},
  pages        = {2627--2632},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/GLOBECOM48099.2022.10000809},
  doi          = {10.1109/GLOBECOM48099.2022.10000809},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/Calugar0022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhaoXLM22,
  author       = {Yilin Zhao and
                  Yijie Xun and
                  Jiajia Liu and
                  Siyu Ma},
  title        = {{GVIDS:} {A} Reliable Vehicle Intrusion Detection System Based on
                  Generative Adversarial Network},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro,
                  Brazil, December 4-8, 2022},
  pages        = {4310--4315},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/GLOBECOM48099.2022.10001410},
  doi          = {10.1109/GLOBECOM48099.2022.10001410},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhaoXLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/ZhangCLZSLG22,
  author       = {Hangsheng Zhang and
                  Yu Chen and
                  Weiyu Liu and
                  Shangyuan Zhuang and
                  Jiyan Sun and
                  Yinlong Liu and
                  Liru Geng},
  title        = {A Shapley-based Lightweight Global Explainer for Network Intrusion
                  Detection System},
  booktitle    = {24th {IEEE} Int Conf on High Performance Computing {\&} Communications;
                  8th Int Conf on Data Science {\&} Systems; 20th Int Conf on Smart
                  City; 8th Int Conf on Dependability in Sensor, Cloud {\&} Big
                  Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2022,
                  Hainan, China, December 18-20, 2022},
  pages        = {554--561},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00101},
  doi          = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00101},
  timestamp    = {Thu, 06 Apr 2023 11:34:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/ZhangCLZSLG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/ZhangZZBZS22,
  author       = {Yuemeng Zhang and
                  Yong Zhang and
                  Zhao Zhang and
                  Haonan Bai and
                  Tianyi Zhong and
                  Mei Song},
  title        = {Evaluation of data poisoning attacks on federated learning-based network
                  intrusion detection system},
  booktitle    = {24th {IEEE} Int Conf on High Performance Computing {\&} Communications;
                  8th Int Conf on Data Science {\&} Systems; 20th Int Conf on Smart
                  City; 8th Int Conf on Dependability in Sensor, Cloud {\&} Big
                  Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2022,
                  Hainan, China, December 18-20, 2022},
  pages        = {2235--2242},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00330},
  doi          = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00330},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/ZhangZZBZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icact/MowlaRV22,
  author       = {Nishat I. Mowla and
                  Joakim Rosell and
                  Arash Vahidi},
  title        = {Dynamic Voting based Explainable Intrusion Detection System for In-vehicle
                  Network},
  booktitle    = {24th International Conference on Advanced Communication Technology,
                  {ICACT} 2022, Pyeongchang, Korea, February 13-16, 2022},
  pages        = {406--411},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/ICACT53585.2022.9728968},
  doi          = {10.23919/ICACT53585.2022.9728968},
  timestamp    = {Fri, 15 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icact/MowlaRV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/YuHWYH22,
  author       = {Tianqi Yu and
                  Guodong Hua and
                  Huaisheng Wang and
                  Jianfeng Yang and
                  Jianling Hu},
  title        = {Federated-LSTM based Network Intrusion Detection Method for Intelligent
                  Connected Vehicles},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul,
                  Korea, May 16-20, 2022},
  pages        = {4324--4329},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICC45855.2022.9838655},
  doi          = {10.1109/ICC45855.2022.9838655},
  timestamp    = {Fri, 19 Aug 2022 10:24:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/YuHWYH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangZLHDZHFY22,
  author       = {Hanyang Wang and
                  Sirui Zhou and
                  Honglei Li and
                  Juan Hu and
                  Xinran Du and
                  Jinghui Zhou and
                  Yunlong He and
                  Fa Fu and
                  Houqun Yang},
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {Deep Learning Network Intrusion Detection Based on Network Traffic},
  booktitle    = {Artificial Intelligence and Security - 8th International Conference,
                  {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13340},
  pages        = {194--207},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06791-4\_16},
  doi          = {10.1007/978-3-031-06791-4\_16},
  timestamp    = {Tue, 02 Aug 2022 22:23:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/WangZLHDZHFY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsip/SuoWCCS22,
  author       = {Yuhan Suo and
                  Rui Wang and
                  Senchun Chai and
                  Runqi Chai and
                  Mengwei Su},
  editor       = {Fuchun Sun and
                  Angelo Cangelosi and
                  Jianwei Zhang and
                  Yuanlong Yu and
                  Huaping Liu and
                  Bin Fang},
  title        = {{NKB-S:} Network Intrusion Detection Based on {SMOTE} Sample Generation},
  booktitle    = {Cognitive Systems and Information Processing - 7th International Conference,
                  {ICCSIP} 2022, Fuzhou, China, December 17-18, 2022, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1787},
  pages        = {130--147},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-99-0617-8\_10},
  doi          = {10.1007/978-981-99-0617-8\_10},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsip/SuoWCCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccspa/AlbaseerA22,
  author       = {Abdullatif Albaseer and
                  Mohamed M. Abdallah},
  title        = {Fine-tuned LSTM-Based Model for Efficient Honeypot-Based Network Intrusion
                  Detection System in Smart Grid Networks},
  booktitle    = {5th International Conference on Communications, Signal Processing,
                  and their Applications, {ICCSPA} 2022, Cairo, Egypt, December 27-29,
                  2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICCSPA55860.2022.10019245},
  doi          = {10.1109/ICCSPA55860.2022.10019245},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccspa/AlbaseerA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/RizviSM022,
  author       = {Syed Rizvi and
                  Mark Scanlon and
                  Jimmy McGibney and
                  John Sheppard},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Deep Learning Based Network Intrusion Detection System for Resource-Constrained
                  Environments},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {355--367},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_21},
  doi          = {10.1007/978-3-031-36574-4\_21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/RizviSM022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BorcherdingFKMB22,
  author       = {Anne Borcherding and
                  Lukas Feldmann and
                  Markus Karch and
                  Ankush Meshram and
                  J{\"{u}}rgen Beyerer},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards a Better Understanding of Machine Learning based Network Intrusion
                  Detection Systems in Industrial Networks},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {314--325},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010795900003120},
  doi          = {10.5220/0010795900003120},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BorcherdingFKMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmla/NwaforO22,
  author       = {Ebelechukwu Nwafor and
                  Habeeb Olufowobi},
  editor       = {M. Arif Wani and
                  Mehmed M. Kantardzic and
                  Vasile Palade and
                  Daniel Neagu and
                  Longzhi Yang and
                  Kit Yan Chan},
  title        = {{CANBERT:} {A} Language-based Intrusion Detection Model for In-vehicle
                  Networks},
  booktitle    = {21st {IEEE} International Conference on Machine Learning and Applications,
                  {ICMLA} 2022, Nassau, Bahamas, December 12-14, 2022},
  pages        = {294--299},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICMLA55696.2022.00048},
  doi          = {10.1109/ICMLA55696.2022.00048},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmla/NwaforO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictc/CyriacHK22,
  author       = {Sibu Cyriac and
                  B. M. Harsha and
                  Yong Woon Kim},
  title        = {Seismic Activity-based Human Intrusion Detection using Deep Neural
                  Networks},
  booktitle    = {13th International Conference on Information and Communication Technology
                  Convergence, {ICTC} 2022, Jeju Island, Korea, Republic of, October
                  19-21, 2022},
  pages        = {130--135},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICTC55196.2022.9952913},
  doi          = {10.1109/ICTC55196.2022.9952913},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ictc/CyriacHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictc/DaoNV22,
  author       = {Thi{-}Nga Dao and
                  Huu{-}Noi Nguyen and
                  Van Son Vu},
  title        = {A Network Intrusion Detection Architecture Based on Class Parallelism
                  on Distributed Switches},
  booktitle    = {13th International Conference on Information and Communication Technology
                  Convergence, {ICTC} 2022, Jeju Island, Korea, Republic of, October
                  19-21, 2022},
  pages        = {1284--1289},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICTC55196.2022.9952903},
  doi          = {10.1109/ICTC55196.2022.9952903},
  timestamp    = {Wed, 30 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ictc/DaoNV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictc/IhekoronyeA0L22,
  author       = {Vivian Ukamaka Ihekoronye and
                  Simeon Okechukwu Ajakwe and
                  Dong{-}Seong Kim and
                  Jae{-}Min Lee},
  title        = {Cyber Edge Intelligent Intrusion Detection Framework For {UAV} Network
                  Based on Random Forest Algorithm},
  booktitle    = {13th International Conference on Information and Communication Technology
                  Convergence, {ICTC} 2022, Jeju Island, Korea, Republic of, October
                  19-21, 2022},
  pages        = {1242--1247},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICTC55196.2022.9952400},
  doi          = {10.1109/ICTC55196.2022.9952400},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ictc/IhekoronyeA0L22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/GolubevN22,
  author       = {Sergey Golubev and
                  Evgenia Novikova},
  editor       = {Lars Braubach and
                  Kai Jander and
                  Costin Badica},
  title        = {Image-Based Intrusion Detection in Network Traffic},
  booktitle    = {Intelligent Distributed Computing XV, 15th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2022, Virtual Event /
                  Bremen, Germany, 14-15 September 2022},
  series       = {Studies in Computational Intelligence},
  volume       = {1089},
  pages        = {51--60},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29104-3\_6},
  doi          = {10.1007/978-3-031-29104-3\_6},
  timestamp    = {Mon, 15 Apr 2024 16:13:56 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/GolubevN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idsta/Al-ZoubiA22,
  author       = {Hussein Al{-}Zoubi and
                  Samah Altaamneh},
  editor       = {Mohammad A. Alsmirat and
                  Yaser Jararweh and
                  Moayad Aloqaily and
                  Izzat Alsmadi},
  title        = {A Feature Selection Technique for Network Intrusion Detection based
                  on the Chaotic Crow Search Algorithm},
  booktitle    = {3rd International Conference on Intelligent Data Science Technologies
                  and Applications, {IDSTA} 2022, San Antonio, TX, USA, September 5-7,
                  2022},
  pages        = {54--60},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IDSTA55301.2022.9923108},
  doi          = {10.1109/IDSTA55301.2022.9923108},
  timestamp    = {Thu, 10 Nov 2022 11:54:13 +0100},
  biburl       = {https://dblp.org/rec/conf/idsta/Al-ZoubiA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip12/BennaceurSA22,
  author       = {K. Bennaceur and
                  Zakaria Sahraoui and
                  Mohamed Ahmed{-}Nacer},
  editor       = {Ilias Maglogiannis and
                  Lazaros Iliadis and
                  John MacIntyre and
                  Paulo Cortez},
  title        = {Enhanced Dependency-Based Feature Selection to Improve Anomaly Network
                  Intrusion Detection},
  booktitle    = {Artificial Intelligence Applications and Innovations - 18th {IFIP}
                  {WG} 12.5 International Conference, {AIAI} 2022, Hersonissos, Crete,
                  Greece, June 17-20, 2022, Proceedings, Part {I}},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {646},
  pages        = {108--115},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-08333-4\_9},
  doi          = {10.1007/978-3-031-08333-4\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip12/BennaceurSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/ChenGFSMW22,
  author       = {Junjun Chen and
                  Qiang Guo and
                  Zhongnan Fu and
                  Qun Shang and
                  Hao Ma and
                  Di Wu},
  title        = {Campus Network Intrusion Detection based on Federated Learning},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2022, Padua,
                  Italy, July 18-23, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IJCNN55064.2022.9892843},
  doi          = {10.1109/IJCNN55064.2022.9892843},
  timestamp    = {Mon, 10 Oct 2022 17:40:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/ChenGFSMW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangJLS22,
  author       = {Zhihao Wang and
                  Dingde Jiang and
                  Zhihan Lv and
                  Houbing Song},
  title        = {A Deep Reinforcement Learning based Intrusion Detection Strategy for
                  Smart Vehicular Networks},
  booktitle    = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications
                  Workshops, {INFOCOM} 2022 - Workshops, New York, NY, USA, May 2-5,
                  2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS54753.2022.9798344},
  doi          = {10.1109/INFOCOMWKSHPS54753.2022.9798344},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WangJLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscsic/Tian22,
  author       = {Qiuting Tian},
  title        = {An Intrusion Detection Approach Based on Improved Deep Belief Network
                  and LightGBM},
  booktitle    = {6th International Symposium on Computer Science and Intelligent Control,
                  {ISCSIC} 2022, Beijing, China, November 11-13, 2022},
  pages        = {40--44},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISCSIC57216.2022.00020},
  doi          = {10.1109/ISCSIC57216.2022.00020},
  timestamp    = {Sat, 25 Mar 2023 16:11:40 +0100},
  biburl       = {https://dblp.org/rec/conf/iscsic/Tian22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/SuTCYX22,
  author       = {Xin Su and
                  Tian Tian and
                  Lei Cai and
                  Baoliu Ye and
                  Hongyan Xing},
  title        = {A CVAE-GAN-based Approach to Process Imbalanced Datasets for Intrusion
                  Detection in Marine Meteorological Sensor Networks},
  booktitle    = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with
                  Applications, Big Data {\&} Cloud Computing, Sustainable Computing
                  {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom
                  2022, Melbourne, Australia, December 17-19, 2022},
  pages        = {197--203},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom57177.2022.00032},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM57177.2022.00032},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/SuTCYX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsda/LiWMZ22,
  author       = {Hongyi Li and
                  Zicheng Wang and
                  Hua Meng and
                  Zhengchun Zhou},
  title        = {Solving the data imbalance problem in network intrusion detection
                  : {A} {MP-CVAE} based method},
  booktitle    = {10th International Workshop on Signal Design and Its Applications
                  in Communications, {IWSDA} 2022, Colchester, UK, August 1-5, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IWSDA50346.2022.9870444},
  doi          = {10.1109/IWSDA50346.2022.9870444},
  timestamp    = {Sat, 17 Sep 2022 23:41:13 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsda/LiWMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/ToliupaPZVRW22,
  author       = {Serhii Toliupa and
                  Ivan Parkhomenko and
                  Ruslana Ziubina and
                  Olga Veselska and
                  Stanislaw Andrzej Rajba and
                  Kornel Warwas},
  editor       = {Matteo Cristani and
                  Carlos Toro and
                  Cecilia Zanni{-}Merk and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Detection of abnormal traffic and network intrusions based on multiple
                  fuzzy rules},
  booktitle    = {Knowledge-Based and Intelligent Information {\&} Engineering Systems:
                  Proceedings of the 26th International Conference KES-2022, Verona,
                  Italy and Virtual Event, 7-9 September 2022},
  series       = {Procedia Computer Science},
  volume       = {207},
  pages        = {44--53},
  publisher    = {Elsevier},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.procs.2022.09.036},
  doi          = {10.1016/J.PROCS.2022.09.036},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/ToliupaPZVRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kse/NguyenNHS22,
  author       = {Van Quan Nguyen and
                  Viet Hung Nguyen and
                  Tuan Hao Hoang and
                  Nathan Shone},
  editor       = {Nguyen Ba Hung and
                  Le Sy Vinh and
                  Nguyen Le Minh and
                  Ha Minh Hoang and
                  Bui Thu Lam and
                  Phan Xuan Hieu and
                  Nguyen Trung Lap and
                  Vo Dinh Hieu and
                  Van Huu Quang Nhat},
  title        = {A Novel Deep Clustering Variational Auto-Encoder for Anomaly-based
                  Network Intrusion Detection},
  booktitle    = {14th International Conference on Knowledge and Systems Engineering,
                  {KSE} 2022, Nha Trang, Vietnam, October 19-21, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/KSE56063.2022.9953763},
  doi          = {10.1109/KSE56063.2022.9953763},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kse/NguyenNHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lwa/SchoenbornA22,
  author       = {Jakob Michael Schoenborn and
                  Klaus{-}Dieter Althoff},
  editor       = {Pascal Reuss and
                  Viktor Eisenstadt and
                  Jakob Michael Sch{\"{o}}nborn and
                  Jero Sch{\"{a}}fer},
  title        = {Multi-Agent Case-Based Reasoning: a Network Intrusion Detection System},
  booktitle    = {Proceedings of the {LWDA} 2022 Workshops: FGWM, FGKD, and FGDB, Hildesheim
                  (Germany), Oktober 5-7th, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3341},
  pages        = {258--269},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3341/WM-LWDA\_2022\_CRC\_9388.pdf},
  timestamp    = {Wed, 22 Mar 2023 07:29:50 +0100},
  biburl       = {https://dblp.org/rec/conf/lwa/SchoenbornA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/HongZA22,
  author       = {Mei Hong and
                  Yingyong Zou and
                  Chun Ai},
  editor       = {Yuan Xu and
                  Hongyang Yan and
                  Huang Teng and
                  Jun Cai and
                  Jin Li},
  title        = {Large Scale Network Intrusion Detection Model Based on {FS} Feature
                  Selection},
  booktitle    = {Machine Learning for Cyber Security - 4th International Conference,
                  {ML4CS} 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13655},
  pages        = {380--393},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20096-0\_29},
  doi          = {10.1007/978-3-031-20096-0\_29},
  timestamp    = {Mon, 30 Jan 2023 08:02:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/HongZA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/HuLGXZ22a,
  author       = {Gebiao Hu and
                  Zhichi Lin and
                  Zheng Guo and
                  Ruiqing Xu and
                  Xiao Zhang},
  editor       = {Yuan Xu and
                  Hongyang Yan and
                  Huang Teng and
                  Jun Cai and
                  Jin Li},
  title        = {Research on Intrusion Prevention Optimization Algorithm of Power {UAV}
                  Network Communication Based on Artificial Intelligence},
  booktitle    = {Machine Learning for Cyber Security - 4th International Conference,
                  {ML4CS} 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13657},
  pages        = {265--278},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20102-8\_21},
  doi          = {10.1007/978-3-031-20102-8\_21},
  timestamp    = {Mon, 30 Jan 2023 08:02:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/HuLGXZ22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/Xu22a,
  author       = {Jiaoxing Xu},
  editor       = {Yuan Xu and
                  Hongyang Yan and
                  Huang Teng and
                  Jun Cai and
                  Jin Li},
  title        = {Vehicle {CAN} Network Intrusion Detection Model Based on Extreme Learning
                  Machine and Feature Analysis},
  booktitle    = {Machine Learning for Cyber Security - 4th International Conference,
                  {ML4CS} 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13656},
  pages        = {550--564},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20099-1\_46},
  doi          = {10.1007/978-3-031-20099-1\_46},
  timestamp    = {Mon, 30 Jan 2023 08:02:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/Xu22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/KyeK22,
  author       = {Hyoseon Kye and
                  Minhae Kwon},
  title        = {Partial federated learning based network intrusion system for mobile
                  devices: poster},
  booktitle    = {MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic
                  Foundations, and Protocol Design for Mobile Networks and Mobile Computing,
                  Seoul, Republic of Korea, October 17 - 20, 2022},
  pages        = {283--284},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3492866.3561257},
  doi          = {10.1145/3492866.3561257},
  timestamp    = {Tue, 27 Sep 2022 16:36:53 +0200},
  biburl       = {https://dblp.org/rec/conf/mobihoc/KyeK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/VenturiZMC22,
  author       = {Andrea Venturi and
                  Claudio Zanasi and
                  Mirco Marchetti and
                  Michele Colajanni},
  editor       = {Michele Colajanni and
                  Luca Ferretti and
                  Miguel L. Pardal and
                  Dimiter R. Avresky},
  title        = {Robustness Evaluation of Network Intrusion Detection Systems based
                  on Sequential Machine Learning},
  booktitle    = {21st {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2022, Boston, MA, USA, December 14-16, 2022},
  pages        = {235--242},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/NCA57778.2022.10013643},
  doi          = {10.1109/NCA57778.2022.10013643},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nca/VenturiZMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/ArregocesVGB22,
  author       = {Paulina Arregoces and
                  Jaime Vergara and
                  Sergio Armando Gutierrez and
                  Juan Felipe Botero},
  title        = {Network-based Intrusion Detection: {A} One-class Classification Approach},
  booktitle    = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2022, Budapest, Hungary, April 25-29, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/NOMS54207.2022.9789927},
  doi          = {10.1109/NOMS54207.2022.9789927},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/ArregocesVGB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/LoLSGP22,
  author       = {Wai Weng Lo and
                  Siamak Layeghy and
                  Mohanad Sarhan and
                  Marcus Gallagher and
                  Marius Portmann},
  title        = {E-GraphSAGE: {A} Graph Neural Network based Intrusion Detection System
                  for IoT},
  booktitle    = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2022, Budapest, Hungary, April 25-29, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/NOMS54207.2022.9789878},
  doi          = {10.1109/NOMS54207.2022.9789878},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/noms/LoLSGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LiMLWHHY22,
  author       = {Yunhao Li and
                  Weichuan Mo and
                  Cong Li and
                  Haiyang Wang and
                  Jianwei He and
                  Shanshan Hao and
                  Hongyang Yan},
  editor       = {Xingliang Yuan and
                  Guangdong Bai and
                  Cristina Alcaraz and
                  Suryadipta Majumdar},
  title        = {Network Intrusion Detection Adversarial Attacks for {LEO} Constellation
                  Networks Based on Deep Learning},
  booktitle    = {Network and System Security - 16th International Conference, {NSS}
                  2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13787},
  pages        = {51--65},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23020-2\_3},
  doi          = {10.1007/978-3-031-23020-2\_3},
  timestamp    = {Thu, 08 Dec 2022 15:13:16 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/LiMLWHHY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/AlSarrayZ22,
  author       = {Fatin Neamah Ridha Al{-}Sarray and
                  Maslina Zolkepli},
  editor       = {Hiroyuki Takizawa and
                  Hong Shen and
                  Toshihiro Hanawa and
                  Jong Hyuk Park and
                  Hui Tian and
                  Ryusuke Egawa},
  title        = {Detecting Network Intrusions with Resilient Approaches Based on Convolutional
                  Neural Networks},
  booktitle    = {Parallel and Distributed Computing, Applications and Technologies
                  - 23rd International Conference, {PDCAT} 2022, Sendai, Japan, December
                  7-9, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13798},
  pages        = {238--248},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29927-8\_19},
  doi          = {10.1007/978-3-031-29927-8\_19},
  timestamp    = {Tue, 02 May 2023 15:08:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pdcat/AlSarrayZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/BelarbiKCS22,
  author       = {Othmane Belarbi and
                  Aftab Khan and
                  Pietro Edoardo Carnelli and
                  Theodoros Spyridopoulos},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {An Intrusion Detection System Based on Deep Belief Networks},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {377--392},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_25},
  doi          = {10.1007/978-3-031-17551-0\_25},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/BelarbiKCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/BiGY22,
  author       = {Jing Bi and
                  Ziyue Guan and
                  Haitao Yuan},
  title        = {Hybrid Network Intrusion Detection with Stacked Sparse Contractive
                  Autoencoders and Attention-based Bidirectional {LSTM}},
  booktitle    = {{IEEE} International Conference on Systems, Man, and Cybernetics,
                  {SMC} 2022, Prague, Czech Republic, October 9-12, 2022},
  pages        = {6--11},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SMC53654.2022.9945600},
  doi          = {10.1109/SMC53654.2022.9945600},
  timestamp    = {Thu, 01 Dec 2022 15:59:35 +0100},
  biburl       = {https://dblp.org/rec/conf/smc/BiGY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/LinWJL22,
  author       = {Jiaying Lin and
                  Yehua Wei and
                  Haoran Jiang and
                  Jing Long},
  title        = {Intrusion Detection System for In-vehicle Networks with Incremental
                  Learning Based on Cloud-Edge Collaborative Architecture},
  booktitle    = {{IEEE} Smartworld, Ubiquitous Intelligence {\&} Computing, Scalable
                  Computing {\&} Communications, Digital Twin, Privacy Computing,
                  Metaverse, Autonomous {\&} Trusted Vehicles, SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta
                  2022, Haikou, China, December 15-18, 2022},
  pages        = {2026--2031},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00293},
  doi          = {10.1109/SMARTWORLD-UIC-ATC-SCALCOM-DIGITALTWIN-PRICOMP-METAVERSE56740.2022.00293},
  timestamp    = {Fri, 04 Aug 2023 17:34:39 +0200},
  biburl       = {https://dblp.org/rec/conf/uic/LinWJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/HeLYX22,
  author       = {Guofeng He and
                  Qing Lu and
                  Guangqiang Yin and
                  Hu Xiong},
  editor       = {Lei Wang and
                  Michael Segal and
                  Jenhui Chen and
                  Tie Qiu},
  title        = {Network Intrusion Detection Based on Hybrid Neural Network},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 17th International
                  Conference, {WASA} 2022, Dalian, China, November 24-26, 2022, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13472},
  pages        = {644--655},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-19214-2\_54},
  doi          = {10.1007/978-3-031-19214-2\_54},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/HeLYX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wincom/ChoukhairiFA22,
  author       = {Mouad Choukhairi and
                  Youssef Fakhri and
                  Mohamed Amnai},
  editor       = {Ahmed Drissi El Malian and
                  Mohamed El{-}Kamili and
                  Luca Foschini and
                  Abdellatif Kobbane and
                  Shuai Han},
  title        = {{TTIDS} : {A} Time-Driven Trust Based Intrusion Detection System for
                  IoT Networks},
  booktitle    = {9th International Conference on Wireless Networks and Mobile Communications,
                  {WINCOM} 2022, Rabat, Morocco, October 26-29, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WINCOM55661.2022.9966466},
  doi          = {10.1109/WINCOM55661.2022.9966466},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wincom/ChoukhairiFA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/LiuSKBD22,
  author       = {Jinxin Liu and
                  Murat Simsek and
                  Burak Kantarci and
                  Mehran Bagheri and
                  Petar Djukic},
  title        = {{SCVIC-CIDS-2022:} Bridging Networks and Hosts via Machine Learning-Based
                  Intrusion Detection},
  publisher    = {{IEEE} DataPort},
  year         = {2022},
  month        = sep,
  howpublished = {\url{https://doi.org/10.21227/dn9v-3278}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/dn9v-3278},
  doi          = {10.21227/DN9V-3278},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/LiuSKBD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-03134,
  author       = {Tian Dong and
                  Song Li and
                  Han Qiu and
                  Jialiang Lu},
  title        = {An Interpretable Federated Learning-based Network Intrusion Detection
                  Framework},
  journal      = {CoRR},
  volume       = {abs/2201.03134},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.03134},
  eprinttype    = {arXiv},
  eprint       = {2201.03134},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-03134.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-01332,
  author       = {Wen Xu and
                  Julian Jang{-}Jaccard and
                  Tong Liu and
                  Fariza Sabrina},
  title        = {Training a Bidirectional GAN-based One-Class Classifier for Network
                  Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/2202.01332},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.01332},
  eprinttype    = {arXiv},
  eprint       = {2202.01332},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-01332.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-04686,
  author       = {Giovanni Apruzzese and
                  Luca Pajola and
                  Mauro Conti},
  title        = {The Cross-evaluation of Machine Learning-based Network Intrusion Detection
                  Systems},
  journal      = {CoRR},
  volume       = {abs/2203.04686},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.04686},
  doi          = {10.48550/ARXIV.2203.04686},
  eprinttype    = {arXiv},
  eprint       = {2203.04686},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-04686.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-05232,
  author       = {Tuan{-}Hong Chua and
                  Iftekhar Salam},
  title        = {Evaluation of Machine Learning Algorithms in Network-Based Intrusion
                  Detection System},
  journal      = {CoRR},
  volume       = {abs/2203.05232},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.05232},
  doi          = {10.48550/ARXIV.2203.05232},
  eprinttype    = {arXiv},
  eprint       = {2203.05232},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-05232.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-16365,
  author       = {Yuhua Yin and
                  Julian Jang{-}Jaccard and
                  Wen Xu and
                  Amardeep Singh and
                  Jinting Zhu and
                  Fariza Sabrina and
                  Jin Kwak},
  title        = {{IGRF-RFE:} {A} Hybrid Feature Selection Method for MLP-based Network
                  Intrusion Detection on {UNSW-NB15} Dataset},
  journal      = {CoRR},
  volume       = {abs/2203.16365},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.16365},
  doi          = {10.48550/ARXIV.2203.16365},
  eprinttype    = {arXiv},
  eprint       = {2203.16365},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-16365.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-03779,
  author       = {Amardeep Singh and
                  Julian Jang{-}Jaccard},
  title        = {Autoencoder-based Unsupervised Intrusion Detection using Multi-Scale
                  Convolutional Recurrent Networks},
  journal      = {CoRR},
  volume       = {abs/2204.03779},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.03779},
  doi          = {10.48550/ARXIV.2204.03779},
  eprinttype    = {arXiv},
  eprint       = {2204.03779},
  timestamp    = {Wed, 13 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-03779.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-01306,
  author       = {Md Hasan Shahriar and
                  Yang Xiao and
                  Pablo Moriano and
                  Wenjing Lou and
                  Y. Thomas Hou},
  title        = {CANShield: Signal-based Intrusion Detection for Controller Area Networks},
  journal      = {CoRR},
  volume       = {abs/2205.01306},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.01306},
  doi          = {10.48550/ARXIV.2205.01306},
  eprinttype    = {arXiv},
  eprint       = {2205.01306},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-01306.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-04112,
  author       = {Siamak Layeghy and
                  Marius Portmann},
  title        = {On Generalisability of Machine Learning-based Network Intrusion Detection
                  Systems},
  journal      = {CoRR},
  volume       = {abs/2205.04112},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.04112},
  doi          = {10.48550/ARXIV.2205.04112},
  eprinttype    = {arXiv},
  eprint       = {2205.04112},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-04112.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-00424,
  author       = {Kumar Saurabh and
                  Saksham Sood and
                  P. Aditya Kumar and
                  Uphar Singh and
                  Ranjana Vyas and
                  O. P. Vyas and
                  Rahamatullah Khondoker},
  title        = {{LBDMIDS:} {LSTM} Based Deep Learning Model for Intrusion Detection
                  Systems for IoT Networks},
  journal      = {CoRR},
  volume       = {abs/2207.00424},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.00424},
  doi          = {10.48550/ARXIV.2207.00424},
  eprinttype    = {arXiv},
  eprint       = {2207.00424},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-00424.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-02117,
  author       = {Othmane Belarbi and
                  Aftab Khan and
                  Pietro Edoardo Carnelli and
                  Theodoros Spyridopoulos},
  title        = {An Intrusion Detection System based on Deep Belief Networks},
  journal      = {CoRR},
  volume       = {abs/2207.02117},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.02117},
  doi          = {10.48550/ARXIV.2207.02117},
  eprinttype    = {arXiv},
  eprint       = {2207.02117},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-02117.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-04843,
  author       = {Ibrahim Aliyu and
                  S{\'{e}}linde van Engelenburg and
                  Muhammed Bashir Mu'azu and
                  Jinsul Kim and
                  Chang Gyoon Lim},
  title        = {Statistical Detection of Adversarial examples in Blockchain-based
                  Federated Forest In-vehicle Network Intrusion Detection Systems},
  journal      = {CoRR},
  volume       = {abs/2207.04843},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.04843},
  doi          = {10.48550/ARXIV.2207.04843},
  eprinttype    = {arXiv},
  eprint       = {2207.04843},
  timestamp    = {Wed, 13 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-04843.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-06819,
  author       = {Evan Caville and
                  Wai Weng Lo and
                  Siamak Layeghy and
                  Marius Portmann},
  title        = {Anomal-E: {A} Self-Supervised Network Intrusion Detection System based
                  on Graph Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2207.06819},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.06819},
  doi          = {10.48550/ARXIV.2207.06819},
  eprinttype    = {arXiv},
  eprint       = {2207.06819},
  timestamp    = {Tue, 19 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-06819.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-09902,
  author       = {Mohammad Masum and
                  Hossain Shahriar and
                  Hisham Haddad and
                  Md. Jobair Hossain Faruk and
                  Maria Valero and
                  Md Abdullah Khan and
                  Mohammad Ashiqur Rahman and
                  Muhaiminul I. Adnan and
                  Alfredo Cuzzocrea},
  title        = {Bayesian Hyperparameter Optimization for Deep Neural Network-Based
                  Network Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/2207.09902},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.09902},
  doi          = {10.48550/ARXIV.2207.09902},
  eprinttype    = {arXiv},
  eprint       = {2207.09902},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-09902.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-04052,
  author       = {Jiahui Chen and
                  Yi Zhao and
                  Qi Li and
                  Ke Xu},
  title        = {FedDef: Robust Federated Learning-based Network Intrusion Detection
                  Systems Against Gradient Leakage},
  journal      = {CoRR},
  volume       = {abs/2210.04052},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.04052},
  doi          = {10.48550/ARXIV.2210.04052},
  eprinttype    = {arXiv},
  eprint       = {2210.04052},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-04052.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-09439,
  author       = {Natasha Alkhatib and
                  Maria Mushtaq and
                  Hadi Ghauch and
                  Jean{-}Luc Danger},
  title        = {{CAN-BERT} do it? Controller Area Network Intrusion Detection System
                  based on {BERT} Language Model},
  journal      = {CoRR},
  volume       = {abs/2210.09439},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.09439},
  doi          = {10.48550/ARXIV.2210.09439},
  eprinttype    = {arXiv},
  eprint       = {2210.09439},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-09439.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-15700,
  author       = {Islam Debicha and
                  Richard Bauwens and
                  Thibault Debatty and
                  Jean{-}Michel Dricot and
                  Tayeb Kenaza and
                  Wim Mees},
  title        = {{TAD:} Transfer Learning-based Multi-Adversarial Detection of Evasion
                  Attacks against Network Intrusion Detection Systems},
  journal      = {CoRR},
  volume       = {abs/2210.15700},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.15700},
  doi          = {10.48550/ARXIV.2210.15700},
  eprinttype    = {arXiv},
  eprint       = {2210.15700},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-15700.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-03933,
  author       = {Zong{-}Zhi Lin and
                  Thomas D. Pike and
                  Mark M. Bailey and
                  Nathaniel D. Bastian},
  title        = {A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection
                  System},
  journal      = {CoRR},
  volume       = {abs/2211.03933},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.03933},
  doi          = {10.48550/ARXIV.2211.03933},
  eprinttype    = {arXiv},
  eprint       = {2211.03933},
  timestamp    = {Wed, 09 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-03933.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChuaS22,
  author       = {Tuan{-}Hong Chua and
                  Iftekhar Salam},
  title        = {Evaluation of Machine Learning Algorithms in Network-Based Intrusion
                  Detection System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {335},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/335},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChuaS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/Alqahtani22,
  title        = {{FSO-LSTM} {IDS:} hybrid optimized and ensembled deep-learning network-based
                  intrusion detection system for smart networks},
  journal      = {J. Supercomput.},
  volume       = {78},
  number       = {7},
  pages        = {9438--9455},
  year         = {2022},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s11227-021-04285-3},
  doi          = {10.1007/S11227-021-04285-3},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/Alqahtani22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/tr/Einy21,
  author       = {Sajad Einy},
  title        = {Makina {\"{o}}{\u{g}}renmesile biyometrik sahtekarl{\i}{\u{g}}a
                  ve a{\u{g}} anormallik tespitine dayal{\i} sald{\i}r{\i} tespiti (Intrusion
                  detection based on biometric spoofing and network anomaly detection
                  with machine learning algorithms)},
  school       = {Sakarya University, Turkey},
  year         = {2021},
  url          = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=PED5aMAd9AKhCxMg60s4lw\&no=R5-dBfNGrYTyTI7DJB6ixg},
  timestamp    = {Sun, 19 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/tr/Einy21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AliyuFEKL21,
  author       = {Ibrahim Aliyu and
                  Marco Carlo Feliciano and
                  S{\'{e}}linde van Engelenburg and
                  Dong Ok Kim and
                  Chang Gyoon Lim},
  title        = {A Blockchain-Based Federated Forest for SDN-Enabled In-Vehicle Network
                  Intrusion Detection System},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {102593--102608},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3094365},
  doi          = {10.1109/ACCESS.2021.3094365},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AliyuFEKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlsalehB21,
  author       = {Alanoud Alsaleh and
                  Wojdan Binsaeedan},
  title        = {The Influence of Salp Swarm Algorithm-Based Feature Selection on Network
                  Anomaly Intrusion Detection},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {112466--112477},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3102095},
  doi          = {10.1109/ACCESS.2021.3102095},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlsalehB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BertoliJSSVMBRO21,
  author       = {Gustavo de Carvalho Bertoli and
                  Louren{\c{c}}o Alves Pereira J{\'{u}}nior and
                  Osamu Saotome and
                  Aldri L. dos Santos and
                  Filipe Alves Neto Verri and
                  Cesar Augusto Cavalheiro Marcondes and
                  Sidnei Barbieri and
                  Moises S. Rodrigues and
                  Jos{\'{e}} M. Parente de Oliveira},
  title        = {An End-to-End Framework for Machine Learning-Based Network Intrusion
                  Detection System},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {106790--106805},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3101188},
  doi          = {10.1109/ACCESS.2021.3101188},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/BertoliJSSVMBRO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BozdalSJ21,
  author       = {Mehmet Bozdal and
                  Mohammad Samie and
                  Ian K. Jennions},
  title        = {{WINDS:} {A} Wavelet-Based Intrusion Detection System for Controller
                  Area Network {(CAN)}},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {58621--58633},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3073057},
  doi          = {10.1109/ACCESS.2021.3073057},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BozdalSJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FanC21,
  author       = {Zhijie Fan and
                  Zhiwei Cao},
  title        = {Method of Network Intrusion Discovery Based on Convolutional Long-Short
                  Term Memory Network and Implementation in {VSS}},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {122744--122753},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3104718},
  doi          = {10.1109/ACCESS.2021.3104718},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/FanC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GadNB21,
  author       = {Abdallah R. Gad and
                  Ahmed A. Nashat and
                  Tamer M. Barkat},
  title        = {Intrusion Detection System Using Machine Learning for Vehicular Ad
                  Hoc Networks Based on ToN-IoT Dataset},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {142206--142217},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3120626},
  doi          = {10.1109/ACCESS.2021.3120626},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GadNB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JeuneGM21,
  author       = {Laurens Le Jeune and
                  Toon Goedem{\'{e}} and
                  Nele Mentens},
  title        = {Machine Learning for Misuse-Based Network Intrusion Detection: Overview,
                  Unified Evaluation and Feature Choice Comparison Framework},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {63995--64015},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3075066},
  doi          = {10.1109/ACCESS.2021.3075066},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JeuneGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KumarGA21,
  author       = {Satish Kumar and
                  Sunanda Gupta and
                  Sakshi Arora},
  title        = {Research Trends in Network-Based Intrusion Detection Systems: {A}
                  Review},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {157761--157779},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3129775},
  doi          = {10.1109/ACCESS.2021.3129775},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KumarGA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuWLL21,
  author       = {Lan Liu and
                  Pengcheng Wang and
                  Jun Lin and
                  Langzhou Liu},
  title        = {Intrusion Detection of Imbalanced Network Traffic Based on Machine
                  Learning and Deep Learning},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {7550--7563},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2020.3048198},
  doi          = {10.1109/ACCESS.2020.3048198},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuWLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MartinSAC21,
  author       = {Manuel L{\'{o}}pez Mart{\'{\i}}n and
                  Antonio S{\'{a}}nchez{-}Esguevillas and
                  Juan Ignacio Arribas and
                  Bel{\'{e}}n Carro},
  title        = {Network Intrusion Detection Based on Extended {RBF} Neural Network
                  With Offline Reinforcement Learning},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {153153--153170},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3127689},
  doi          = {10.1109/ACCESS.2021.3127689},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MartinSAC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MendoncaTRSMNR21,
  author       = {Robson V. Mendon{\c{c}}a and
                  Arthur A. M. Teodoro and
                  Renata Lopes Rosa and
                  Muhammad Saadi and
                  Dick Carrillo Melgarejo and
                  Pedro H. J. Nardelli and
                  Dem{\'{o}}stenes Z. Rodr{\'{\i}}guez},
  title        = {Intrusion Detection System Based on Fast Hierarchical Deep Convolutional
                  Neural Network},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {61024--61034},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3074664},
  doi          = {10.1109/ACCESS.2021.3074664},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MendoncaTRSMNR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Mora-GimenoMVA21,
  author       = {Francisco Jos{\'{e}} Mora{-}Gimeno and
                  Higinio Mora Mora and
                  Bruno Volckaert and
                  Ankita Atrey},
  title        = {Intrusion Detection System Based on Integrated System Calls Graph
                  and Neural Networks},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {9822--9833},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3049249},
  doi          = {10.1109/ACCESS.2021.3049249},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Mora-GimenoMVA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MoulahiZAA21,
  author       = {Tarek Moulahi and
                  Salah Zidi and
                  Abdulatif Alabdulatif and
                  Mohammed Atiquzzaman},
  title        = {Comparative Performance Evaluation of Intrusion Detection Based on
                  Machine Learning in In-Vehicle Controller Area Network Bus},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {99595--99605},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3095962},
  doi          = {10.1109/ACCESS.2021.3095962},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MoulahiZAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ParkKKSS21,
  author       = {Daekyeong Park and
                  Sangsoo Kim and
                  Hyukjin Kwon and
                  Dongil Shin and
                  Dongkyoo Shin},
  title        = {Host-Based Intrusion Detection Model Using Siamese Network},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {76614--76623},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3082160},
  doi          = {10.1109/ACCESS.2021.3082160},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ParkKKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SeoP21,
  author       = {Wooseok Seo and
                  Wooguil Pak},
  title        = {Real-Time Network Intrusion Prevention System Based on Hybrid Machine
                  Learning},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {46386--46397},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3066620},
  doi          = {10.1109/ACCESS.2021.3066620},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SeoP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SiddiqiP21,
  author       = {Murtaza Ahmed Siddiqi and
                  Wooguil Pak},
  title        = {An Agile Approach to Identify Single and Hybrid Normalization for
                  Enhancing Machine Learning-Based Network Intrusion Detection},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {137494--137513},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3118361},
  doi          = {10.1109/ACCESS.2021.3118361},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SiddiqiP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TangL21,
  author       = {Yanqiang Tang and
                  Chenghai Li},
  title        = {An Online Network Intrusion Detection Model Based on Improved Regularized
                  Extreme Learning Machine},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {94826--94844},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3093313},
  doi          = {10.1109/ACCESS.2021.3093313},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/TangL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TufanTA21,
  author       = {Emrah Tufan and
                  Cihangir Tezcan and
                  Cengiz Acart{\"{u}}rk},
  title        = {Anomaly-Based Intrusion Detection by Machine Learning: {A} Case Study
                  on Probing Attacks to an Institutional Network},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {50078--50092},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3068961},
  doi          = {10.1109/ACCESS.2021.3068961},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TufanTA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/UhmP21,
  author       = {Yeongje Uhm and
                  Wooguil Pak},
  title        = {Service-Aware Two-Level Partitioning for Machine Learning-Based Network
                  Intrusion Detection With High Performance and High Scalability},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {6608--6622},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2020.3048900},
  doi          = {10.1109/ACCESS.2020.3048900},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/UhmP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangZLL21,
  author       = {Zhendong Wang and
                  Yong Zeng and
                  Yaodi Liu and
                  Dahai Li},
  title        = {Deep Belief Network Integrating Improved Kernel-Based Extreme Learning
                  Machine for Network Intrusion Detection},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {16062--16091},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3051074},
  doi          = {10.1109/ACCESS.2021.3051074},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangZLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YueWWDN21,
  author       = {Chuan Yue and
                  Lide Wang and
                  Dengrui Wang and
                  Ruifeng Duo and
                  Xiaobo Nie},
  title        = {An Ensemble Intrusion Detection Method for Train Ethernet Consist
                  Network Based on {CNN} and {RNN}},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {59527--59539},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3073413},
  doi          = {10.1109/ACCESS.2021.3073413},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YueWWDN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/accs/KumarGT21,
  author       = {Prabhat Kumar and
                  Govind P. Gupta and
                  Rakesh Tripathi},
  title        = {Design of Anomaly-Based Intrusion Detection System Using Fog Computing
                  for IoT Network},
  journal      = {Autom. Control. Comput. Sci.},
  volume       = {55},
  number       = {2},
  pages        = {137--147},
  year         = {2021},
  url          = {https://doi.org/10.3103/S0146411621020085},
  doi          = {10.3103/S0146411621020085},
  timestamp    = {Mon, 17 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/accs/KumarGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/VargheseJ21,
  author       = {Meble Varghese and
                  M. Victor Jose},
  title        = {Securing Cloud from Attacks: Machine Learning Based Intrusion Detection
                  in Cloud Sensor Networks},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {50},
  number       = {1-4},
  pages        = {143--171},
  year         = {2021},
  url          = {https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-50-number-1-4-2021/20233-2/},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ahswn/VargheseJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/BediGJ21,
  author       = {Punam Bedi and
                  Neha Gupta and
                  Vinita Jindal},
  title        = {I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based
                  intrusion detection systems},
  journal      = {Appl. Intell.},
  volume       = {51},
  number       = {2},
  pages        = {1133--1151},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10489-020-01886-y},
  doi          = {10.1007/S10489-020-01886-Y},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/BediGJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/KhanPKKHNA21,
  author       = {Izhar Ahmed Khan and
                  Dechang Pi and
                  Nasrullah Khan and
                  Zaheer Ullah Khan and
                  Yasir Hussain and
                  Asif Nawaz and
                  Farman Ali},
  title        = {A privacy-conserving framework based intrusion detection method for
                  detecting and recognizing malicious behaviours in cyber-physical power
                  networks},
  journal      = {Appl. Intell.},
  volume       = {51},
  number       = {10},
  pages        = {7306--7321},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10489-021-02222-8},
  doi          = {10.1007/S10489-021-02222-8},
  timestamp    = {Sun, 30 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/KhanPKKHNA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bdcc/LoukT21,
  author       = {Maya Hilda Lestari Louk and
                  Bayu Adhi Tama},
  title        = {Exploring Ensemble-Based Class Imbalance Learners for Intrusion Detection
                  in Industrial Control Networks},
  journal      = {Big Data Cogn. Comput.},
  volume       = {5},
  number       = {4},
  pages        = {72},
  year         = {2021},
  url          = {https://doi.org/10.3390/bdcc5040072},
  doi          = {10.3390/BDCC5040072},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bdcc/LoukT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdata/Al-TuraikiA21,
  author       = {Isra Al{-}Turaiki and
                  Najwa Altwaijry},
  title        = {A Convolutional Neural Network for Improved Anomaly-Based Network
                  Intrusion Detection},
  journal      = {Big Data},
  volume       = {9},
  number       = {3},
  pages        = {233--252},
  year         = {2021},
  url          = {https://doi.org/10.1089/big.2020.0263},
  doi          = {10.1089/BIG.2020.0263},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bigdata/Al-TuraikiA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candie/MashuriALPW21,
  author       = {Muhammad Mashuri and
                  Muhammad Ahsan and
                  Muhammad Hisyam Lee and
                  Dedy Dwi Prastyo and
                  Wibawati},
  title        = {PCA-based Hotelling's \emph{T}\({}^{\mbox{2}}\) chart with fast minimum
                  covariance determinant {(FMCD)} estimator and kernel density estimation
                  {(KDE)} for network intrusion detection},
  journal      = {Comput. Ind. Eng.},
  volume       = {158},
  pages        = {107447},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cie.2021.107447},
  doi          = {10.1016/J.CIE.2021.107447},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/candie/MashuriALPW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cin/MouallaKJ21,
  author       = {Soulaiman Moualla and
                  Khaldoun Khorzom and
                  Assef Jafar},
  title        = {Improving the Performance of Machine Learning-Based Network Intrusion
                  Detection Systems on the {UNSW-NB15} Dataset},
  journal      = {Comput. Intell. Neurosci.},
  volume       = {2021},
  pages        = {5557577:1--5557577:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5557577},
  doi          = {10.1155/2021/5557577},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cin/MouallaKJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cin/WangTQ0021,
  author       = {Zu{-}Min Wang and
                  Jiyu Tian and
                  Jing Qin and
                  Hui Fang and
                  Li{-}Ming Chen},
  title        = {A Few-Shot Learning-Based Siamese Capsule Network for Intrusion Detection
                  with Imbalanced Training Data},
  journal      = {Comput. Intell. Neurosci.},
  volume       = {2021},
  pages        = {7126913:1--7126913:17},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/7126913},
  doi          = {10.1155/2021/7126913},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cin/WangTQ0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/DengLYW21,
  title        = {Retraction Note to: Mobile network intrusion detection for IoT system
                  based on transfer learning algorithm},
  journal      = {Clust. Comput.},
  volume       = {24},
  number       = {1},
  pages        = {589},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10586-021-03251-1},
  doi          = {10.1007/S10586-021-03251-1},
  timestamp    = {Wed, 31 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/DengLYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/SrilathaS21,
  author       = {Doddi Srilatha and
                  Gopal Krishna Shyam},
  title        = {Cloud-based intrusion detection using kernel fuzzy clustering and
                  optimal type-2 fuzzy neural network},
  journal      = {Clust. Comput.},
  volume       = {24},
  number       = {3},
  pages        = {2657--2672},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10586-021-03281-9},
  doi          = {10.1007/S10586-021-03281-9},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/SrilathaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AlvaresDAGHR21,
  author       = {Christabelle Alvares and
                  Dristi Dinesh and
                  Syed Alvi and
                  Tannish Gautam and
                  Maheen Hasib and
                  Ali Raza},
  title        = {Dataset of attacks on a live enterprise VoIP network for machine learning
                  based intrusion detection and prevention systems},
  journal      = {Comput. Networks},
  volume       = {197},
  pages        = {108283},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108283},
  doi          = {10.1016/J.COMNET.2021.108283},
  timestamp    = {Fri, 24 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/AlvaresDAGHR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HademSM21,
  author       = {Pynbianglut Hadem and
                  Dilip Kumar Saikia and
                  Soumen Moulik},
  title        = {An SDN-based Intrusion Detection System using {SVM} with Selective
                  Logging for {IP} Traceback},
  journal      = {Comput. Networks},
  volume       = {191},
  pages        = {108015},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108015},
  doi          = {10.1016/J.COMNET.2021.108015},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HademSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KhanKKAA21,
  author       = {Ammar Ahmed Khan and
                  Muhammad Mubashir Khan and
                  Kashif Mehboob Khan and
                  Junaid Arshad and
                  Farhan Ahmad},
  title        = {A blockchain-based decentralized machine learning framework for collaborative
                  intrusion detection within UAVs},
  journal      = {Comput. Networks},
  volume       = {196},
  pages        = {108217},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108217},
  doi          = {10.1016/J.COMNET.2021.108217},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/KhanKKAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/YazdinejadPDK21,
  author       = {Abbas Yazdinejad and
                  Reza M. Parizi and
                  Ali Dehghantanha and
                  Mohammad S. Khan},
  title        = {A kangaroo-based intrusion detection system on software-defined networks},
  journal      = {Comput. Networks},
  volume       = {184},
  pages        = {107688},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2020.107688},
  doi          = {10.1016/J.COMNET.2020.107688},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/YazdinejadPDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/YinZL21,
  author       = {Sheng{-}lin Yin and
                  Xing{-}Lan Zhang and
                  Shuo Liu},
  title        = {Intrusion detection for capsule networks based on dual routing mechanism},
  journal      = {Comput. Networks},
  volume       = {197},
  pages        = {108328},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108328},
  doi          = {10.1016/J.COMNET.2021.108328},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/YinZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/YuDCLXLQLZZ21,
  author       = {Lian Yu and
                  Jingtao Dong and
                  Lihao Chen and
                  Mengyuan Li and
                  Bingfeng Xu and
                  Zhao Li and
                  Lin Qiao and
                  Lijun Liu and
                  Bei Zhao and
                  Chen Zhang},
  title        = {{PBCNN:} Packet Bytes-based Convolutional Neural Network for Network
                  Intrusion Detection},
  journal      = {Comput. Networks},
  volume       = {194},
  pages        = {108117},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108117},
  doi          = {10.1016/J.COMNET.2021.108117},
  timestamp    = {Fri, 30 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/YuDCLXLQLZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/JiaLZHS21,
  author       = {Huaping Jia and
                  Jun Liu and
                  Min Zhang and
                  Xiaohu He and
                  Weixi Sun},
  title        = {Network intrusion detection based on {IE-DBN} model},
  journal      = {Comput. Commun.},
  volume       = {178},
  pages        = {131--140},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comcom.2021.07.016},
  doi          = {10.1016/J.COMCOM.2021.07.016},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/JiaLZHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/RaoRR21,
  author       = {K. Narayana Rao and
                  K. Venkata Rao and
                  P. V. G. D. Prasad Reddy},
  title        = {A hybrid Intrusion Detection System based on Sparse autoencoder and
                  Deep Neural Network},
  journal      = {Comput. Commun.},
  volume       = {180},
  pages        = {77--88},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comcom.2021.08.026},
  doi          = {10.1016/J.COMCOM.2021.08.026},
  timestamp    = {Tue, 23 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/RaoRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NazirK21,
  author       = {Anjum Nazir and
                  Rizwan Ahmed Khan},
  title        = {A novel combinatorial optimization based feature selection method
                  for network intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102164},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102164},
  doi          = {10.1016/J.COSE.2020.102164},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NazirK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/00010JY0021,
  author       = {Wenjuan Li and
                  Yu Wang and
                  Zhiping Jin and
                  Keping Yu and
                  Jin Li and
                  Yang Xiang},
  title        = {Challenge-based collaborative intrusion detection in software-defined
                  networking: an evaluation},
  journal      = {Digit. Commun. Networks},
  volume       = {7},
  number       = {2},
  pages        = {257--263},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.dcan.2020.09.003},
  doi          = {10.1016/J.DCAN.2020.09.003},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcan/00010JY0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/Sohn21,
  author       = {Insoo Sohn},
  title        = {Deep belief network based intrusion detection techniques: {A} survey},
  journal      = {Expert Syst. Appl.},
  volume       = {167},
  pages        = {114170},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.eswa.2020.114170},
  doi          = {10.1016/J.ESWA.2020.114170},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/Sohn21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/GavelSSRT21,
  author       = {Shashank Gavel and
                  Jyotsana Singh and
                  Namrata Shukla and
                  Ajay Singh Raghuvanshi and
                  Sudarshan Tiwari},
  title        = {Feature reduction scheme for anomaly-based intrusion detection in
                  wireless networks: Building of hybrid model},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {12},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.4367},
  doi          = {10.1002/ETT.4367},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/GavelSSRT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/ThaseenBLGA21,
  author       = {I. Sumaiya Thaseen and
                  J. Saira Banu and
                  K. Lavanya and
                  Muhammad Rukunuddin Ghalib and
                  Kumar Abhishek},
  title        = {An integrated intrusion detection system using correlation-based attribute
                  selection and artificial neural network},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.4014},
  doi          = {10.1002/ETT.4014},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/ThaseenBLGA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ViolettasSPM21,
  author       = {George E. Violettas and
                  George Simoglou and
                  Sophia G. Petridou and
                  Lefteris Mamatas},
  title        = {A Softwarized Intrusion Detection System for the RPL-based Internet
                  of Things networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {125},
  pages        = {698--714},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.future.2021.07.013},
  doi          = {10.1016/J.FUTURE.2021.07.013},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ViolettasSPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/AlzahraniA21,
  author       = {Abdulsalam O. Alzahrani and
                  Mohammed J. F. Alenazi},
  title        = {Designing a Network Intrusion Detection System Based on Machine Learning
                  for Software Defined Networks},
  journal      = {Future Internet},
  volume       = {13},
  number       = {5},
  pages        = {111},
  year         = {2021},
  url          = {https://doi.org/10.3390/fi13050111},
  doi          = {10.3390/FI13050111},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/AlzahraniA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ict-express/ThilagamA21,
  author       = {T. Thilagam and
                  R. Aruna},
  title        = {Intrusion detection for network based cloud computing by custom {RC-NN}
                  and optimization},
  journal      = {{ICT} Express},
  volume       = {7},
  number       = {4},
  pages        = {512--520},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.icte.2021.04.006},
  doi          = {10.1016/J.ICTE.2021.04.006},
  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ict-express/ThilagamA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijccc/LiuLWYSCQ21,
  author       = {Xue{-}jun Liu and
                  Kai{-}li Li and
                  Wenhui Wang and
                  Yong Yan and
                  Yun Sha and
                  Jianping Chen and
                  Jiaojiao Qin},
  title        = {Improved {RBF} Network Intrusion Detection Model Based on Edge Computing
                  with Multi-algorithm Fusion},
  journal      = {Int. J. Comput. Commun. Control},
  volume       = {16},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.15837/ijccc.2021.4.4232},
  doi          = {10.15837/IJCCC.2021.4.4232},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijccc/LiuLWYSCQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/DaweriAA21,
  author       = {Muataz Salam Al Daweri and
                  Salwani Abdullah and
                  Khairul Akram Zainol Ariffin},
  title        = {A homogeneous ensemble based dynamic artificial neural network for
                  solving the intrusion detection problem},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100449},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100449},
  doi          = {10.1016/J.IJCIP.2021.100449},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/DaweriAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BelavagiM21,
  author       = {Manjula C. Belavagi and
                  Balachandra Muniyal},
  title        = {Improved Intrusion Detection System using Quantal Response Equilibrium-based
                  Game Model and Rule-based Classification},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {1},
  year         = {2021},
  url          = {https://www.ijcnis.org/index.php/ijcnis/article/view/4875},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BelavagiM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SahaKRK21,
  author       = {Rahul Saha and
                  Gulshan Kumar and
                  Mritunjay Kumar Rai and
                  Hye{-}Jin Kim},
  title        = {Adaptive classifier-based intrusion detection system using logistic
                  regression and Euclidean distance on network probe vectors in resource
                  constrained networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {226--238},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118950},
  doi          = {10.1504/IJICS.2021.118950},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SahaKRK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/He21,
  author       = {Xiaohong He},
  title        = {Intrusion detection of hierarchical distribution network system based
                  on machine computation},
  journal      = {Int. J. Inf. Commun. Technol.},
  volume       = {18},
  number       = {4},
  pages        = {371--385},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICT.2021.115589},
  doi          = {10.1504/IJICT.2021.115589},
  timestamp    = {Mon, 12 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijict/He21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/ChenZPZZ21,
  author       = {Guanlin Chen and
                  Kunlong Zhou and
                  Yubo Peng and
                  Liang Zhou and
                  Yong Zhang},
  title        = {A novel network intrusion prevention system based on Android platform},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {14},
  number       = {2},
  pages        = {67--76},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPT.2021.116254},
  doi          = {10.1504/IJIPT.2021.116254},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/ChenZPZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmssc/SoniyaV21,
  author       = {S. Sobin Soniya and
                  S. Maria Celestin Vigila},
  title        = {Feedback deer hunting optimization algorithm for intrusion detection
                  in cloud based deep residual network},
  journal      = {Int. J. Model. Simul. Sci. Comput.},
  volume       = {12},
  number       = {6},
  pages        = {2150047:1--2150047:23},
  year         = {2021},
  url          = {https://doi.org/10.1142/S1793962321500471},
  doi          = {10.1142/S1793962321500471},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmssc/SoniyaV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ChorasP21,
  author       = {Michal Choras and
                  Marek Pawlicki},
  title        = {Intrusion detection approach based on optimised artificial neural
                  network},
  journal      = {Neurocomputing},
  volume       = {452},
  pages        = {705--715},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.neucom.2020.07.138},
  doi          = {10.1016/J.NEUCOM.2020.07.138},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijon/ChorasP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/HeCJ21,
  author       = {Sudao He and
                  Fuyang Chen and
                  Bin Jiang},
  title        = {Physical intrusion monitoring via local-global network and deep isolation
                  forest based on heterogeneous signals},
  journal      = {Neurocomputing},
  volume       = {441},
  pages        = {25--35},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.neucom.2021.01.104},
  doi          = {10.1016/J.NEUCOM.2021.01.104},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijon/HeCJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpe/TranCJBD21,
  author       = {Ngan Tran and
                  Haihua Chen and
                  Jiang Janet and
                  Jay Bhuyan and
                  Junhua Ding},
  title        = {Effect of Class Imbalance on the Performance of Machine Learning-based
                  Network Intrusion Detection},
  journal      = {Int. J. Perform. Eng.},
  volume       = {17},
  number       = {9},
  pages        = {741},
  year         = {2021},
  url          = {https://doi.org/10.23940/ijpe.21.09.p1.741755},
  doi          = {10.23940/IJPE.21.09.P1.741755},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpe/TranCJBD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsssp/ValivetiMD21,
  author       = {Sharada Ramakrishna Valiveti and
                  Anush Manglani and
                  Tadrush Desai},
  title        = {Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc Networks:
                  {A} Practical Comprehension},
  journal      = {Int. J. Syst. Softw. Secur. Prot.},
  volume       = {12},
  number       = {2},
  pages        = {11--32},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijsssp.2021070102},
  doi          = {10.4018/IJSSSP.2021070102},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsssp/ValivetiMD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwin/WuLWWX21,
  author       = {Fei Wu and
                  Ting Li and
                  Zhen Wu and
                  ShuLin Wu and
                  ChuanQi Xiao},
  title        = {Research on Network Intrusion Detection Technology Based on Machine
                  Learning},
  journal      = {Int. J. Wirel. Inf. Networks},
  volume       = {28},
  number       = {3},
  pages        = {262--275},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10776-021-00520-z},
  doi          = {10.1007/S10776-021-00520-Z},
  timestamp    = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwin/WuLWWX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/DinaM21,
  author       = {Ayesha S. Dina and
                  D. Manivannan},
  title        = {Intrusion detection based on Machine Learning techniques in computer
                  networks},
  journal      = {Internet Things},
  volume       = {16},
  pages        = {100462},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.iot.2021.100462},
  doi          = {10.1016/J.IOT.2021.100462},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iot/DinaM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangSSX21,
  author       = {Bizhu Wang and
                  Yan Sun and
                  Mengying Sun and
                  Xiaodong Xu},
  title        = {Game-Theoretic Actor-Critic-Based Intrusion Response Scheme {(GTAC-IRS)}
                  for Wireless SDN-Based IoT Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {3},
  pages        = {1830--1845},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3015042},
  doi          = {10.1109/JIOT.2020.3015042},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WangSSX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/AndresiniAM21,
  author       = {Giuseppina Andresini and
                  Annalisa Appice and
                  Donato Malerba},
  title        = {Autoencoder-based deep metric learning for network intrusion detection},
  journal      = {Inf. Sci.},
  volume       = {569},
  pages        = {706--727},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2021.05.016},
  doi          = {10.1016/J.INS.2021.05.016},
  timestamp    = {Mon, 14 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/AndresiniAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/KanFFCXYL21,
  author       = {Xiu Kan and
                  Yixuan Fan and
                  Zhijun Fang and
                  Le Cao and
                  Neal N. Xiong and
                  Dan Yang and
                  Xuan Li},
  title        = {A novel IoT network intrusion detection approach based on Adaptive
                  Particle Swarm Optimization Convolutional Neural Network},
  journal      = {Inf. Sci.},
  volume       = {568},
  pages        = {147--162},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2021.03.060},
  doi          = {10.1016/J.INS.2021.03.060},
  timestamp    = {Mon, 14 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/KanFFCXYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/DasariECS21,
  author       = {Durga Bhavani Dasari and
                  Gayathri Edamadaka and
                  Ch. Smitha Chowdary and
                  M. Sobhana},
  title        = {Anomaly-based network intrusion detection with ensemble classifiers
                  and meta-heuristic scale {(ECMHS)} in traffic flow streams},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {12},
  number       = {10},
  pages        = {9241--9268},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12652-020-02628-1},
  doi          = {10.1007/S12652-020-02628-1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/DasariECS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/GuptaA21,
  author       = {Akshay Rameshbhai Gupta and
                  Jitendra Agrawal},
  title        = {The multi-demeanor fusion based robust intrusion detection system
                  for anomaly and misuse detection in computer networks},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {12},
  number       = {1},
  pages        = {303--319},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12652-020-01974-4},
  doi          = {10.1007/S12652-020-01974-4},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/GuptaA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/KumarGT21,
  author       = {Prabhat Kumar and
                  Govind P. Gupta and
                  Rakesh Tripathi},
  title        = {A distributed ensemble design based intrusion detection system using
                  fog computing to protect the internet of things networks},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {12},
  number       = {10},
  pages        = {9555--9572},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12652-020-02696-3},
  doi          = {10.1007/S12652-020-02696-3},
  timestamp    = {Mon, 17 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/KumarGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/AltahaLAH21,
  author       = {Mustafa Altaha and
                  Jae{-}Myeong Lee and
                  Muhammad Aslam and
                  Sugwon Hong},
  title        = {An Autoencoder-Based Network Intrusion Detection System for the {SCADA}
                  System},
  journal      = {J. Commun.},
  volume       = {16},
  number       = {6},
  pages        = {210--216},
  year         = {2021},
  url          = {https://doi.org/10.12720/jcm.16.6.210-216},
  doi          = {10.12720/JCM.16.6.210-216},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/AltahaLAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/0009ZR21,
  author       = {Qian Wang and
                  Wenfang Zhao and
                  Jiadong Ren},
  title        = {Intrusion detection algorithm based on image enhanced convolutional
                  neural network},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {41},
  number       = {1},
  pages        = {2183--2194},
  year         = {2021},
  url          = {https://doi.org/10.3233/JIFS-210863},
  doi          = {10.3233/JIFS-210863},
  timestamp    = {Fri, 10 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/0009ZR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrie/KeserwaniGPG21,
  author       = {Pankaj Kumar Keserwani and
                  Mahesh Chandra Govil and
                  Emmanuel S. Pilli and
                  Prajjval Govil},
  title        = {A smart anomaly-based intrusion detection system for the Internet
                  of Things (IoT) network using {GWO-PSO-RF} model},
  journal      = {J. Reliab. Intell. Environ.},
  volume       = {7},
  number       = {1},
  pages        = {3--21},
  year         = {2021},
  url          = {https://doi.org/10.1007/s40860-020-00126-x},
  doi          = {10.1007/S40860-020-00126-X},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrie/KeserwaniGPG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/HanWZCYLSY21,
  author       = {Dongqi Han and
                  Zhiliang Wang and
                  Ying Zhong and
                  Wenqi Chen and
                  Jiahai Yang and
                  Shuqiang Lu and
                  Xingang Shi and
                  Xia Yin},
  title        = {Evaluating and Improving Adversarial Robustness of Machine Learning-Based
                  Network Intrusion Detectors},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {39},
  number       = {8},
  pages        = {2632--2647},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAC.2021.3087242},
  doi          = {10.1109/JSAC.2021.3087242},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/HanWZCYLSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwe/WangJL21,
  author       = {Yue Wang and
                  Yiming Jiang and
                  Julong Lan},
  title        = {Intrusion Detection Using Few-shot Learning Based on Triplet Graph
                  Convolutional Network},
  journal      = {J. Web Eng.},
  volume       = {20},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.13052/jwe1540-9589.2059},
  doi          = {10.13052/JWE1540-9589.2059},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jwe/WangJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/AndresiniAM21,
  author       = {Giuseppina Andresini and
                  Annalisa Appice and
                  Donato Malerba},
  title        = {Nearest cluster-based intrusion detection through convolutional neural
                  networks},
  journal      = {Knowl. Based Syst.},
  volume       = {216},
  pages        = {106798},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.knosys.2021.106798},
  doi          = {10.1016/J.KNOSYS.2021.106798},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/AndresiniAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/MartinCAS21,
  author       = {Manuel L{\'{o}}pez Mart{\'{\i}}n and
                  Bel{\'{e}}n Carro and
                  Juan Ignacio Arribas and
                  Antonio S{\'{a}}nchez{-}Esguevillas},
  title        = {Network intrusion detection with a novel hierarchy of distances between
                  embeddings of hash {IP} addresses},
  journal      = {Knowl. Based Syst.},
  volume       = {219},
  pages        = {106887},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.knosys.2021.106887},
  doi          = {10.1016/J.KNOSYS.2021.106887},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/MartinCAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/ShiXWK21,
  author       = {Dongxian Shi and
                  Ming Xu and
                  Ting Wu and
                  Liang Kou},
  title        = {Intrusion Detecting System Based on Temporal Convolutional Network
                  for In-Vehicle {CAN} Networks},
  journal      = {Mob. Inf. Syst.},
  volume       = {2021},
  pages        = {1440259:1--1440259:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/1440259},
  doi          = {10.1155/2021/1440259},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/ShiXWK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mlc/HuTLDG21,
  author       = {Ning Hu and
                  Zhihong Tian and
                  Hui Lu and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {A multiple-kernel clustering based intrusion detection scheme for
                  5G and IoT networks},
  journal      = {Int. J. Mach. Learn. Cybern.},
  volume       = {12},
  number       = {11},
  pages        = {3129--3144},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13042-020-01253-w},
  doi          = {10.1007/S13042-020-01253-W},
  timestamp    = {Fri, 07 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mlc/HuTLDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/HsuAHPL21,
  author       = {Chia{-}Ming Hsu and
                  Muhammad Zulfan Azhari and
                  He{-}Yen Hsieh and
                  Setya Widyawan Prakosa and
                  Jenq{-}Shiou Leu},
  title        = {Robust Network Intrusion Detection Scheme Using Long-Short Term Memory
                  Based Convolutional Neural Networks},
  journal      = {Mob. Networks Appl.},
  volume       = {26},
  number       = {3},
  pages        = {1137--1144},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11036-020-01623-2},
  doi          = {10.1007/S11036-020-01623-2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/HsuAHPL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KalaC21,
  author       = {T. Sree Kala and
                  A. Christy},
  title        = {{HFFPNN} classifier: a hybrid approach for intrusion detection based
                  {OPSO} and hybridization of feed forward neural network {(FFNN)} and
                  probabilistic neural network {(PNN)}},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {4},
  pages        = {6457--6478},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-020-09804-7},
  doi          = {10.1007/S11042-020-09804-7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/KalaC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/ShamsRU21,
  author       = {Erfan A. Shams and
                  Ahmet Rizaner and
                  Ali Hakan Ulusoy},
  title        = {A novel context-aware feature extraction method for convolutional
                  neural network-based intrusion detection systems},
  journal      = {Neural Comput. Appl.},
  volume       = {33},
  number       = {20},
  pages        = {13647--13665},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00521-021-05994-9},
  doi          = {10.1007/S00521-021-05994-9},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nca/ShamsRU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/TaoHL21,
  author       = {Jing Tao and
                  Ting Han and
                  Ruidong Li},
  title        = {Deep-Reinforcement-Learning-Based Intrusion Detection in Aerial Computing
                  Networks},
  journal      = {{IEEE} Netw.},
  volume       = {35},
  number       = {4},
  pages        = {66--72},
  year         = {2021},
  url          = {https://doi.org/10.1109/MNET.011.2100068},
  doi          = {10.1109/MNET.011.2100068},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/TaoHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/Aljumah21,
  author       = {Abdullah Aljumah},
  title        = {IoT-based intrusion detection system using convolution neural networks},
  journal      = {PeerJ Comput. Sci.},
  volume       = {7},
  pages        = {e721},
  year         = {2021},
  url          = {https://doi.org/10.7717/peerj-cs.721},
  doi          = {10.7717/PEERJ-CS.721},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/Aljumah21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/HalderCD21,
  author       = {Subir Halder and
                  Mauro Conti and
                  Sajal K. Das},
  title        = {A holistic approach to power efficiency in a clock offset based Intrusion
                  Detection Systems for Controller Area Networks},
  journal      = {Pervasive Mob. Comput.},
  volume       = {73},
  pages        = {101385},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.pmcj.2021.101385},
  doi          = {10.1016/J.PMCJ.2021.101385},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/HalderCD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/DevanK21,
  author       = {Preethi Devan and
                  Neelu Khare},
  title        = {Sparse auto encoder driven support vector regression based deep learning
                  model for predicting network intrusions},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {14},
  number       = {4},
  pages        = {2419--2429},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12083-020-00986-3},
  doi          = {10.1007/S12083-020-00986-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/DevanK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuLZWLY21,
  author       = {Xiaodong Liu and
                  Tong Li and
                  Runzi Zhang and
                  Di Wu and
                  Yongheng Liu and
                  Zhen Yang},
  title        = {A {GAN} and Feature Selection-Based Oversampling Technique for Intrusion
                  Detection},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {9947059:1--9947059:15},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/9947059},
  doi          = {10.1155/2021/9947059},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LiuLZWLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ManS21,
  author       = {Jiarui Man and
                  Guozi Sun},
  title        = {A Residual Learning-Based Network Intrusion Detection System},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5593435:1--5593435:9},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5593435},
  doi          = {10.1155/2021/5593435},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ManS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ManZYYLW21,
  author       = {Dapeng Man and
                  Fanyi Zeng and
                  Wu Yang and
                  Miao Yu and
                  Jiguang Lv and
                  Yijing Wang},
  title        = {Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted
                  Internet of Things},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {9361348:1--9361348:11},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/9361348},
  doi          = {10.1155/2021/9361348},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ManZYYLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangJL21,
  author       = {Yue Wang and
                  Yiming Jiang and
                  Julong Lan},
  title        = {{FCNN:} An Efficient Intrusion Detection Method Based on Raw Network
                  Traffic},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5533269:1--5533269:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5533269},
  doi          = {10.1155/2021/5533269},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangCMRCLY21,
  author       = {Chongzhen Zhang and
                  Yanli Chen and
                  Yang Meng and
                  Fangming Ruan and
                  Runze Chen and
                  Yidan Li and
                  Yaru Yang},
  title        = {A Novel Framework Design of Network Intrusion Detection Based on Machine
                  Learning Techniques},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6610675:1--6610675:15},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6610675},
  doi          = {10.1155/2021/6610675},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangCMRCLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoXZN21,
  author       = {Fei Zhao and
                  Yang Xin and
                  Kai Zhang and
                  Xinxin Niu},
  title        = {Representativeness-Based Instance Selection for Intrusion Detection},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6638134:1--6638134:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6638134},
  doi          = {10.1155/2021/6638134},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoXZN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/EssopRPZMR21,
  author       = {Ismael Essop and
                  Jos{\'{e}} Carlos Ribeiro and
                  Maria Papaioannou and
                  Georgios Zachos and
                  Georgios Mantas and
                  Jonathan Rodriguez},
  title        = {Generating Datasets for Anomaly-Based Intrusion Detection Systems
                  in IoT and Industrial IoT Networks},
  journal      = {Sensors},
  volume       = {21},
  number       = {4},
  pages        = {1528},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21041528},
  doi          = {10.3390/S21041528},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/EssopRPZMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/MehediARA21,
  author       = {Sk. Tanzir Mehedi and
                  Adnan Anwar and
                  Ziaur Rahman and
                  Kawsar Ahmed},
  title        = {Deep Transfer Learning Based Intrusion Detection System for Electric
                  Vehicular Networks},
  journal      = {Sensors},
  volume       = {21},
  number       = {14},
  pages        = {4736},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21144736},
  doi          = {10.3390/S21144736},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/MehediARA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/QaddouraAFA21,
  author       = {Raneem Qaddoura and
                  Ala' M. Al{-}Zoubi and
                  Hossam Faris and
                  Iman M. Almomani},
  title        = {A Multi-Layer Classification Approach for Intrusion Detection in IoT
                  Networks Based on Deep Learning},
  journal      = {Sensors},
  volume       = {21},
  number       = {9},
  pages        = {2987},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21092987},
  doi          = {10.3390/S21092987},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/QaddouraAFA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MlikiKC21,
  author       = {Hela Mliki and
                  Abir Hadj Kaceam and
                  Lamia Chaari},
  title        = {A Comprehensive Survey on Intrusion Detection based Machine Learning
                  for IoT Networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {29},
  pages        = {e3},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.6-10-2021.171246},
  doi          = {10.4108/EAI.6-10-2021.171246},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MlikiKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sis/YinLLKJ21,
  author       = {Shoulin Yin and
                  Hang Li and
                  Asif Ali Laghari and
                  Shahid Karim and
                  Awais Khan Jumani},
  title        = {A Bagging Strategy-Based Kernel Extreme Learning Machine for Complex
                  Network Intrusion Detection},
  journal      = {{EAI} Endorsed Trans. Scalable Inf. Syst.},
  volume       = {8},
  number       = {33},
  pages        = {e8},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.6-10-2021.171247},
  doi          = {10.4108/EAI.6-10-2021.171247},
  timestamp    = {Wed, 18 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sis/YinLLKJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/ChoudharyDK21,
  author       = {Sarika Choudhary and
                  Apurba Dey and
                  Nishtha Kesswani},
  title        = {{CRIDS:} Correlation and Regression-Based Network Intrusion Detection
                  System for IoT},
  journal      = {{SN} Comput. Sci.},
  volume       = {2},
  number       = {3},
  pages        = {168},
  year         = {2021},
  url          = {https://doi.org/10.1007/s42979-021-00555-2},
  doi          = {10.1007/S42979-021-00555-2},
  timestamp    = {Wed, 21 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/ChoudharyDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/KoryshevHS21,
  author       = {Nikolay Koryshev and
                  Ilya A. Hodashinsky and
                  Alexander A. Shelupanov},
  title        = {Building a Fuzzy Classifier Based on Whale Optimization Algorithm
                  to Detect Network Intrusions},
  journal      = {Symmetry},
  volume       = {13},
  number       = {7},
  pages        = {1211},
  year         = {2021},
  url          = {https://doi.org/10.3390/sym13071211},
  doi          = {10.3390/SYM13071211},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/KoryshevHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/LyuHZJW21,
  author       = {Renjian Lyu and
                  Mingshu He and
                  Yu Zhang and
                  Lei Jin and
                  Xinlei Wang},
  title        = {Network Intrusion Detection Based on an Efficient Neural Architecture
                  Search},
  journal      = {Symmetry},
  volume       = {13},
  number       = {8},
  pages        = {1453},
  year         = {2021},
  url          = {https://doi.org/10.3390/sym13081453},
  doi          = {10.3390/SYM13081453},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/LyuHZJW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/XieYYLLA21,
  author       = {Guoqi Xie and
                  Laurence T. Yang and
                  Yuanda Yang and
                  Haibo Luo and
                  Renfa Li and
                  Mamoun Alazab},
  title        = {Threat Analysis for Automotive {CAN} Networks: {A} {GAN} Model-Based
                  Intrusion Detection Technique},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {7},
  pages        = {4467--4477},
  year         = {2021},
  url          = {https://doi.org/10.1109/TITS.2021.3055351},
  doi          = {10.1109/TITS.2021.3055351},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/XieYYLLA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/JavedRKAG21,
  author       = {Abdul Rehman Javed and
                  Saif ur Rehman and
                  Mohib Ullah Khan and
                  Mamoun Alazab and
                  Thippa Reddy Gadekallu},
  title        = {CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller
                  Area Network Using {CNN} and Attention-Based {GRU}},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {1456--1466},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSE.2021.3059881},
  doi          = {10.1109/TNSE.2021.3059881},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/JavedRKAG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/PontesSGBM21,
  author       = {Camila F. T. Pontes and
                  Manuela M. C. de Souza and
                  Jo{\~{a}}o J. C. Gondim and
                  Matt Bishop and
                  Marcelo Antonio Marotta},
  title        = {A New Method for Flow-Based Network Intrusion Detection Using the
                  Inverse Potts Model},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {18},
  number       = {2},
  pages        = {1125--1136},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSM.2021.3075503},
  doi          = {10.1109/TNSM.2021.3075503},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/PontesSGBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ZhangCCZC21,
  author       = {Zhixia Zhang and
                  Yang Cao and
                  Zhihua Cui and
                  Wensheng Zhang and
                  Jinjun Chen},
  title        = {A Many-Objective Optimization Based Intelligent Intrusion Detection
                  Algorithm for Enhancing Security of Vehicular Networks in 6G},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {70},
  number       = {6},
  pages        = {5234--5243},
  year         = {2021},
  url          = {https://doi.org/10.1109/TVT.2021.3057074},
  doi          = {10.1109/TVT.2021.3057074},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/ZhangCCZC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/HanCM21,
  author       = {Mu Han and
                  Pengzhou Cheng and
                  Shidian Ma},
  title        = {PPM-InVIDS: Privacy protection model for in-vehicle intrusion detection
                  system based complex-valued neural network},
  journal      = {Veh. Commun.},
  volume       = {31},
  pages        = {100374},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.vehcom.2021.100374},
  doi          = {10.1016/J.VEHCOM.2021.100374},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/HanCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/JeongJCK21,
  author       = {Seonghoon Jeong and
                  Boosun Jeon and
                  Boheung Chung and
                  Huy Kang Kim},
  title        = {Convolutional neural network-based intrusion detection system for
                  {AVTP} streams in automotive Ethernet-based networks},
  journal      = {Veh. Commun.},
  volume       = {29},
  pages        = {100338},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.vehcom.2021.100338},
  doi          = {10.1016/J.VEHCOM.2021.100338},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vcomm/JeongJCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/AwotundeCA21,
  author       = {Joseph Bamidele Awotunde and
                  Chinmay Chakraborty and
                  Emmanuel Abidemi Adeniyi},
  title        = {Intrusion Detection in Industrial Internet of Things Network-Based
                  on Deep Learning Model with Rule-Based Feature Selection},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {7154587:1--7154587:17},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/7154587},
  doi          = {10.1155/2021/7154587},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/AwotundeCA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/DengY21,
  author       = {Hongli Deng and
                  Tao Yang},
  title        = {Network Intrusion Detection Based on Sparse Autoencoder and {IGA-BP}
                  Network},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {9510858:1--9510858:11},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/9510858},
  doi          = {10.1155/2021/9510858},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/DengY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/EinyON21,
  author       = {Sajad Einy and
                  Cemil {\"{O}}z and
                  Yahya Dorostkar Navaei},
  title        = {Network Intrusion Detection System Based on the Combination of Multiobjective
                  Particle Swarm Algorithm-Based Feature Selection and Fast-Learning
                  Network},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {6648351:1--6648351:12},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6648351},
  doi          = {10.1155/2021/6648351},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/EinyON21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/Huang21,
  author       = {Xiaolong Huang},
  title        = {Network Intrusion Detection Based on an Improved Long-Short-Term Memory
                  Model in Combination with Multiple Spatiotemporal Structures},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {6623554:1--6623554:10},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6623554},
  doi          = {10.1155/2021/6623554},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/Huang21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/QiZJLZX21,
  author       = {Guohong Qi and
                  Jie Zhou and
                  Wenxian Jia and
                  Menghan Liu and
                  Shengnan Zhang and
                  Mengying Xu},
  title        = {Intrusion Detection for Network Based on Elite Clone Artificial Bee
                  Colony and Back Propagation Neural Network},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {9956371:1--9956371:11},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/9956371},
  doi          = {10.1155/2021/9956371},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/QiZJLZX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/XieDW21,
  author       = {Bin Xie and
                  Xinyu Dong and
                  Changguang Wang},
  title        = {An Improved {K} -Means Clustering Intrusion Detection Algorithm for
                  Wireless Networks Based on Federated Learning},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {9322368:1--9322368:15},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/9322368},
  doi          = {10.1155/2021/9322368},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/XieDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/MaheswariK21,
  author       = {M. Maheswari and
                  R. A. Karthika},
  title        = {A Novel QoS Based Secure Unequal Clustering Protocol with Intrusion
                  Detection System in Wireless Sensor Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {118},
  number       = {2},
  pages        = {1535--1557},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-021-08101-2},
  doi          = {10.1007/S11277-021-08101-2},
  timestamp    = {Wed, 05 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/MaheswariK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acit3/NtiNAA21,
  author       = {Isaac Kofi Nti and
                  Owusu Nyarko{-}Boateng and
                  Adebayo Felix Adekoya and
                  R. Arjun},
  title        = {Network Intrusion Detection with StackNet: {A} phi coefficient Based
                  Weak Learner Selection Approach},
  booktitle    = {22nd International Arab Conference on Information Technology, {ACIT}
                  2021, Muscat, Oman, December 21-23, 2021},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACIT53391.2021.9677338},
  doi          = {10.1109/ACIT53391.2021.9677338},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acit3/NtiNAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmturc/YangXWZYQ21,
  author       = {Yihong Yang and
                  Xiaolong Xu and
                  Lina Wang and
                  Weiyi Zhong and
                  Chao Yan and
                  Lianyong Qi},
  title        = {Fast Anomaly Detection based on Data Stream in Network Intrusion Detection
                  System},
  booktitle    = {{ACM} {TURC} 2021: {ACM} Turing Award Celebration Conference - Hefei,
                  China, 30 July 2021 - 1 August 2021},
  pages        = {87--91},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3472634.3472656},
  doi          = {10.1145/3472634.3472656},
  timestamp    = {Mon, 11 Oct 2021 17:13:06 +0200},
  biburl       = {https://dblp.org/rec/conf/acmturc/YangXWZYQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/JeuneGM21,
  author       = {Laurens Le Jeune and
                  Toon Goedem{\'{e}} and
                  Nele Mentens},
  editor       = {Jianying Zhou and
                  Chuadhry Mujeeb Ahmed and
                  Lejla Batina and
                  Sudipta Chattopadhyay and
                  Olga Gadyatskaya and
                  Chenglu Jin and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Mihalis Maniatakos and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Masaki Shimaoka and
                  Chunhua Su and
                  Cong Wang},
  title        = {Towards Real-Time Deep Learning-Based Network Intrusion Detection
                  on {FPGA}},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2021
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12809},
  pages        = {133--150},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81645-2\_9},
  doi          = {10.1007/978-3-030-81645-2\_9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/JeuneGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africon/AlimiOARA21,
  author       = {Oyeniyi Akeem Alimi and
                  Khmaies Ouahada and
                  Adnan M. Abu{-}Mahfouz and
                  Suvendi Rimer and
                  Kuburat Oyeranti Adefemi Alimi},
  title        = {Intrusion Detection for Water Distribution Systems based on an Hybrid
                  Particle Swarm Optimization with Back Propagation Neural Network},
  booktitle    = {2021 {IEEE} AFRICON, Arusha, Tanzania, United Republic of, September
                  13-15, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AFRICON51333.2021.9570951},
  doi          = {10.1109/AFRICON51333.2021.9570951},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africon/AlimiOARA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiml2/AmalapuramRCT21,
  author       = {Suresh Kumar Amalapuram and
                  Thushara Tippi Reddy and
                  Sumohana S. Channappayya and
                  Bheemarjuna Reddy Tamma},
  title        = {On Handling Class Imbalance in Continual Learning based Network Intrusion
                  Detection Systems},
  booktitle    = {AIMLSystems 2021: The First International Conference on AI-ML-Systems,
                  Bangalore India, October 21 - 23, 2021},
  pages        = {11:1--11:7},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3486001.3486231},
  doi          = {10.1145/3486001.3486231},
  timestamp    = {Wed, 10 Nov 2021 16:16:02 +0100},
  biburl       = {https://dblp.org/rec/conf/aiml2/AmalapuramRCT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ant/PatelJ21,
  author       = {Himanshu B. Patel and
                  Devesh C. Jinwala},
  editor       = {Elhadi M. Shakshuki and
                  Ansar{-}Ul{-}Haque Yasar},
  title        = {6MID: Mircochain based Intrusion Detection for 6LoWPAN based IoT networks},
  booktitle    = {The 12th International Conference on Ambient Systems, Networks and
                  Technologies {(ANT} 2021) / The 4th International Conference on Emerging
                  Data and Industry 4.0 {(EDI40} 2021) / Affiliated Workshops, March
                  23-26, 2021, Warsaw, Poland},
  series       = {Procedia Computer Science},
  volume       = {184},
  pages        = {929--934},
  publisher    = {Elsevier},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.procs.2021.04.023},
  doi          = {10.1016/J.PROCS.2021.04.023},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ant/PatelJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arabwic/ArchanaPKNSH21,
  author       = {Archana and
                  Chaitra H. P and
                  Khushi and
                  Pradhiksha Nandini and
                  Sivaraman Eswaran and
                  Prasad B. Honnavalli},
  editor       = {Manar Abu Talib and
                  Laila Benhlima and
                  Kaoutar El Maghraoui},
  title        = {Cloud-based Network Intrusion Detection System using Deep Learning},
  booktitle    = {ArabWIC 2021: The 7th Annual International Conference on Arab Women
                  in Computing in Conjunction with the 2nd Forum of Women in Research,
                  Sharjah, United Arab Emirates, August 25 - 26, 2021},
  pages        = {5:1--5:6},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485557.3485562},
  doi          = {10.1145/3485557.3485562},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arabwic/ArchanaPKNSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/MasumSHFVKRAC021,
  author       = {Mohammad Masum and
                  Hossain Shahriar and
                  Hisham Haddad and
                  Md. Jobair Hossain Faruk and
                  Maria Valero and
                  Md Abdullah Khan and
                  Mohammad Ashiqur Rahman and
                  Muhaiminul I. Adnan and
                  Alfredo Cuzzocrea and
                  Fan Wu},
  editor       = {Yixin Chen and
                  Heiko Ludwig and
                  Yicheng Tu and
                  Usama M. Fayyad and
                  Xingquan Zhu and
                  Xiaohua Hu and
                  Suren Byna and
                  Xiong Liu and
                  Jianping Zhang and
                  Shirui Pan and
                  Vagelis Papalexakis and
                  Jianwu Wang and
                  Alfredo Cuzzocrea and
                  Carlos Ordonez},
  title        = {Bayesian Hyperparameter Optimization for Deep Neural Network-Based
                  Network Intrusion Detection},
  booktitle    = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando,
                  FL, USA, December 15-18, 2021},
  pages        = {5413--5419},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigData52589.2021.9671576},
  doi          = {10.1109/BIGDATA52589.2021.9671576},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/MasumSHFVKRAC021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmsb/LuMLLGY21,
  author       = {Jizhao Lu and
                  Huiping Meng and
                  Wencui Li and
                  Yue Liu and
                  Yihao Guo and
                  Yang Yang},
  title        = {Network intrusion detection based on Contractive Sparse Stacked Denoising
                  Autoencoder},
  booktitle    = {{IEEE} International Symposium on Broadband Multimedia Systems and
                  Broadcasting, {BMSB} 2021, Chengdu, China, August 4-6, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BMSB53066.2021.9547087},
  doi          = {10.1109/BMSB53066.2021.9547087},
  timestamp    = {Tue, 05 Oct 2021 16:26:41 +0200},
  biburl       = {https://dblp.org/rec/conf/bmsb/LuMLLGY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/SasaSK21,
  author       = {Seiichi Sasa and
                  Hiroyuki Suzuki and
                  Akio Koyama},
  editor       = {Leonard Barolli},
  title        = {A Machine Learning Based Network Intrusion Detection System with Applying
                  Different Algorithm in Multiple Stages},
  booktitle    = {Advances on Broad-Band Wireless Computing, Communication and Applications
                  - Proceedings of the 16th International Conference on Broad-Band Wireless
                  Computing, Communication and Applications, {BWCCA} 2021, Fukuoka,
                  Japan, 28-30 October 2021},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {346},
  pages        = {100--110},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90072-4\_10},
  doi          = {10.1007/978-3-030-90072-4\_10},
  timestamp    = {Wed, 27 Oct 2021 09:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/SasaSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbd/ZhangW21,
  author       = {ZheYing Zhang and
                  Lijuan Wang},
  title        = {An Efficient Intrusion Detection Model Based on Convolutional Neural
                  Network and Transformer},
  booktitle    = {Ninth International Conference on Advanced Cloud and Big Data, {CBD}
                  2021, Xi'an, China, March 26-27, 2022},
  pages        = {248--254},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CBD54617.2021.00050},
  doi          = {10.1109/CBD54617.2021.00050},
  timestamp    = {Thu, 04 Aug 2022 11:52:19 +0200},
  biburl       = {https://dblp.org/rec/conf/cbd/ZhangW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccris/NiuHL21,
  author       = {Hongchao Niu and
                  Xiao{-}Bing Hu and
                  Hang Li},
  title        = {Improved YOLOv5 network-based object detection for anti-intrusion
                  of gantry crane},
  booktitle    = {{CCRIS} 2021: 2nd International Conference on Control, Robotics and
                  Intelligent System, Qingdao, China, August 20-22, 2021},
  pages        = {147--152},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3483845.3483871},
  doi          = {10.1145/3483845.3483871},
  timestamp    = {Thu, 11 Nov 2021 12:24:20 +0100},
  biburl       = {https://dblp.org/rec/conf/ccris/NiuHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0002ZMZHQKPL21,
  author       = {Zhongjie Wang and
                  Shitong Zhu and
                  Keyu Man and
                  Pengxiong Zhu and
                  Yu Hao and
                  Zhiyun Qian and
                  Srikanth V. Krishnamurthy and
                  Tom La Porta and
                  Michael J. De Lucia},
  editor       = {Trent Jaeger and
                  Zhiyun Qian},
  title        = {Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic
                  Model Comparison},
  booktitle    = {MTD@CCS 2021: Proceedings of the 8th {ACM} Workshop on Moving Target
                  Defense, Virtual Event, Republic of Korea, 15 November 2021},
  pages        = {31--32},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474370.3485669},
  doi          = {10.1145/3474370.3485669},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0002ZMZHQKPL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0002ZMZHQKPL21a,
  author       = {Zhongjie Wang and
                  Shitong Zhu and
                  Keyu Man and
                  Pengxiong Zhu and
                  Yu Hao and
                  Zhiyun Qian and
                  Srikanth V. Krishnamurthy and
                  Tom La Porta and
                  Michael J. De Lucia},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic
                  Model Comparison},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {3384--3399},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484762},
  doi          = {10.1145/3460120.3484762},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0002ZMZHQKPL21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comad/MishraDKH21,
  author       = {Sanket Mishra and
                  Rohit Dwivedula and
                  Varad Kshirsagar and
                  Chittaranjan Hota},
  editor       = {Jayant R. Haritsa and
                  Shourya Roy and
                  Manish Gupta and
                  Sharad Mehrotra and
                  Balaji Vasan Srinivasan and
                  Yogesh Simmhan},
  title        = {Robust Detection of Network Intrusion using Tree-based Convolutional
                  Neural Networks},
  booktitle    = {{CODS-COMAD} 2021: 8th {ACM} {IKDD} {CODS} and 26th COMAD, Virtual
                  Event, Bangalore, India, January 2-4, 2021},
  pages        = {233--237},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3430984.3431036},
  doi          = {10.1145/3430984.3431036},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/comad/MishraDKH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/ChenLLJY21,
  author       = {Shuyu Chen and
                  Wei Li and
                  Jun Liu and
                  Haoyu Jin and
                  Xuehui Yin},
  title        = {Network Intrusion Detection Based on Subspace Clustering and {BP}
                  Neural Network},
  booktitle    = {8th {IEEE} International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2021/7th {IEEE} International Conference on Edge Computing
                  and Scalable Cloud, EdgeCom 2021, Washington, DC, USA, June 26-28,
                  2021},
  pages        = {65--70},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSCloud-EdgeCom52276.2021.00022},
  doi          = {10.1109/CSCLOUD-EDGECOM52276.2021.00022},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscloud/ChenLLJY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csnet/Baldini21,
  author       = {Gianmarco Baldini},
  title        = {Intrusion detection systems in in-vehicle networks based on bag-of-words},
  booktitle    = {5th Cyber Security in Networking Conference, CSNet 2021, Abu Dhabi,
                  United Arab Emirates, October 12-14, 2021},
  pages        = {41--48},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSNet52717.2021.9614644},
  doi          = {10.1109/CSNET52717.2021.9614644},
  timestamp    = {Fri, 03 Dec 2021 17:36:15 +0100},
  biburl       = {https://dblp.org/rec/conf/csnet/Baldini21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/HannanGS21,
  author       = {Abdul Hannan and
                  Christian Gruhl and
                  Bernhard Sick},
  title        = {Anomaly based Resilient Network Intrusion Detection using Inferential
                  Autoencoders},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2021, Rhodes, Greece, July 26-28, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSR51186.2021.9527980},
  doi          = {10.1109/CSR51186.2021.9527980},
  timestamp    = {Thu, 23 Sep 2021 14:18:07 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/HannanGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/RehmanI21,
  author       = {Faqeer ur Rehman and
                  Clemente Izurieta},
  title        = {Statistical Metamorphic Testing of Neural Network Based Intrusion
                  Detection Systems},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2021, Rhodes, Greece, July 26-28, 2021},
  pages        = {20--26},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSR51186.2021.9527993},
  doi          = {10.1109/CSR51186.2021.9527993},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/RehmanI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcai/CarneiroOSMP21,
  author       = {Jos{\'{e}} Carneiro and
                  Nuno Oliveira and
                  Norberto Sousa and
                  Eva Maia and
                  Isabel Pra{\c{c}}a},
  editor       = {Kenji Matsui and
                  Sigeru Omatu and
                  Tan Yigitcanlar and
                  Sara Rodr{\'{\i}}guez{-}Gonz{\'{a}}lez},
  title        = {Machine Learning for Network-Based Intrusion Detection Systems: An
                  Analysis of the {CIDDS-001} Dataset},
  booktitle    = {Distributed Computing and Artificial Intelligence, Volume 1: 18th
                  International Conference, {DCAI} 2021, Salamanca, Spain, 6-8 October
                  2021},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {327},
  pages        = {148--158},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86261-9\_15},
  doi          = {10.1007/978-3-030-86261-9\_15},
  timestamp    = {Tue, 15 Nov 2022 15:22:37 +0100},
  biburl       = {https://dblp.org/rec/conf/dcai/CarneiroOSMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsit/SongYHH21,
  author       = {Zheng Song and
                  Jianguo Yu and
                  Yue He and
                  Jikai He},
  title        = {Leaky Training: {A} Robustness Improvement Scheme for Autoencoder
                  Based Network Intrusion Detection System under Online Learning},
  booktitle    = {{DSIT} 2021: 4th International Conference on Data Science and Information
                  Technology, Shanghai, China, July 23 - 25, 2021},
  pages        = {38--43},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3478905.3478913},
  doi          = {10.1145/3478905.3478913},
  timestamp    = {Wed, 29 Sep 2021 10:17:18 +0200},
  biburl       = {https://dblp.org/rec/conf/dsit/SongYHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsmlai/MeenaDMH21,
  author       = {Gaurav Meena and
                  Babita Dhanwal and
                  Mehul Mahrishi and
                  Kamal Kant Hiran},
  editor       = {Dharm Singh Jat and
                  Colin Stanley and
                  Jos{\'{e}} G. Quenum and
                  Nilanjan Dey and
                  Arpit Jain},
  title        = {Performance Comparison of Network Intrusion Detection System Based
                  on Different Pre-processing Methods and Deep Neural Network},
  booktitle    = {{DSMLAI} '21: International Conference on Data Science, Machine Learning
                  and Artificial Intelligence, Windhoek Namibia, August 9 - 12, 2021},
  pages        = {110--115},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3484824.3484878},
  doi          = {10.1145/3484824.3484878},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsmlai/MeenaDMH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ZhangNHZG21,
  author       = {Yong Zhang and
                  Jie Niu and
                  Guojian He and
                  Lin Zhu and
                  Da Guo},
  title        = {Network Intrusion Detection Based on Active Semi-supervised Learning},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks Workshops, {DSN} Workshops 2021, Taipei, Taiwan, June
                  21-24, 2021},
  pages        = {129--135},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN-W52860.2021.00031},
  doi          = {10.1109/DSN-W52860.2021.00031},
  timestamp    = {Sun, 05 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/ZhangNHZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/MuHLPL21,
  author       = {Jieru Mu and
                  Hua He and
                  Lin Li and
                  Shanchen Pang and
                  Cong Liu},
  editor       = {Chunjie Cao and
                  Yuqing Zhang and
                  Yuan Hong and
                  Ding Wang},
  title        = {A Hybrid Network Intrusion Detection Model Based on {CNN-LSTM} and
                  Attention Mechanism},
  booktitle    = {Frontiers in Cyber Security - 4th International Conference, {FCS}
                  2021, Haikou, China, December 17-19, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1558},
  pages        = {214--229},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-19-0523-0\_14},
  doi          = {10.1007/978-981-19-0523-0\_14},
  timestamp    = {Tue, 06 Dec 2022 11:39:09 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/MuHLPL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpsr/GrayDSH21,
  author       = {Nicholas Gray and
                  Katharina Dietz and
                  Michael Seufert and
                  Tobias Hossfeld},
  title        = {High Performance Network Metadata Extraction Using {P4} for ML-based
                  Intrusion Detection Systems},
  booktitle    = {22nd {IEEE} International Conference on High Performance Switching
                  and Routing, {HPSR} 2021, Paris, France, June 7-10, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/HPSR52026.2021.9481849},
  doi          = {10.1109/HPSR52026.2021.9481849},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpsr/GrayDSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icarti/ChindoveB21,
  author       = {Hatitye Chindove and
                  Dane Brown},
  title        = {Adaptive Machine Learning Based Network Intrusion Detection},
  booktitle    = {icARTi '21: International Conference on Artificial Intelligence and
                  its Applications, Virtual Event, Mauritius, December 9 - 10, 2021},
  pages        = {15:1--15:6},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3487923.3487938},
  doi          = {10.1145/3487923.3487938},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icarti/ChindoveB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/OuyangLKS021,
  author       = {Yuankai Ouyang and
                  Beibei Li and
                  Qinglei Kong and
                  Han Song and
                  Tao Li},
  title        = {{FS-IDS:} {A} Novel Few-Shot Learning Based Intrusion Detection System
                  for {SCADA} Networks},
  booktitle    = {{ICC} 2021 - {IEEE} International Conference on Communications, Montreal,
                  QC, Canada, June 14-23, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICC42927.2021.9500667},
  doi          = {10.1109/ICC42927.2021.9500667},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/OuyangLKS021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccai/PengYHL21,
  author       = {Kong De Peng and
                  Ye Du and
                  Li Mei Hong and
                  Li Gui Ling},
  title        = {Industrial Intrusion Detection Technology Based on One-dimensional
                  Multi-scale Residual Network},
  booktitle    = {{ICCAI} '21: 2021 7th International Conference on Computing and Artificial
                  Intelligence, Tianjin China, April 23 - 26, 2021},
  pages        = {339--347},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3467707.3467759},
  doi          = {10.1145/3467707.3467759},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccai/PengYHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/WangPAL21,
  author       = {Jianyu Wang and
                  Jianli Pan and
                  Ismail AlQerm and
                  Yuanni Liu},
  title        = {Def-IDS: An Ensemble Defense Mechanism Against Adversarial Attacks
                  for Deep Learning-based Network Intrusion Detection},
  booktitle    = {30th International Conference on Computer Communications and Networks,
                  {ICCCN} 2021, Athens, Greece, July 19-22, 2021},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCCN52240.2021.9522215},
  doi          = {10.1109/ICCCN52240.2021.9522215},
  timestamp    = {Wed, 22 Sep 2021 16:08:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/WangPAL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/RajuSGR21,
  author       = {Deepanshu Raju and
                  Sakshi Sawai and
                  Shashank Gavel and
                  Ajay Singh Raghuvanshi},
  title        = {Development of Anomaly-Based Intrusion Detection Scheme Using Deep
                  Learning in Data Network},
  booktitle    = {12th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2021, Kharagpur, India, July 6-8, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCCNT51525.2021.9579510},
  doi          = {10.1109/ICCCNT51525.2021.9579510},
  timestamp    = {Thu, 25 Nov 2021 09:08:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/RajuSGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccs/KasongoS21,
  author       = {Sydney Mambwe Kasongo and
                  Yanxia Sun},
  title        = {A Gated Recurrent Unit based Intrusion Detection for {SCADA} Networks},
  booktitle    = {6th International Conference on Computing, Communication and Security,
                  {ICCCS} 2021, Las Vegas, NV, USA, October 4-6, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCCS51487.2021.9776331},
  doi          = {10.1109/ICCCS51487.2021.9776331},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccs/KasongoS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycsee/CaiWZC21,
  author       = {Zengyu Cai and
                  Jingchao Wang and
                  Jianwei Zhang and
                  Xi Chen},
  editor       = {Jianchao Zeng and
                  Pinle Qin and
                  Weipeng Jing and
                  Xianhua Song and
                  Zeguang Lu},
  title        = {Design and Implementation of Intrusion Detection System Based on Neural
                  Network},
  booktitle    = {Data Science - 7th International Conference of Pioneering Computer
                  Scientists, Engineers and Educators, {ICPCSEE} 2021, Taiyuan, China,
                  September 17-20, 2021, Proceedings, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {1452},
  pages        = {179--189},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-5943-0\_15},
  doi          = {10.1007/978-981-16-5943-0\_15},
  timestamp    = {Thu, 15 Feb 2024 16:58:31 +0100},
  biburl       = {https://dblp.org/rec/conf/icycsee/CaiWZC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/MauroGL21,
  author       = {Mario Di Mauro and
                  Giovanni Galatro and
                  Antonio Liotta},
  editor       = {David Camacho and
                  Domenico Rosaci and
                  Giuseppe M. L. Sarn{\'{e}} and
                  Mario Versaci},
  title        = {A WNN-Based Approach for Network Intrusion Detection},
  booktitle    = {Intelligent Distributed Computing XIV, 14th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2021, Virtual Event, 16-18
                  September 2021},
  series       = {Studies in Computational Intelligence},
  volume       = {1026},
  pages        = {79--88},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-96627-0\_8},
  doi          = {10.1007/978-3-030-96627-0\_8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idc/MauroGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/AhmedLS21a,
  author       = {Usman Ahmed and
                  Jerry Chun{-}Wei Lin and
                  Gautam Srivastava},
  title        = {Network-Aware {SDN} Load Balancer with Deep Active Learning based
                  Intrusion Detection Model},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen,
                  China, July 18-22, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IJCNN52387.2021.9534424},
  doi          = {10.1109/IJCNN52387.2021.9534424},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcnn/AhmedLS21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiuKLJ21,
  author       = {Yang Liu and
                  Jian Kang and
                  Yiran Li and
                  Bin Ji},
  title        = {A Network Intrusion Detection Method Based on {CNN} and {CBAM}},
  booktitle    = {2021 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484553},
  doi          = {10.1109/INFOCOMWKSHPS51825.2021.9484553},
  timestamp    = {Fri, 23 Jul 2021 09:24:13 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiuKLJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ShiGLYL21,
  author       = {Jibo Shi and
                  Bin Ge and
                  Yang Liu and
                  Yu Yan and
                  Shuang Li},
  title        = {Data Privacy Security Guaranteed Network Intrusion Detection System
                  Based on Federated Learning},
  booktitle    = {2021 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484545},
  doi          = {10.1109/INFOCOMWKSHPS51825.2021.9484545},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ShiGLYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/JinCX21,
  author       = {Shiyi Jin and
                  Jin{-}Gyun Chung and
                  Yinan Xu},
  title        = {Signature-Based Intrusion Detection System {(IDS)} for In-Vehicle
                  {CAN} Bus Network},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2021,
                  Daegu, South Korea, May 22-28, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCAS51556.2021.9401087},
  doi          = {10.1109/ISCAS51556.2021.9401087},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscas/JinCX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/ZhongGLQYWYYS021,
  author       = {Ying Zhong and
                  Ziqi Gao and
                  Rui Li and
                  Citong Que and
                  Xinjie Yang and
                  Zhiliang Wang and
                  Jiahai Yang and
                  Xia Yin and
                  Xingang Shi and
                  Keqin Li},
  title        = {{STRAD:} Network Intrusion Detection Algorithm Based on Zero-Positive
                  Learning in Real Complex Network Environment},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2021, Athens,
                  Greece, September 5-8, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCC53001.2021.9631496},
  doi          = {10.1109/ISCC53001.2021.9631496},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/ZhongGLQYWYYS021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/Dong0LQF21,
  author       = {Tian Dong and
                  Han Qiu and
                  Jialiang Lu and
                  Meikang Qiu and
                  Chun Fan},
  title        = {Towards Fast Network Intrusion Detection based on Efficiency-preserving
                  Federated Learning},
  booktitle    = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing
                  with Applications, Big Data {\&} Cloud Computing, Sustainable
                  Computing {\&} Communications, Social Computing {\&} Networking
                  (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September
                  30 - Oct. 3, 2021},
  pages        = {468--475},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00071},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00071},
  timestamp    = {Thu, 06 Jan 2022 09:48:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/Dong0LQF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isr2/LiuYLL21,
  author       = {Jingyu Liu and
                  Dongsheng Yang and
                  Mengjia Lian and
                  Mingshi Li},
  title        = {Research on Classification of Intrusion Detection in Internet of Things
                  Network Layer Based on Machine Learning},
  booktitle    = {{IEEE} International Conference on Intelligence and Safety for Robotics,
                  {ISR} 2021, Tokoname, Japan, March 4-6, 2021},
  pages        = {106--110},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISR50024.2021.9419529},
  doi          = {10.1109/ISR50024.2021.9419529},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isr2/LiuYLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivic/QassimJM21,
  author       = {Qais Saif Qassim and
                  Norziana Jamil and
                  Mohammed Najah Mahdi},
  editor       = {Halimah Badioze Zaman and
                  Alan F. Smeaton and
                  Timothy K. Shih and
                  Sergio A. Velastin and
                  Tada Terutoshi and
                  Bo N{\o}rregaard J{\o}rgensen and
                  Hazleen Aris and
                  Nazrita Ibrahim},
  title        = {Symptoms-Based Network Intrusion Detection System},
  booktitle    = {Advances in Visual Informatics - 7th International Visual Informatics
                  Conference, {IVIC} 2021, Kajang, Malaysia, November 23-25, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13051},
  pages        = {482--494},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90235-3\_42},
  doi          = {10.1007/978-3-030-90235-3\_42},
  timestamp    = {Wed, 22 Mar 2023 16:53:34 +0100},
  biburl       = {https://dblp.org/rec/conf/ivic/QassimJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/CaoZFMLD21,
  author       = {Ke Cao and
                  Jinqi Zhu and
                  Weiiia Feng and
                  Chunmei Ma and
                  Ming Liu and
                  Tian Du},
  title        = {Network Intrusion Detection based on Dense Dilated Convolutions and
                  Attention Mechanism},
  booktitle    = {17th International Wireless Communications and Mobile Computing, {IWCMC}
                  2021, Harbin City, China, June 28 - July 2, 2021},
  pages        = {463--468},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IWCMC51323.2021.9498652},
  doi          = {10.1109/IWCMC51323.2021.9498652},
  timestamp    = {Fri, 13 Aug 2021 16:13:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/CaoZFMLD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/DingWK21,
  author       = {Shanshuo Ding and
                  Yingxin Wang and
                  Liang Kou},
  title        = {Network intrusion detection based on BiSRU and {CNN}},
  booktitle    = {{IEEE} 18th International Conference on Mobile Ad Hoc and Smart Systems,
                  {MASS} 2021, Denver, CO, USA, October 4-7, 2021},
  pages        = {145--147},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/MASS52906.2021.00026},
  doi          = {10.1109/MASS52906.2021.00026},
  timestamp    = {Mon, 20 Dec 2021 09:12:57 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/DingWK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medes/ZhuHY21,
  author       = {Yujie Zhu and
                  Dezhi Han and
                  Xinming Yin},
  editor       = {Richard Chbeir and
                  Yannis Manolopoulos and
                  Ladjel Bellatreche and
                  Djamal Benslimane and
                  Mirjana Ivanovic and
                  Zakaria Maamar},
  title        = {A hierarchical network intrusion detection model based on unsupervised
                  clustering},
  booktitle    = {{MEDES} '21: Proceedings of the 13th International Conference on Management
                  of Digital EcoSystems, Virtual Event, Tunisia, November 1 - 3, 2021},
  pages        = {22--29},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3444757.3485098},
  doi          = {10.1145/3444757.3485098},
  timestamp    = {Thu, 11 Nov 2021 08:15:12 +0100},
  biburl       = {https://dblp.org/rec/conf/medes/ZhuHY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nana/Lin21,
  author       = {Zhang Lin},
  title        = {Network Intrusion Detection based of Semi-Supervised Ensemble Learning
                  Algorithm for Imbalanced Data},
  booktitle    = {2021 International Conference on Networking and Network Applications,
                  NaNA 2021, Lijiang City, China, October 29 - Nov. 1, 2021},
  pages        = {338--344},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/NaNA53684.2021.00065},
  doi          = {10.1109/NANA53684.2021.00065},
  timestamp    = {Thu, 06 Jan 2022 10:47:03 +0100},
  biburl       = {https://dblp.org/rec/conf/nana/Lin21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/niss/DadiA21,
  author       = {Sihem Dadi and
                  Mohamed Abid},
  editor       = {Mohamed Ben Ahmed and
                  Horia{-}Nicolai L. Teodorescu and
                  Tomader Mazri and
                  Parthasarathy Subashini and
                  Anouar Abdelhakim Boudhir},
  title        = {Enhanced Intrusion Detection System Based on AutoEncoder Network and
                  Support Vector Machine},
  booktitle    = {Networking, Intelligent Systems and Security - Proceedings of {NISS}
                  2021, Kenitra, Morocco, April 1-2, 2021},
  series       = {Smart Innovation, Systems and Technologies},
  volume       = {237},
  pages        = {327--341},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-3637-0\_23},
  doi          = {10.1007/978-981-16-3637-0\_23},
  timestamp    = {Wed, 01 Dec 2021 16:42:24 +0100},
  biburl       = {https://dblp.org/rec/conf/niss/DadiA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/niss/KamelELT21,
  author       = {Nadiya El Kamel and
                  Mohamed Eddabbah and
                  Youssef Lmoumen and
                  Raja Touahni},
  editor       = {Mohamed Ben Ahmed and
                  Horia{-}Nicolai L. Teodorescu and
                  Tomader Mazri and
                  Parthasarathy Subashini and
                  Anouar Abdelhakim Boudhir},
  title        = {A Real-Time Smart Agent for Network Traffic Profiling and Intrusion
                  Detection Based on Combined Machine Learning Algorithms},
  booktitle    = {Networking, Intelligent Systems and Security - Proceedings of {NISS}
                  2021, Kenitra, Morocco, April 1-2, 2021},
  series       = {Smart Innovation, Systems and Technologies},
  volume       = {237},
  pages        = {301--309},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-3637-0\_21},
  doi          = {10.1007/978-981-16-3637-0\_21},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/niss/KamelELT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/VyQDP21,
  author       = {Nguyen Chi Vy and
                  Nguyen Huu Quyen and
                  Phan The Duy and
                  Van{-}Hau Pham},
  editor       = {Min Yang and
                  Chao Chen and
                  Yang Liu},
  title        = {Federated Learning-Based Intrusion Detection in the Context of IIoT
                  Networks: Poisoning Attack and Defense},
  booktitle    = {Network and System Security - 15th International Conference, {NSS}
                  2021, Tianjin, China, October 23, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13041},
  pages        = {131--147},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92708-0\_8},
  doi          = {10.1007/978-3-030-92708-0\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/VyQDP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/ChenYCZYZ21,
  author       = {Jinfu Chen and
                  Shang Yin and
                  Saihua Cai and
                  Chi Zhang and
                  Yemin Yin and
                  Ling Zhou},
  title        = {An Efficient Network Intrusion Detection Model Based on Temporal Convolutional
                  Networks},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021, Hainan, China, December 6-10, 2021},
  pages        = {768--775},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS54544.2021.00086},
  doi          = {10.1109/QRS54544.2021.00086},
  timestamp    = {Wed, 16 Mar 2022 22:32:21 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/ChenYCZYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/AydinB21,
  author       = {Erim Aydin and
                  Serif Bahtiyar},
  editor       = {Naghmeh Moradpoor and
                  Atilla El{\c{c}}i and
                  Andrei Petrovski},
  title        = {{OCIDS:} An Online CNN-Based Network Intrusion Detection System for
                  DDoS Attacks with IoT Botnets},
  booktitle    = {14th International Conference on Security of Information and Networks,
                  {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SIN54109.2021.9699288},
  doi          = {10.1109/SIN54109.2021.9699288},
  timestamp    = {Wed, 23 Feb 2022 18:55:51 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/AydinB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartnets/RehmanI21,
  author       = {Faqeer ur Rehman and
                  Clemente Izurieta},
  title        = {A Hybridized Approach for Testing Neural Network Based Intrusion Detection
                  Systems},
  booktitle    = {International Conference on Smart Applications, Communications and
                  Networking, SmartNets 2021, Glasgow, United Kingdom, September 22-24,
                  2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SmartNets50376.2021.9555416},
  doi          = {10.1109/SMARTNETS50376.2021.9555416},
  timestamp    = {Thu, 14 Oct 2021 16:38:35 +0200},
  biburl       = {https://dblp.org/rec/conf/smartnets/RehmanI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/YahyaouiLAA21,
  author       = {Aymen Yahyaoui and
                  Haithem Lakhdhar and
                  Takoua Abdellatif and
                  Rabah Attia},
  title        = {Machine learning based network intrusion detection for data streaming
                  IoT applications},
  booktitle    = {21st {ACIS} International Winter Conference on Software Engineering,
                  Artificial Intelligence, Networking and Parallel/Distributed Computing,
                  {SNPD} Winter 2021, Ho Chi Minh City, Vietnam, January 28-30, 2021},
  pages        = {51--56},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SNPDWinter52325.2021.00019},
  doi          = {10.1109/SNPDWINTER52325.2021.00019},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/snpd/YahyaouiLAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/DuyKHTHHP21,
  author       = {Phan The Duy and
                  Nghi Hoang Khoa and
                  Hoang Hiep and
                  Nguyen Ba Tuan and
                  Hien Do Hoang and
                  Do Thi Thu Hien and
                  Van{-}Hau Pham},
  editor       = {Hamido Fujita and
                  H{\'{e}}ctor P{\'{e}}rez{-}Meana},
  title        = {A Deep Transfer Learning Approach for Flow-Based Intrusion Detection
                  in SDN-Enabled Network},
  booktitle    = {New Trends in Intelligent Software Methodologies, Tools and Techniques
                  - Proceedings of the 20th International Conference on New Trends in
                  Intelligent Software Methodologies, Tools and Techniques, SoMeT 202,
                  Cancun, Mexico, 21-23 September, 2021},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {337},
  pages        = {327--339},
  publisher    = {{IOS} Press},
  year         = {2021},
  url          = {https://doi.org/10.3233/FAIA210031},
  doi          = {10.3233/FAIA210031},
  timestamp    = {Fri, 24 Sep 2021 11:30:21 +0200},
  biburl       = {https://dblp.org/rec/conf/somet/DuyKHTHHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/IannucciAAACB21,
  author       = {Stefano Iannucci and
                  Jesse Ables and
                  William Anderson and
                  Bhuvanesh Abburi and
                  Valeria Cardellini and
                  Ioana Banicescu},
  title        = {A Performance-Oriented Comparison of Neural Network Approaches for
                  Anomaly-based Intrusion Detection},
  booktitle    = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2021,
                  Orlando, FL, USA, December 5-7, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SSCI50451.2021.9660100},
  doi          = {10.1109/SSCI50451.2021.9660100},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssci/IannucciAAACB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/taai/HsiehS21,
  author       = {Chia{-}Fen Hsieh and
                  Che{-}Min Su},
  title        = {{MLNN:} {A} Novel Network Intrusion Detection Based on Multilayer
                  Neural Network},
  booktitle    = {2021 International Conference on Technologies and Applications of
                  Artificial Intelligence, {TAAI} 2021, Taichung, Taiwan, November 18-20,
                  2021},
  pages        = {43--48},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TAAI54685.2021.00017},
  doi          = {10.1109/TAAI54685.2021.00017},
  timestamp    = {Wed, 08 Jun 2022 16:30:07 +0200},
  biburl       = {https://dblp.org/rec/conf/taai/HsiehS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiWWS21,
  author       = {Zeyi Li and
                  Yun Wang and
                  Pan Wang and
                  Haorui Su},
  title        = {{PGAN:} {A} Generative Adversarial Network based Anomaly Detection
                  Method for Network Intrusion Detection System},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {734--741},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00107},
  doi          = {10.1109/TRUSTCOM53373.2021.00107},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiWWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ubisec/LinWLL21,
  author       = {Jiaying Lin and
                  Yehua Wei and
                  Wenjia Li and
                  Jing Long},
  editor       = {Guojun Wang and
                  Kim{-}Kwang Raymond Choo and
                  Ryan K. L. Ko and
                  Yang Xu and
                  Bruno Crispo},
  title        = {Intrusion Detection System Based on Deep Neural Network and Incremental
                  Learning for In-Vehicle {CAN} Networks},
  booktitle    = {Ubiquitous Security - First International Conference, UbiSec 2021,
                  Guangzhou, China, December 28-31, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1557},
  pages        = {255--267},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-19-0468-4\_19},
  doi          = {10.1007/978-981-19-0468-4\_19},
  timestamp    = {Wed, 25 May 2022 10:56:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ubisec/LinWLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uemcom/AlfardusR21,
  author       = {Asma Alfardus and
                  Danda B. Rawat},
  title        = {Intrusion Detection System for {CAN} Bus In-Vehicle Network based
                  on Machine Learning Algorithms},
  booktitle    = {12th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile
                  Communication Conference, {UEMCON} 2021, New York, NY, USA, December
                  1-4, 2021},
  pages        = {944--949},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/UEMCON53757.2021.9666745},
  doi          = {10.1109/UEMCON53757.2021.9666745},
  timestamp    = {Tue, 18 Jan 2022 17:38:45 +0100},
  biburl       = {https://dblp.org/rec/conf/uemcom/AlfardusR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ZhaoLXOG21,
  author       = {Ruijie Zhao and
                  Zhaojie Li and
                  Zhi Xue and
                  Tomoaki Ohtsuki and
                  Guan Gui},
  title        = {A Novel Approach based on Lightweight Deep Neural Network for Network
                  Intrusion Detection},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2021,
                  Nanjing, China, March 29 - April 1, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WCNC49053.2021.9417568},
  doi          = {10.1109/WCNC49053.2021.9417568},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/ZhaoLXOG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wf-iot/AzumahEAZL21,
  author       = {Sylvia Worlali Azumah and
                  Nelly Elsayed and
                  Victor Adewopo and
                  Zaghloul Saad Zaghloul and
                  Chengcheng Li},
  title        = {A Deep {LSTM} based Approach for Intrusion Detection IoT Devices Network
                  in Smart Home},
  booktitle    = {7th {IEEE} World Forum on Internet of Things, WF-IoT 2021, New Orleans,
                  LA, USA, June 14 - July 31, 2021},
  pages        = {836--841},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WF-IoT51360.2021.9596033},
  doi          = {10.1109/WF-IOT51360.2021.9596033},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wf-iot/AzumahEAZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MoggEK21,
  author       = {Raymond Mogg and
                  Simon Yusuf Enoch and
                  Dong Seong Kim},
  editor       = {Hyoungshick Kim},
  title        = {A Framework for Generating Evasion Attacks for Machine Learning Based
                  Network Intrusion Detection Systems},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {51--63},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_5},
  doi          = {10.1007/978-3-030-89432-0\_5},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/MoggEK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-03546,
  author       = {Seonghoon Jeong and
                  Boosun Jeon and
                  Boheung Chung and
                  Huy Kang Kim},
  title        = {Convolutional Neural Network-based Intrusion Detection System for
                  {AVTP} Streams in Automotive Ethernet-based Networks},
  journal      = {CoRR},
  volume       = {abs/2102.03546},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.03546},
  eprinttype    = {arXiv},
  eprint       = {2102.03546},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-03546.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-16329,
  author       = {Wai Weng Lo and
                  Siamak Layeghy and
                  Mohanad Sarhan and
                  Marcus Gallagher and
                  Marius Portmann},
  title        = {E-GraphSAGE: {A} Graph Neural Network based Intrusion Detection System},
  journal      = {CoRR},
  volume       = {abs/2103.16329},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.16329},
  eprinttype    = {arXiv},
  eprint       = {2103.16329},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-16329.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-16930,
  author       = {Emrah Tufan and
                  Cihangir Tezcan and
                  Cengiz Acart{\"{u}}rk},
  title        = {Anomaly-Based Intrusion Detection by Machine Learning: {A} Case Study
                  on Probing Attacks to an Institutional Network},
  journal      = {CoRR},
  volume       = {abs/2103.16930},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.16930},
  eprinttype    = {arXiv},
  eprint       = {2103.16930},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-16930.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-07183,
  author       = {Mohanad Sarhan and
                  Siamak Layeghy and
                  Marius Portmann},
  title        = {An Explainable Machine Learning-based Network Intrusion Detection
                  System for Enabling Generalisability in Securing IoT Networks},
  journal      = {CoRR},
  volume       = {abs/2104.07183},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.07183},
  eprinttype    = {arXiv},
  eprint       = {2104.07183},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-07183.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-10015,
  author       = {Muhammad Almas Khan and
                  Muazzam Ali Khan and
                  Shahid Latif and
                  Awais Aziz Shah and
                  Mujeeb Ur Rehman and
                  Wadii Boulila and
                  Maha Driss and
                  Jawad Ahmad},
  title        = {Voting Classifier-based Intrusion Detection for IoT Networks},
  journal      = {CoRR},
  volume       = {abs/2104.10015},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.10015},
  eprinttype    = {arXiv},
  eprint       = {2104.10015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-10015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-06765,
  author       = {Stanislav Abaimov},
  title        = {Towards a Privacy-preserving Deep Learning-based Network Intrusion
                  Detection in Data Distribution Services},
  journal      = {CoRR},
  volume       = {abs/2106.06765},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.06765},
  eprinttype    = {arXiv},
  eprint       = {2106.06765},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-06765.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-02362,
  author       = {Jyoti Fakirah and
                  Lauhim Mahfuz Zishan and
                  Roshni Mooruth and
                  Michael N. Johnstone and
                  Wencheng Yang},
  title        = {A Low-Cost Machine Learning Based Network Intrusion Detection System
                  with Data Privacy Preservation},
  journal      = {CoRR},
  volume       = {abs/2107.02362},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.02362},
  eprinttype    = {arXiv},
  eprint       = {2107.02362},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-02362.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-02753,
  author       = {Jos{\'{e}} Carneiro and
                  Nuno Oliveira and
                  Norberto Sousa and
                  Eva Maia and
                  Isabel Pra{\c{c}}a},
  title        = {Machine Learning for Network-based Intrusion Detection Systems: an
                  Analysis of the {CIDDS-001} Dataset},
  journal      = {CoRR},
  volume       = {abs/2107.02753},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.02753},
  eprinttype    = {arXiv},
  eprint       = {2107.02753},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-02753.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-02992,
  author       = {Dai Li and
                  Kaiyuan Yang},
  title        = {A Dual-Port 8-T CAM-Based Network Intrusion Detection Engine for IoT},
  journal      = {CoRR},
  volume       = {abs/2107.02992},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.02992},
  eprinttype    = {arXiv},
  eprint       = {2107.02992},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-02992.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-05172,
  author       = {Sk. Tanzir Mehedi and
                  Adnan Anwar and
                  Ziaur Rahman and
                  Kawsar Ahmed},
  title        = {Deep Transfer Learning Based Intrusion Detection System for Electric
                  Vehicular Networks},
  journal      = {CoRR},
  volume       = {abs/2107.05172},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.05172},
  eprinttype    = {arXiv},
  eprint       = {2107.05172},
  timestamp    = {Fri, 06 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-05172.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-08262,
  author       = {Natasha Alkhatib and
                  Hadi Ghauch and
                  Jean{-}Luc Danger},
  title        = {{SOME/IP} Intrusion Detection using Deep Learning-based Sequential
                  Models in Automotive Ethernet Networks},
  journal      = {CoRR},
  volume       = {abs/2108.08262},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.08262},
  eprinttype    = {arXiv},
  eprint       = {2108.08262},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-08262.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-12722,
  author       = {Mohanad Sarhan and
                  Siamak Layeghy and
                  Nour Moustafa and
                  Marcus Gallagher and
                  Marius Portmann},
  title        = {Feature Extraction for Machine Learning-based Intrusion Detection
                  in IoT Networks},
  journal      = {CoRR},
  volume       = {abs/2108.12722},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.12722},
  eprinttype    = {arXiv},
  eprint       = {2108.12722},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-12722.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-11224,
  author       = {Manuela M. C. de Souza and
                  Camila F. T. Pontes and
                  Jo{\~{a}}o J. C. Gondim and
                  Lu{\'{\i}}s Paulo F. Garcia and
                  Luiz A. DaSilva and
                  Marcelo Antonio Marotta},
  title        = {An Anomaly-based Multi-class Classifier for Network Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/2109.11224},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.11224},
  eprinttype    = {arXiv},
  eprint       = {2109.11224},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-11224.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-02791,
  author       = {Mohanad Sarhan and
                  Siamak Layeghy and
                  Nour Moustafa and
                  Marius Portmann},
  title        = {A Cyber Threat Intelligence Sharing Scheme based on Federated Learning
                  for Network Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/2111.02791},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.02791},
  eprinttype    = {arXiv},
  eprint       = {2111.02791},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-02791.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-13978,
  author       = {Hooman Alavizadeh and
                  Julian Jang{-}Jaccard and
                  Hootan Alavizadeh},
  title        = {Deep Q-Learning based Reinforcement Learning Approach for Network
                  Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/2111.13978},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.13978},
  eprinttype    = {arXiv},
  eprint       = {2111.13978},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-13978.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuLZL21,
  title        = {Intrusion Detection Method Based on Adaptive Clonal Genetic Algorithm
                  and Backpropagation Neural Network},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {9938586:1--9938586:12},
  year         = {2021},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1155/2021/9938586},
  doi          = {10.1155/2021/9938586},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LuLZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangWSWWZL21,
  title        = {Intrusion Detection for Industrial Control Systems Based on Open Set
                  Artificial Neural Network},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {4027900:1--4027900:14},
  year         = {2021},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1155/2021/4027900},
  doi          = {10.1155/2021/4027900},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/WangWSWWZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YueWWDY21,
  title        = {Detecting Temporal Attacks: An Intrusion Detection System for Train
                  Communication Ethernet Based on Dynamic Temporal Convolutional Network},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {3913515:1--3913515:21},
  year         = {2021},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1155/2021/3913515},
  doi          = {10.1155/2021/3913515},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/YueWWDY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Labonne20,
  author       = {Maxime Labonne},
  title        = {Anomaly-based network intrusion detection using machine learning.
                  (D{\'{e}}tection d'intrusion r{\'{e}}seau par anomalies
                  avec apprentissage automatique)},
  school       = {Polytechnic Institute of Paris, France},
  year         = {2020},
  url          = {https://tel.archives-ouvertes.fr/tel-02988296},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Labonne20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChenLLFCP20,
  author       = {Zhuo Chen and
                  Na Lv and
                  Pengfei Liu and
                  Yu Fang and
                  Kun Chen and
                  Wu Pan},
  title        = {Intrusion Detection for Wireless Edge Networks Based on Federated
                  Learning},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {217463--217472},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3041793},
  doi          = {10.1109/ACCESS.2020.3041793},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ChenLLFCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuWQLY20,
  author       = {Zhiquan Hu and
                  Liejun Wang and
                  Lei Qi and
                  Yongming Li and
                  Wenzhong Yang},
  title        = {A Novel Wireless Network Intrusion Detection Method Based on Adaptive
                  Synthetic Sampling and an Improved Convolutional Neural Network},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {195741--195751},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3034015},
  doi          = {10.1109/ACCESS.2020.3034015},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HuWQLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JiangHYZ20,
  author       = {Hui Jiang and
                  Zheng He and
                  Gang Ye and
                  Huyin Zhang},
  title        = {Network Intrusion Detection Based on PSO-Xgboost Model},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {58392--58401},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2982418},
  doi          = {10.1109/ACCESS.2020.2982418},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JiangHYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MurvayG20,
  author       = {Pal{-}Stefan Murvay and
                  Bogdan Groza},
  title        = {{TIDAL-CAN:} Differential Timing Based Intrusion Detection and Localization
                  for Controller Area Network},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {68895--68912},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2985326},
  doi          = {10.1109/ACCESS.2020.2985326},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MurvayG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PachecoBFS20,
  author       = {Jesus Pacheco and
                  Victor H. Benitez and
                  Luis Carlos F{\'{e}}lix{-}Herr{\'{a}}n and
                  Pratik Satam},
  title        = {Artificial Neural Networks-Based Intrusion Detection System for Internet
                  of Things Fog Nodes},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {73907--73918},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2988055},
  doi          = {10.1109/ACCESS.2020.2988055},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/PachecoBFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/QuYGSMFRLM20,
  author       = {Xiaofei Qu and
                  Lin Yang and
                  Kai Guo and
                  Meng Sun and
                  Linru Ma and
                  Tao Feng and
                  Shuangyin Ren and
                  Kechao Li and
                  Xin Ma},
  title        = {Direct Batch Growth Hierarchical Self-Organizing Mapping Based on
                  Statistics for Efficient Network Intrusion Detection},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {42251--42260},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2976810},
  doi          = {10.1109/ACCESS.2020.2976810},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/QuYGSMFRLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RakasSM20,
  author       = {Slavica V. Bostjancic Rakas and
                  Mirjana D. Stojanovic and
                  Jasna D. Markovic{-}Petrovic},
  title        = {A Review of Research Work on Network-Based {SCADA} Intrusion Detection
                  Systems},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {93083--93108},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2994961},
  doi          = {10.1109/ACCESS.2020.2994961},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RakasSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangLYSZL20,
  author       = {Liqun Yang and
                  Jianqiang Li and
                  Liang Yin and
                  Zhonghao Sun and
                  Yufei Zhao and
                  Zhoujun Li},
  title        = {Real-Time Intrusion Detection in Wireless Network: {A} Deep Learning-Based
                  Intelligent Mechanism},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {170128--170139},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3019973},
  doi          = {10.1109/ACCESS.2020.3019973},
  timestamp    = {Thu, 05 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YangLYSZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangZWYW20,
  author       = {Yanqing Yang and
                  Kangfeng Zheng and
                  Bin Wu and
                  Yixian Yang and
                  Xiujuan Wang},
  title        = {Network Intrusion Detection Based on Supervised Adversarial Variational
                  Auto-Encoder With Regularization},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {42169--42184},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2977007},
  doi          = {10.1109/ACCESS.2020.2977007},
  timestamp    = {Thu, 27 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YangZWYW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZavrakI20,
  author       = {Sultan Zavrak and
                  Murat Iskefiyeli},
  title        = {Anomaly-Based Intrusion Detection From Network Flow Features Using
                  Variational Autoencoder},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {108346--108358},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3001350},
  doi          = {10.1109/ACCESS.2020.3001350},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZavrakI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangWLSHL20,
  author       = {Guoling Zhang and
                  Xiaodan Wang and
                  Rui Li and
                  Yafei Song and
                  Jiaxing He and
                  Jie Lai},
  title        = {Network Intrusion Detection Based on Conditional Wasserstein Generative
                  Adversarial Network and Cost-Sensitive Stacked Autoencoder},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {190431--190447},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3031892},
  doi          = {10.1109/ACCESS.2020.3031892},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangWLSHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/accs/GandhimathiM20,
  author       = {L. Gandhimathi and
                  G. Murugaboopathi},
  title        = {A Novel Hybrid Intrusion Detection Using Flow-Based Anomaly Detection
                  and Cross-Layer Features in Wireless Sensor Network},
  journal      = {Autom. Control. Comput. Sci.},
  volume       = {54},
  number       = {1},
  pages        = {62--69},
  year         = {2020},
  url          = {https://doi.org/10.3103/S0146411620010046},
  doi          = {10.3103/S0146411620010046},
  timestamp    = {Fri, 25 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/accs/GandhimathiM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/TianHLLDC20,
  author       = {Qiuting Tian and
                  Dezhi Han and
                  Kuan{-}Ching Li and
                  XingAo Liu and
                  Letian Duan and
                  Arcangelo Castiglione},
  title        = {An intrusion detection approach based on improved deep belief network},
  journal      = {Appl. Intell.},
  volume       = {50},
  number       = {10},
  pages        = {3162--3178},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10489-020-01694-4},
  doi          = {10.1007/S10489-020-01694-4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/TianHLLDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccfton/LatahT20,
  author       = {Majd Latah and
                  Levent Toker},
  title        = {An efficient flow-based multi-level hybrid intrusion detection system
                  for software-defined networks},
  journal      = {{CCF} Trans. Netw.},
  volume       = {3},
  number       = {3-4},
  pages        = {261--271},
  year         = {2020},
  url          = {https://doi.org/10.1007/s42045-020-00040-z},
  doi          = {10.1007/S42045-020-00040-Z},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccfton/LatahT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AbdulqadderZZAA20,
  author       = {Ihsan H. Abdulqadder and
                  Shijie Zhou and
                  Deqing Zou and
                  Israa T. Aziz and
                  Syed Muhammad Abrar Akber},
  title        = {Multi-layered intrusion detection and prevention in the {SDN/NFV}
                  enabled cloud of 5G networks using AI-based defense mechanisms},
  journal      = {Comput. Networks},
  volume       = {179},
  pages        = {107364},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comnet.2020.107364},
  doi          = {10.1016/J.COMNET.2020.107364},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/AbdulqadderZZAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SouzaWMSV20,
  author       = {Cristiano Antonio de Souza and
                  Carlos Becker Westphall and
                  Renato B. Machado and
                  Jo{\~{a}}o Bosco Mangueira Sobral and
                  Gustavo dos Santos Vieira},
  title        = {Hybrid approach to intrusion detection in fog-based IoT environments},
  journal      = {Comput. Networks},
  volume       = {180},
  pages        = {107417},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comnet.2020.107417},
  doi          = {10.1016/J.COMNET.2020.107417},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/SouzaWMSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhangHWL20,
  author       = {Hongpo Zhang and
                  Lulu Huang and
                  Chase Q. Wu and
                  Zhanbo Li},
  title        = {An effective convolutional neural network based on {SMOTE} and Gaussian
                  mixture model for intrusion detection in imbalanced dataset},
  journal      = {Comput. Networks},
  volume       = {177},
  pages        = {107315},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comnet.2020.107315},
  doi          = {10.1016/J.COMNET.2020.107315},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ZhangHWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhouCJD20,
  author       = {Yuyang Zhou and
                  Guang Cheng and
                  Shanqing Jiang and
                  Mian Dai},
  title        = {Building an efficient intrusion detection system based on feature
                  selection and ensemble classifier},
  journal      = {Comput. Networks},
  volume       = {174},
  pages        = {107247},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comnet.2020.107247},
  doi          = {10.1016/J.COMNET.2020.107247},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ZhouCJD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhouHLF20,
  author       = {Man Zhou and
                  Lansheng Han and
                  Hongwei Lu and
                  Cai Fu},
  title        = {Distributed collaborative intrusion detection system for vehicular
                  Ad Hoc networks based on invariant},
  journal      = {Comput. Networks},
  volume       = {172},
  pages        = {107174},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comnet.2020.107174},
  doi          = {10.1016/J.COMNET.2020.107174},
  timestamp    = {Tue, 28 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ZhouHLF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/XuHLJ20,
  author       = {Jing Xu and
                  Dezhi Han and
                  Kuan{-}Ching Li and
                  Hai Jiang},
  title        = {A K-means algorithm based on characteristics of density applied to
                  network intrusion detection},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {665--687},
  year         = {2020},
  url          = {https://doi.org/10.2298/CSIS200406014X},
  doi          = {10.2298/CSIS200406014X},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsis/XuHLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/AlmianiGAR20,
  author       = {Muder Almiani and
                  Alia Abu Ghazleh and
                  Amer Al{-}Rahayfeh and
                  Abdul Razaque},
  title        = {Cascaded hybrid intrusion detection model based on {SOM} and {RBF}
                  neural networks},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {21},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5233},
  doi          = {10.1002/CPE.5233},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/AlmianiGAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/SwamiDR20,
  author       = {Rochak Swami and
                  Mayank Dave and
                  Virender Ranga},
  title        = {Voting-based intrusion detection framework for securing software-defined
                  networks},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {24},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5927},
  doi          = {10.1002/CPE.5927},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/SwamiDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/LiuHX20,
  author       = {Hui Liu and
                  Gang Hao and
                  Bin Xing},
  title        = {Entropy clustering-based granular classifiers for network intrusion
                  detection},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2020},
  number       = {1},
  pages        = {4},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13638-019-1567-1},
  doi          = {10.1186/S13638-019-1567-1},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/LiuHX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ZhouMS20,
  author       = {Ying Zhou and
                  Thomas A. Mazzuchi and
                  Shahram Sarkani},
  title        = {M-AdaBoost-A based ensemble system for network intrusion detection},
  journal      = {Expert Syst. Appl.},
  volume       = {162},
  pages        = {113864},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.eswa.2020.113864},
  doi          = {10.1016/J.ESWA.2020.113864},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/ZhouMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/FerragMADJ20,
  author       = {Mohamed Amine Ferrag and
                  Leandros A. Maglaras and
                  Ahmed Ahmim and
                  Makhlouf Derdour and
                  Helge Janicke},
  title        = {{RDTIDS:} Rules and Decision Tree-Based Intrusion Detection System
                  for Internet-of-Things Networks},
  journal      = {Future Internet},
  volume       = {12},
  number       = {3},
  pages        = {44},
  year         = {2020},
  url          = {https://doi.org/10.3390/fi12030044},
  doi          = {10.3390/FI12030044},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/FerragMADJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DongLZY20,
  author       = {Rui{-}Hong Dong and
                  Xue{-}Yong Li and
                  Qiu{-}Yu Zhang and
                  Hui Yuan},
  title        = {Network intrusion detection model based on multivariate correlation
                  analysis - long short-time memory network},
  journal      = {{IET} Inf. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {166--174},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-ifs.2019.0294},
  doi          = {10.1049/IET-IFS.2019.0294},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DongLZY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SelvarajanSAK20,
  author       = {Shitharth Selvarajan and
                  Masood Shaik and
                  Sirajudeen Ameerjohn and
                  Sangeetha Kannan},
  title        = {Mining of intrusion attack in {SCADA} network using clustering and
                  genetically seeded flora-based optimal classification algorithm},
  journal      = {{IET} Inf. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {1--11},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-ifs.2019.0011},
  doi          = {10.1049/IET-IFS.2019.0011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SelvarajanSAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbm/Dai20,
  author       = {Zhenjun Dai},
  title        = {Research on network intrusion detection security based on improved
                  extreme learning algorithms and neural network algorithms},
  journal      = {Int. J. Biom.},
  volume       = {12},
  number       = {1},
  pages        = {56--66},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJBM.2020.105623},
  doi          = {10.1504/IJBM.2020.105623},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbm/Dai20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcia/SinghVG20,
  author       = {Neha Singh and
                  Deepali Virmani and
                  Xiao{-}Zhi Gao},
  title        = {A Fuzzy Logic-Based Method to Avert Intrusions in Wireless Sensor
                  Networks Using {WSN-DS} Dataset},
  journal      = {Int. J. Comput. Intell. Appl.},
  volume       = {19},
  number       = {3},
  pages        = {2050018:1--2050018:18},
  year         = {2020},
  url          = {https://doi.org/10.1142/S1469026820500182},
  doi          = {10.1142/S1469026820500182},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcia/SinghVG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/LuHDT20,
  author       = {Xue Lu and
                  Dezhi Han and
                  Letian Duan and
                  Qiuting Tian},
  title        = {Intrusion detection of wireless sensor networks based on {IPSO} algorithm
                  and {BP} neural network},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {22},
  number       = {2/3},
  pages        = {221--232},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJCSE.2020.107344},
  doi          = {10.1504/IJCSE.2020.107344},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcse/LuHDT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/WangH20,
  author       = {Jing Wang and
                  Dezhi Han},
  title        = {Design of network intrusion detection system based on parallel {DPC}
                  clustering algorithm},
  journal      = {Int. J. Embed. Syst.},
  volume       = {13},
  number       = {3},
  pages        = {318--327},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJES.2020.109969},
  doi          = {10.1504/IJES.2020.109969},
  timestamp    = {Thu, 22 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/WangH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MengLYL20,
  author       = {Weizhi Meng and
                  Wenjuan Li and
                  Laurence T. Yang and
                  Peng Li},
  title        = {Enhancing challenge-based collaborative intrusion detection networks
                  against insider attacks using blockchain},
  journal      = {Int. J. Inf. Sec.},
  volume       = {19},
  number       = {3},
  pages        = {279--290},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10207-019-00462-x},
  doi          = {10.1007/S10207-019-00462-X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MengLYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnc/HaoFKS20,
  author       = {Zhao Hao and
                  Yaokai Feng and
                  Hiroshi Koide and
                  Kouichi Sakurai},
  title        = {A Sequential Detection Method for Intrusion Detection System Based
                  on Artificial Neural Networks},
  journal      = {Int. J. Netw. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {213--226},
  year         = {2020},
  url          = {http://www.ijnc.org/index.php/ijnc/article/view/231},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnc/HaoFKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DongYZ20,
  author       = {Rui{-}Hong Dong and
                  Hou{-}Hua Yan and
                  Qiu{-}Yu Zhang},
  title        = {An Intrusion Detection Model for Wireless Sensor Network Based on
                  Information Gain Ratio and Bagging Algorithm},
  journal      = {Int. J. Netw. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {218--230},
  year         = {2020},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n2/ijns-2020-v22-n2-p218-230.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DongYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnvo/EzhilarasiK20,
  author       = {M. Ezhilarasi and
                  V. Krishnaveni},
  title        = {Robust intrusion detection system based on fuzzy {C} means clustering
                  scheme implemented in IoT-based wireless sensor networks},
  journal      = {Int. J. Netw. Virtual Organisations},
  volume       = {23},
  number       = {4},
  pages        = {312--326},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJNVO.2020.110502},
  doi          = {10.1504/IJNVO.2020.110502},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnvo/EzhilarasiK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SanoussiOH20,
  author       = {Nouhad Sanoussi and
                  Ghizlane Orhanou and
                  Said El Hajji},
  title        = {A game theoretic approach based on intrusion tolerant systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {3},
  pages        = {175--181},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.109698},
  doi          = {10.1504/IJSN.2020.109698},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SanoussiOH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SinghKS20,
  author       = {Rohit Singh and
                  Mala Kalra and
                  Shano Solanki},
  title        = {A hybrid approach for intrusion detection based on machine learning},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {4},
  pages        = {233--242},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.111128},
  doi          = {10.1504/IJSN.2020.111128},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SinghKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwin/WangYLWT20,
  author       = {Xiaowei Wang and
                  Shoulin Yin and
                  Hang Li and
                  Jiachi Wang and
                  Lin Teng},
  title        = {A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional
                  Neural Network},
  journal      = {Int. J. Wirel. Inf. Networks},
  volume       = {27},
  number       = {4},
  pages        = {503--517},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10776-020-00495-3},
  doi          = {10.1007/S10776-020-00495-3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijwin/WangYLWT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/WangX20,
  author       = {Debing Wang and
                  Guangyu Xu},
  title        = {Research on the Detection of Network Intrusion Prevention With Svm
                  Based Optimization Algorithm},
  journal      = {Informatica (Slovenia)},
  volume       = {44},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.31449/inf.v44i2.3195},
  doi          = {10.31449/INF.V44I2.3195},
  timestamp    = {Fri, 07 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/WangX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/Martindale0T20,
  author       = {Nathan Martindale and
                  Muhammad Ismail and
                  Douglas A. Talbert},
  title        = {Ensemble-Based Online Machine Learning Algorithms for Network Intrusion
                  Detection Systems Using Streaming Data},
  journal      = {Inf.},
  volume       = {11},
  number       = {6},
  pages        = {315},
  year         = {2020},
  url          = {https://doi.org/10.3390/info11060315},
  doi          = {10.3390/INFO11060315},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/Martindale0T20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RaviS20a,
  author       = {Nagarathna Ravi and
                  S. Mercy Shalinie},
  title        = {Semisupervised-Learning-Based Security to Detect and Mitigate Intrusions
                  in IoT Network},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {11},
  pages        = {11041--11052},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2993410},
  doi          = {10.1109/JIOT.2020.2993410},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/RaviS20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Al-TuraikiAAAAA20,
  author       = {Isra Al{-}Turaiki and
                  Najwa Altwaijry and
                  Abeer Agil and
                  Haya Aljodhi and
                  Sara Alharbi and
                  Lina Alqassem},
  title        = {Anomaly-Based Network Intrusion Detection Using Bidirectional Long
                  Short Term Memory and Convolutional Neural Network},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {37--44},
  year         = {2020},
  url          = {https://doi.org/10.22042/isecure.2021.271076.624},
  doi          = {10.22042/ISECURE.2021.271076.624},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Al-TuraikiAAAAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isi/ChenCZMZ20,
  author       = {Fei Chen and
                  Rui Cheng and
                  Yayun Zhu and
                  Siwei Miao and
                  Liang Zhou},
  title        = {An Intrusion Detection Method for Enterprise Network Based on Backpropagation
                  Neural Network},
  journal      = {Ing{\'{e}}nierie des Syst{\`{e}}mes d Inf.},
  volume       = {25},
  number       = {3},
  pages        = {377--382},
  year         = {2020},
  url          = {https://doi.org/10.18280/isi.250313},
  doi          = {10.18280/ISI.250313},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isi/ChenCZMZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/AyoFAAA20,
  author       = {Femi Emmanuel Ayo and
                  Sakinat Oluwabukonla Folorunso and
                  Adebayo Abayomi{-}Alli and
                  Adebola Olayinka Adekunle and
                  Joseph Bamidele Awotunde},
  title        = {Network intrusion detection based on deep learning model optimized
                  with rule-based hybrid feature selection},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {29},
  number       = {6},
  pages        = {267--283},
  year         = {2020},
  url          = {https://doi.org/10.1080/19393555.2020.1767240},
  doi          = {10.1080/19393555.2020.1767240},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/AyoFAAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/PhamSC20,
  author       = {Vinh Pham and
                  Eunil Seo and
                  Tai{-}Myoung Chung},
  title        = {Lightweight Convolutional Neural Network Based Intrusion Detection
                  System},
  journal      = {J. Commun.},
  volume       = {15},
  number       = {11},
  pages        = {808--817},
  year         = {2020},
  url          = {https://doi.org/10.12720/jcm.15.11.808-817},
  doi          = {10.12720/JCM.15.11.808-817},
  timestamp    = {Tue, 03 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcm/PhamSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcnc/ThangP20,
  author       = {Vu Viet Thang and
                  Fedor F. Pashchenko},
  title        = {Corrigendum to "Multistage System-Based Machine Learning Techniques
                  for Intrusion Detection in WiFi Network"},
  journal      = {J. Comput. Networks Commun.},
  volume       = {2020},
  pages        = {6576725:1--6576725:1},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/6576725},
  doi          = {10.1155/2020/6576725},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcnc/ThangP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/KejiaPQTP20,
  author       = {Shen Kejia and
                  Hamid Parvin and
                  Sultan Noman Qasem and
                  Bui Anh Tuan and
                  Kim{-}Hung Pho},
  title        = {A classification model based on svm and fuzzy rough set for network
                  intrusion detection},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {39},
  number       = {5},
  pages        = {6801--6817},
  year         = {2020},
  url          = {https://doi.org/10.3233/JIFS-191621},
  doi          = {10.3233/JIFS-191621},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/KejiaPQTP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/WangCH20,
  author       = {Hui Wang and
                  Zijian Cao and
                  Bo Hong},
  title        = {A network intrusion detection system based on convolutional neural
                  network},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {38},
  number       = {6},
  pages        = {7623--7637},
  year         = {2020},
  url          = {https://doi.org/10.3233/JIFS-179833},
  doi          = {10.3233/JIFS-179833},
  timestamp    = {Sun, 17 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/WangCH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WuWHZW20,
  author       = {Zhendong Wu and
                  Jingjing Wang and
                  Liqin Hu and
                  Zhang Zhang and
                  Han Wu},
  title        = {A network intrusion detection method based on semantic Re-encoding
                  and deep learning},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {164},
  pages        = {102688},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jnca.2020.102688},
  doi          = {10.1016/J.JNCA.2020.102688},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WuWHZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/Ramadan20,
  author       = {Rabie A. Ramadan},
  title        = {Efficient Intrusion Detection Algorithms for Smart Cities-Based Wireless
                  Sensing Technologies},
  journal      = {J. Sens. Actuator Networks},
  volume       = {9},
  number       = {3},
  pages        = {39},
  year         = {2020},
  url          = {https://doi.org/10.3390/jsan9030039},
  doi          = {10.3390/JSAN9030039},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsan/Ramadan20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/SatheeshRRSDDVS20,
  author       = {N. Satheesh and
                  Rathnamma V. Mydukuri and
                  G. Rajeshkumar and
                  P. Vidya Sagar and
                  Pankaj Dadheech and
                  Sanwta Ram Dogiwal and
                  Priya Velayutham and
                  Sudhakar Sengan},
  title        = {Flow-based anomaly intrusion detection using machine learning model
                  with software defined networking for OpenFlow network},
  journal      = {Microprocess. Microsystems},
  volume       = {79},
  pages        = {103285},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.micpro.2020.103285},
  doi          = {10.1016/J.MICPRO.2020.103285},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/SatheeshRRSDDVS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/NgoPT20,
  author       = {Duc{-}Minh Ngo and
                  Cuong Pham{-}Quoc and
                  Tran Ngoc Thinh},
  title        = {Heterogeneous Hardware-based Network Intrusion Detection System with
                  Multiple Approaches for {SDN}},
  journal      = {Mob. Networks Appl.},
  volume       = {25},
  number       = {3},
  pages        = {1178--1192},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11036-019-01437-x},
  doi          = {10.1007/S11036-019-01437-X},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/NgoPT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/RibeiroSMRSA20,
  author       = {Jos{\'{e}} Carlos Ribeiro and
                  Firooz B. Saghezchi and
                  Georgios Mantas and
                  Jonathan Rodriguez and
                  Simon J. Shepherd and
                  Raed A. Abd{-}Alhameed},
  title        = {An Autonomous Host-Based Intrusion Detection System for Android Mobile
                  Devices},
  journal      = {Mob. Networks Appl.},
  volume       = {25},
  number       = {1},
  pages        = {164--172},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11036-019-01220-y},
  doi          = {10.1007/S11036-019-01220-Y},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/RibeiroSMRSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mva/VillamizarMCO20,
  author       = {Michael Villamizar and
                  {\'{A}}ngel Mart{\'{\i}}nez{-}Gonz{\'{a}}lez and
                  Olivier Can{\'{e}}vet and
                  Jean{-}Marc Odobez},
  title        = {WatchNet++: efficient and accurate depth-based network for detecting
                  people attacks and intrusion},
  journal      = {Mach. Vis. Appl.},
  volume       = {31},
  number       = {6},
  pages        = {41},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00138-020-01089-y},
  doi          = {10.1007/S00138-020-01089-Y},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mva/VillamizarMCO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/DevanK20,
  author       = {Preethi Devan and
                  Neelu Khare},
  title        = {An efficient XGBoost-DNN-based classification model for network intrusion
                  detection system},
  journal      = {Neural Comput. Appl.},
  volume       = {32},
  number       = {16},
  pages        = {12499--12514},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00521-020-04708-x},
  doi          = {10.1007/S00521-020-04708-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/DevanK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ShawlyKEG20,
  author       = {Tawfeeq A. Shawly and
                  Mosab Khayat and
                  Ali A. Elghariani and
                  Arif Ghafoor},
  title        = {Evaluation of HMM-Based Network Intrusion Detection System for Multiple
                  Multi-Stage Attacks},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {3},
  pages        = {240--248},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.001.1900426},
  doi          = {10.1109/MNET.001.1900426},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/ShawlyKEG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/AbdelhaqAAAATST20,
  author       = {Maha S. Abdelhaq and
                  Raed A. Alsaqour and
                  Abeer Algarni and
                  Maali Alabdulhafith and
                  Mahmoud A. Alawi and
                  Aqeel Taha and
                  Baraa T. Sharef and
                  Mustafa Tariq},
  title        = {Human immune-based model for intrusion detection in mobile ad hoc
                  networks},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {13},
  number       = {3},
  pages        = {1046--1068},
  year         = {2020},
  url          = {https://doi.org/10.1007/s12083-019-00862-9},
  doi          = {10.1007/S12083-019-00862-9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppna/AbdelhaqAAAATST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CaoFC20,
  author       = {Xuefei Cao and
                  Yulong Fu and
                  Bo Chen},
  title        = {Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile
                  Edge Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {8860418:1--8860418:12},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8860418},
  doi          = {10.1155/2020/8860418},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/CaoFC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Farahani20,
  author       = {Gholamreza Farahani},
  title        = {Feature Selection Based on Cross-Correlation for the Intrusion Detection
                  System},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {8875404:1--8875404:17},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8875404},
  doi          = {10.1155/2020/8875404},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/Farahani20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GuNHK20,
  author       = {Zhiwei Gu and
                  Shah Nazir and
                  Cheng Hong and
                  Sulaiman Khan},
  title        = {Convolution Neural Network-Based Higher Accurate Intrusion Identification
                  System for the Network Security and Communication},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {8830903:1--8830903:10},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8830903},
  doi          = {10.1155/2020/8830903},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/GuNHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MoukafihOE20,
  author       = {Nabil Moukafih and
                  Ghizlane Orhanou and
                  Said Elhajji},
  title        = {Neural Network-Based Voting System with High Capacity and Low Computation
                  for Intrusion Detection in {SIEM/IDS} Systems},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {3512737:1--3512737:15},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/3512737},
  doi          = {10.1155/2020/3512737},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MoukafihOE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangXXYZS20,
  author       = {Zhiyong Wang and
                  Shengwei Xu and
                  Guoai Xu and
                  Yongfeng Yin and
                  Miao Zhang and
                  Dawei Sun},
  title        = {Game Theoretical Method for Anomaly-Based Intrusion Detection},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {8824163:1--8824163:10},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8824163},
  doi          = {10.1155/2020/8824163},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/WangXXYZS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/BoniXCB20,
  author       = {Kenneth Rodolphe Chabi Boni and
                  Lizhong Xu and
                  Zhe Chen and
                  Thelma Dede Baddoo},
  title        = {A Security Concept Based on Scaler Distribution of a Novel Intrusion
                  Detection Device for Wireless Sensor Networks in a Smart Environment},
  journal      = {Sensors},
  volume       = {20},
  number       = {17},
  pages        = {4717},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20174717},
  doi          = {10.3390/S20174717},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/BoniXCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WangLLL20,
  author       = {Zhidong Wang and
                  Yingxu Lai and
                  Zenghui Liu and
                  Jing Liu},
  title        = {Explaining the Attributes of a Deep Learning Based Intrusion Detection
                  System for Industrial Control Networks},
  journal      = {Sensors},
  volume       = {20},
  number       = {14},
  pages        = {3817},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20143817},
  doi          = {10.3390/S20143817},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/WangLLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ZhangHLM20,
  author       = {Wenjie Zhang and
                  Dezhi Han and
                  Kuan{-}Ching Li and
                  Francisco Isidro Massetto},
  title        = {Wireless sensor network intrusion detection system based on {MK-ELM}},
  journal      = {Soft Comput.},
  volume       = {24},
  number       = {16},
  pages        = {12361--12374},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00500-020-04678-1},
  doi          = {10.1007/S00500-020-04678-1},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/ZhangHLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/Almomani20,
  author       = {Omar Almomani},
  title        = {A Feature Selection Model for Network Intrusion Detection System Based
                  on PSO, GWO, {FFA} and {GA} Algorithms},
  journal      = {Symmetry},
  volume       = {12},
  number       = {6},
  pages        = {1046},
  year         = {2020},
  url          = {https://doi.org/10.3390/sym12061046},
  doi          = {10.3390/SYM12061046},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/Almomani20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/MacielSF20,
  author       = {Lucas Andrade Maciel and
                  Matheus Alc{\^{a}}ntara Souza and
                  Henrique Cota de Freitas},
  title        = {Reconfigurable FPGA-Based K-Means/K-Modes Architecture for Network
                  Intrusion Detection},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {67-II},
  number       = {8},
  pages        = {1459--1463},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSII.2019.2939826},
  doi          = {10.1109/TCSII.2019.2939826},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcas/MacielSF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/ZhouJZL20,
  author       = {Jia Zhou and
                  Prachi Joshi and
                  Haibo Zeng and
                  Renfa Li},
  title        = {BTMonitor: Bit-time-based Intrusion Detection and Attacker Identification
                  in Controller Area Network},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {18},
  number       = {6},
  pages        = {117:1--117:23},
  year         = {2020},
  url          = {https://doi.org/10.1145/3362034},
  doi          = {10.1145/3362034},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/ZhouJZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuSD20,
  author       = {Congyuan Xu and
                  Jizhong Shen and
                  Xin Du},
  title        = {A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning
                  Framework},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3540--3552},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2991876},
  doi          = {10.1109/TIFS.2020.2991876},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LiangLLKZ20,
  author       = {Wei Liang and
                  Kuan{-}Ching Li and
                  Jing Long and
                  Xiaoyan Kui and
                  Albert Y. Zomaya},
  title        = {An Industrial Network Intrusion Detection Algorithm Based on Multifeature
                  Data Clustering Optimization Model},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {3},
  pages        = {2063--2071},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2946791},
  doi          = {10.1109/TII.2019.2946791},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/LiangLLKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/LiangLCZ20,
  author       = {Junwei Liang and
                  Qiuzhen Lin and
                  Jianyong Chen and
                  Yingying Zhu},
  title        = {A Filter Model Based on Hidden Generalized Mixture Transition Distribution
                  Model for Intrusion Detection System in Vehicle Ad Hoc Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {21},
  number       = {7},
  pages        = {2707--2722},
  year         = {2020},
  url          = {https://doi.org/10.1109/TITS.2019.2905415},
  doi          = {10.1109/TITS.2019.2905415},
  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/LiangLCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ZuoCDCH20,
  author       = {Xiaojun Zuo and
                  Ze Chen and
                  Limian Dong and
                  Jie Chang and
                  Botao Hou},
  title        = {Power information network intrusion detection based on data mining
                  algorithm},
  journal      = {J. Supercomput.},
  volume       = {76},
  number       = {7},
  pages        = {5521--5539},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11227-019-02899-2},
  doi          = {10.1007/S11227-019-02899-2},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/ZuoCDCH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/NieNWHCL20,
  author       = {Laisen Nie and
                  Zhaolong Ning and
                  Xiaojie Wang and
                  Xiping Hu and
                  Jun Cheng and
                  Yongkang Li},
  title        = {Data-Driven Intrusion Detection for Intelligent Internet of Vehicles:
                  {A} Deep Convolutional Neural Network-Based Method},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {2219--2230},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNSE.2020.2990984},
  doi          = {10.1109/TNSE.2020.2990984},
  timestamp    = {Tue, 04 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/NieNWHCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/MauroGL20,
  author       = {Mario Di Mauro and
                  Giovanni Galatro and
                  Antonio Liotta},
  title        = {Experimental Review of Neural-Based Approaches for Network Intrusion
                  Management},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {17},
  number       = {4},
  pages        = {2480--2495},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNSM.2020.3024225},
  doi          = {10.1109/TNSM.2020.3024225},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/MauroGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/OlufowobiYZB20,
  author       = {Habeeb Olufowobi and
                  Clinton Young and
                  Joseph Zambreno and
                  Gedare Bloom},
  title        = {SAIDuCANT: Specification-Based Automotive Intrusion Detection Using
                  Controller Area Network {(CAN)} Timing},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {2},
  pages        = {1484--1494},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2019.2961344},
  doi          = {10.1109/TVT.2019.2961344},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/OlufowobiYZB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/DerhabAEK20,
  author       = {Abdelouahid Derhab and
                  Arwa Aldweesh and
                  Ahmed Z. Emam and
                  Farrukh Aslam Khan},
  title        = {Intrusion Detection System for Internet of Things Based on Temporal
                  Convolution Neural Network and Efficient Feature Engineering},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2020},
  pages        = {6689134:1--6689134:16},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/6689134},
  doi          = {10.1155/2020/6689134},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/DerhabAEK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/PirozmandGSR20,
  author       = {Poria Pirozmand and
                  Mohsen Angoraj Ghafary and
                  Safieh Siadat and
                  Jiankang Ren},
  title        = {Intrusion Detection into Cloud-Fog-Based IoT Networks Using Game Theory},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2020},
  pages        = {8819545:1--8819545:9},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8819545},
  doi          = {10.1155/2020/8819545},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/PirozmandGSR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/KrishnanJRKSTL20,
  author       = {R. Santhana Krishnan and
                  Eanoch Golden Julie and
                  Yesudhas Harold Robinson and
                  Raghvendra Kumar and
                  Le Hoang Son and
                  Tong Anh Tuan and
                  Hoang Viet Long},
  title        = {Modified zone based intrusion detection system for security enhancement
                  in mobile ad hoc networks},
  journal      = {Wirel. Networks},
  volume       = {26},
  number       = {2},
  pages        = {1275--1289},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11276-019-02151-y},
  doi          = {10.1007/S11276-019-02151-Y},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/winet/KrishnanJRKSTL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/BabuR20,
  author       = {M. Jagadeesh Babu and
                  A. Raji Reddy},
  title        = {{SH-IDS:} Specification Heuristics Based Intrusion Detection System
                  for IoT Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {112},
  number       = {3},
  pages        = {2023--2045},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11277-020-07137-0},
  doi          = {10.1007/S11277-020-07137-0},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/BabuR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/SinhaP20,
  author       = {Somnath Sinha and
                  Aditi Paul},
  title        = {Neuro-Fuzzy Based Intrusion Detection System for Wireless Sensor Network},
  journal      = {Wirel. Pers. Commun.},
  volume       = {114},
  number       = {1},
  pages        = {835--851},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11277-020-07395-y},
  doi          = {10.1007/S11277-020-07395-Y},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/SinhaP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acit3/ProticS20,
  author       = {Danijela Protic and
                  Miomir Stankovic},
  title        = {A Hybrid Model for Anomaly-Based Intrusion Detection in Complex Computer
                  Networks},
  booktitle    = {21st International Arab Conference on Information Technology, {ACIT}
                  2020, Giza, Egypt, November 28-30, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACIT50332.2020.9299965},
  doi          = {10.1109/ACIT50332.2020.9299965},
  timestamp    = {Tue, 26 Oct 2021 12:13:28 +0200},
  biburl       = {https://dblp.org/rec/conf/acit3/ProticS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atci/FengZ20,
  author       = {Li Feng and
                  Kejie Zhao},
  editor       = {Jemal H. Abawajy and
                  Kim{-}Kwang Raymond Choo and
                  Zheng Xu and
                  Mohammed Atiquzzaman},
  title        = {Network Intrusion Path of Power Monitoring System Based on Simulation
                  System},
  booktitle    = {2020 International Conference on Applications and Techniques in Cyber
                  Intelligence - Applications and Techniques in Cyber Intelligence {(ATCI}
                  2020), Fuyang, China, 20-22 June, 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1244},
  pages        = {244--249},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-53980-1\_37},
  doi          = {10.1007/978-3-030-53980-1\_37},
  timestamp    = {Tue, 05 Apr 2022 12:05:39 +0200},
  biburl       = {https://dblp.org/rec/conf/atci/FengZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/PiplaiCJ20,
  author       = {Aritran Piplai and
                  Sai Sree Laya Chukkapalli and
                  Anupam Joshi},
  title        = {NAttack! Adversarial Attacks to bypass a {GAN} based classifier trained
                  to detect Network intrusion},
  booktitle    = {6th {IEEE} International Conference on Big Data Security on Cloud,
                  {IEEE} International Conference on High Performance and Smart Computing,
                  and {IEEE} International Conference on Intelligent Data and Security,
                  BigDataSecurity/HPSC/IDS 2020, Baltimore, MD, USA, May 25-27, 2020},
  pages        = {49--54},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00020},
  doi          = {10.1109/BIGDATASECURITY-HPSC-IDS49724.2020.00020},
  timestamp    = {Wed, 14 Jul 2021 09:36:30 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/PiplaiCJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbd/ChenKXSY20,
  author       = {Lin Chen and
                  Xiaoyun Kuang and
                  Aidong Xu and
                  Siliang Suo and
                  Yiwei Yang},
  title        = {A Novel Network Intrusion Detection System Based on {CNN}},
  booktitle    = {Eighth International Conference on Advanced Cloud and Big Data, {CBD}
                  2020, Taiyuan, China, December 5-6, 2020},
  pages        = {243--247},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CBD51900.2020.00051},
  doi          = {10.1109/CBD51900.2020.00051},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cbd/ChenKXSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciat/XuY20,
  author       = {Xiandong Xu and
                  Xiang Yu},
  editor       = {Zhihong Tian and
                  Lihua Yin and
                  Zhaoquan Gu},
  title        = {A network digital works protection method based on digital watermarking
                  and intrusion detection},
  booktitle    = {{CIAT} 2020: International Conference on Cyberspace Innovation of
                  Advanced Technologies, Virtual Event / Guangzhou, China, December
                  5, 2020},
  pages        = {582--586},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3444370.3444631},
  doi          = {10.1145/3444370.3444631},
  timestamp    = {Thu, 21 Jan 2021 16:32:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ciat/XuY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloud2/JiYX20,
  author       = {Shujian Ji and
                  Kejiang Ye and
                  Cheng{-}Zhong Xu},
  editor       = {Qi Zhang and
                  Yingwei Wang and
                  Liang{-}Jie Zhang},
  title        = {A Network Intrusion Detection Approach Based on Asymmetric Convolutional
                  Autoencoder},
  booktitle    = {Cloud Computing - {CLOUD} 2020 - 13th International Conference, Held
                  as Part of the Services Conference Federation, {SCF} 2020, Honolulu,
                  HI, USA, September 18-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12403},
  pages        = {126--140},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59635-4\_9},
  doi          = {10.1007/978-3-030-59635-4\_9},
  timestamp    = {Tue, 22 Sep 2020 17:23:44 +0200},
  biburl       = {https://dblp.org/rec/conf/cloud2/JiYX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/HossainIOFK20,
  author       = {Md Delwar Hossain and
                  Hiroyuki Inoue and
                  Hideya Ochiai and
                  Doudou Fall and
                  Youki Kadobayashi},
  title        = {Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle
                  Controller Area Network Bus},
  booktitle    = {44th {IEEE} Annual Computers, Software, and Applications Conference,
                  {COMPSAC} 2020, Madrid, Spain, July 13-17, 2020},
  pages        = {10--17},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMPSAC48688.2020.00011},
  doi          = {10.1109/COMPSAC48688.2020.00011},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/HossainIOFK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csia/Li20h,
  author       = {Sile Li},
  editor       = {Zheng Xu and
                  Reza M. Parizi and
                  Mohammad Hammoudeh and
                  Octavio Loyola{-}Gonz{\'{a}}lez},
  title        = {Network Intrusion Detection Model Based on Improved Convolutional
                  Neural Network},
  booktitle    = {Cyber Security Intelligence and Analytics - Proceedings of the 2020
                  International Conference on Cyber Security Intelligence and Analytics,
                  {CSIA} 2020, Haikou, China, 28-29 February 2020, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1146},
  pages        = {18--24},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-43306-2\_3},
  doi          = {10.1007/978-3-030-43306-2\_3},
  timestamp    = {Mon, 11 Jan 2021 10:06:59 +0100},
  biburl       = {https://dblp.org/rec/conf/csia/Li20h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csoc/Thanh20,
  author       = {Cao Tien Thanh},
  editor       = {Radek Silhavy},
  title        = {A Novel Approach for Intrusion Detection Based on Deep Belief Network},
  booktitle    = {Artificial Intelligence and Bioinspired Computational Methods - Proceedings
                  of the 9th Computer Science On-line Conference 2020, Vol. 2},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1225},
  pages        = {297--311},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51971-1\_24},
  doi          = {10.1007/978-3-030-51971-1\_24},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csoc/Thanh20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/ZhangD20,
  author       = {Siyuan Zhang and
                  Chaoming Du},
  title        = {Semi-Supervised Deep Learning based Network Intrusion Detection},
  booktitle    = {International Conference on Cyber-Enabled Distributed Computing and
                  Knowledge Discovery, CyberC 2020, Chongqing, China, October 29-30,
                  2020},
  pages        = {35--40},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberC49757.2020.00016},
  doi          = {10.1109/CYBERC49757.2020.00016},
  timestamp    = {Tue, 02 Feb 2021 11:46:01 +0100},
  biburl       = {https://dblp.org/rec/conf/cyberc/ZhangD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/AhnYLHKP20,
  author       = {Sunwoo Ahn and
                  Hayoon Yi and
                  Younghan Lee and
                  Whoi Ree Ha and
                  Giyeol Kim and
                  Yunheung Paek},
  title        = {Hawkware: Network Intrusion Detection based on Behavior Analysis with
                  ANNs on an IoT Device},
  booktitle    = {57th {ACM/IEEE} Design Automation Conference, {DAC} 2020, San Francisco,
                  CA, USA, July 20-24, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DAC18072.2020.9218559},
  doi          = {10.1109/DAC18072.2020.9218559},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/AhnYLHKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/Melaragno20,
  author       = {Anthony Melaragno},
  title        = {Would an Object Representation Invariant Provide Sufficient State
                  Based Knowledge to Adapt Network Intrusion Detection System Rules
                  With Minimal Impact to System Resources?},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22,
                  2020},
  pages        = {556--561},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00099},
  doi          = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH49142.2020.00099},
  timestamp    = {Fri, 20 Nov 2020 11:30:51 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/Melaragno20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsaa/ShahCMC20,
  author       = {Ajay Shah and
                  Sophine Clachar and
                  Manfred Minimair and
                  Davis Cook},
  editor       = {Geoffrey I. Webb and
                  Zhongfei Zhang and
                  Vincent S. Tseng and
                  Graham Williams and
                  Michalis Vlachos and
                  Longbing Cao},
  title        = {Building Multiclass Classification Baselines for Anomaly-based Network
                  Intrusion Detection Systems},
  booktitle    = {7th {IEEE} International Conference on Data Science and Advanced Analytics,
                  {DSAA} 2020, Sydney, Australia, October 6-9, 2020},
  pages        = {759--760},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DSAA49011.2020.00102},
  doi          = {10.1109/DSAA49011.2020.00102},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsaa/ShahCMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ebimcs/PanX20,
  author       = {Leilei Pan and
                  Xiaolan Xie},
  title        = {Network Intrusion Detection Model Based on {PCA} + {ADASYN} and XGBoost},
  booktitle    = {{EBIMCS} 2020: 3rd International Conference on E-Business, Information
                  Management and Computer Science, Wuhan, China, December, 2020},
  pages        = {44--48},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3453187.3453311},
  doi          = {10.1145/3453187.3453311},
  timestamp    = {Thu, 15 Feb 2024 13:36:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ebimcs/PanX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/DuLZ20,
  author       = {Xiangtong Du and
                  Yongzhong Li and
                  Shipeng Zhang},
  title        = {Research on Intrusion Detection Algorithm Based on Deep Belief Networks
                  and Three-way Decisions},
  booktitle    = {{EITCE} 2020: 4th International Conference on Electronic Information
                  Technology and Computer Engineering, Xiamen, China, 6 November, 2020
                  - 8 November, 2020},
  pages        = {50--56},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3443467.3443728},
  doi          = {10.1145/3443467.3443728},
  timestamp    = {Fri, 04 Aug 2023 10:04:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/DuLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fnc/SerinelliCN20,
  author       = {Benedetto Marco Serinelli and
                  Anastasija Collen and
                  Niels Alexander Nijdam},
  editor       = {Elhadi M. Shakshuki and
                  Ansar{-}Ul{-}Haque Yasar},
  title        = {Training Guidance with {KDD} Cup 1999 and {NSL-KDD} Data Sets of {ANIDINR:}
                  Anomaly-Based Network Intrusion Detection System},
  booktitle    = {The 17th International Conference on Mobile Systems and Pervasive
                  Computing (MobiSPC 2020) / The 15th International Conference on Future
                  Networks and Communications {(FNC-2020)} / The 10th International
                  Conference on Sustainable Energy Information Technology, Leuven, Belgium,
                  August 9-12, 2020},
  series       = {Procedia Computer Science},
  volume       = {175},
  pages        = {560--565},
  publisher    = {Elsevier},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.procs.2020.07.080},
  doi          = {10.1016/J.PROCS.2020.07.080},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fnc/SerinelliCN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcct/ZhangZL20,
  author       = {Jie Zhang and
                  Yong Zhang and
                  Kexin Li},
  title        = {A Network Intrusion Detection Model based on the Combination of ReliefF
                  and Borderline-SMOTE},
  booktitle    = {{HPCCT} {\&} {BDAI} 2020: 4th High Performance Computing and Cluster
                  Technologies Conference {\&} 3rd International Conference on Big
                  Data and Artificial Intelligence, Qingdao, China, July, 2020},
  pages        = {199--203},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3409501.3409516},
  doi          = {10.1145/3409501.3409516},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcct/ZhangZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ibica/WadiaiMB20,
  author       = {Younes Wadiai and
                  Yousef El Mourabit and
                  Mohamed Baslam},
  editor       = {Ajith Abraham and
                  Hideyasu Sasaki and
                  Ricardo Rios and
                  Niketa Gandhi and
                  Umang Singh and
                  Kun Ma},
  title        = {Machine Learning for Intrusion Detection: Design and Implementation
                  of an {IDS} Based on Artificial Neural Network},
  booktitle    = {Innovations in Bio-Inspired Computing and Applications - Proceedings
                  of the 11th International Conference on Innovations in Bio-Inspired
                  Computing and Applications {(IBICA} 2020) held during December 16-18,
                  2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1372},
  pages        = {206--216},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-73603-3\_19},
  doi          = {10.1007/978-3-030-73603-3\_19},
  timestamp    = {Thu, 22 Feb 2024 09:42:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ibica/WadiaiMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaiic/MeliboevAK20,
  author       = {Azizjon Meliboev and
                  Jumabek Alikhanov and
                  Wooseong Kim},
  title        = {1D {CNN} based network intrusion detection with normalization on imbalanced
                  data},
  booktitle    = {2020 International Conference on Artificial Intelligence in Information
                  and Communication, {ICAIIC} 2020, Fukuoka, Japan, February 19-21,
                  2020},
  pages        = {218--224},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICAIIC48513.2020.9064976},
  doi          = {10.1109/ICAIIC48513.2020.9064976},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaiic/MeliboevAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaiic/ParkPC20,
  author       = {Shin Hyuk Park and
                  Hyunjae Park and
                  Young{-}June Choi},
  title        = {RNN-based Prediction for Network Intrusion Detection},
  booktitle    = {2020 International Conference on Artificial Intelligence in Information
                  and Communication, {ICAIIC} 2020, Fukuoka, Japan, February 19-21,
                  2020},
  pages        = {572--574},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICAIIC48513.2020.9065249},
  doi          = {10.1109/ICAIIC48513.2020.9065249},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaiic/ParkPC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/YanQWLC20,
  author       = {Yu Yan and
                  Lin Qi and
                  Jie Wang and
                  Yun Lin and
                  Lei Chen},
  title        = {A Network Intrusion Detection Method Based on Stacked Autoencoder
                  and {LSTM}},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9149384},
  doi          = {10.1109/ICC40277.2020.9149384},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/YanQWLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhangLY20,
  author       = {Jielun Zhang and
                  Fuhao Li and
                  Feng Ye},
  title        = {An Ensemble-based Network Intrusion Detection Scheme with Bayesian
                  Deep Learning},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9149402},
  doi          = {10.1109/ICC40277.2020.9149402},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZhangLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/RaniK20,
  author       = {Deepa Rani and
                  Narottam Chand Kaushal},
  title        = {Supervised Machine Learning Based Network Intrusion Detection System
                  for Internet of Things},
  booktitle    = {11th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCCNT49239.2020.9225340},
  doi          = {10.1109/ICCCNT49239.2020.9225340},
  timestamp    = {Thu, 22 Oct 2020 13:44:41 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/RaniK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/RattiSN20,
  author       = {Ritesh Ratti and
                  Sanasam Ranbir Singh and
                  Sukumar Nandi},
  title        = {Towards implementing fast and scalable Network Intrusion Detection
                  System using Entropy based Discretization Technique},
  booktitle    = {11th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCCNT49239.2020.9225476},
  doi          = {10.1109/ICCCNT49239.2020.9225476},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/RattiSN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/SureshM20,
  author       = {Geethu M. Suresh and
                  Minu Lalitha Madhavu},
  title        = {{AI} Based Intrusion Detection System Using Self-Adaptive Energy Efficient
                  {BAT} Algorithm for Software Defined IoT Networks},
  booktitle    = {11th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCCNT49239.2020.9225415},
  doi          = {10.1109/ICCCNT49239.2020.9225415},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/SureshM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/LabonneOPZ20,
  author       = {Maxime Labonne and
                  Alexis Olivereau and
                  Baptiste Polv{\'{e}} and
                  Djamal Zeghlache},
  title        = {Unsupervised Protocol-based Intrusion Detection for Real-world Networks},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2020, Big Island, HI, USA, February 17-20, 2020},
  pages        = {299--303},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICNC47757.2020.9049796},
  doi          = {10.1109/ICNC47757.2020.9049796},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccnc/LabonneOPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/WangW20,
  author       = {Quanmin Wang and
                  Xuan Wei},
  title        = {The Detection of Network Intrusion Based on Improved Adaboost Algorithm},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {84--88},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377660},
  doi          = {10.1145/3377644.3377660},
  timestamp    = {Thu, 30 Apr 2020 16:20:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/WangW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/HalderC020,
  author       = {Subir Halder and
                  Mauro Conti and
                  Sajal K. Das},
  editor       = {Nandini Mukherjee and
                  Sriram V. Pemmaraju},
  title        = {{COIDS:} {A} Clock Offset Based Intrusion Detection System for Controller
                  Area Networks},
  booktitle    = {{ICDCN} 2020: 21st International Conference on Distributed Computing
                  and Networking, Kolkata, India, January 4-7, 2020},
  pages        = {22:1--22:10},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369740.3369787},
  doi          = {10.1145/3369740.3369787},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/HalderC020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciot3/AlsaadiHTA20,
  author       = {Hajar Saif Alsaadi and
                  Rachid Hedjam and
                  Abderezak Touzene and
                  Abdelhamid Abdessalem},
  title        = {Fast Binary Network Intrusion Detection based on Matched Filter Optimization},
  booktitle    = {{IEEE} International Conference on Informatics, IoT, and Enabling
                  Technologies, ICIoT 2020, Doha, Qatar, February 2-5, 2020},
  pages        = {195--199},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICIoT48696.2020.9089659},
  doi          = {10.1109/ICIOT48696.2020.9089659},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciot3/AlsaadiHTA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TeradoH20,
  author       = {Ryosuke Terado and
                  Morihiro Hayashida},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Improving Accuracy and Speed of Network-based Intrusion Detection
                  using Gradient Boosting Trees},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {490--497},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008963504900497},
  doi          = {10.5220/0008963504900497},
  timestamp    = {Tue, 14 Apr 2020 10:48:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TeradoH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icit2/QiaoBC20,
  author       = {Hanli Qiao and
                  Jan Olaf Blech and
                  Huazhou Chen},
  title        = {A Machine learning based intrusion detection approach for industrial
                  networks},
  booktitle    = {2020 {IEEE} International Conference on Industrial Technology, {ICIT}
                  2020, Buenos Aires, Argentina, February 26-28, 2020},
  pages        = {265--270},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICIT45562.2020.9067253},
  doi          = {10.1109/ICIT45562.2020.9067253},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icit2/QiaoBC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmlt/YangTXL20,
  author       = {Shuaichuang Yang and
                  Minsheng Tan and
                  Shiying Xia and
                  Fangju Liu},
  title        = {A method of intrusion detection based on Attention-LSTM neural network},
  booktitle    = {{ICMLT} 2020: 5th International Conference on Machine Learning Technologies,
                  Beijing, China, June, 2020},
  pages        = {46--50},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3409073.3409096},
  doi          = {10.1145/3409073.3409096},
  timestamp    = {Thu, 22 Feb 2024 13:30:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icmlt/YangTXL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icons2/AlamYST20,
  author       = {Md. Shahanur Alam and
                  Chris Yakopcic and
                  Guru Subramanyam and
                  Tarek M. Taha},
  editor       = {Thomas E. Potok and
                  Catherine D. Schuman},
  title        = {Memristor Based Neuromorphic Adaptive Resonance Theory for One-Shot
                  Online Learning and Network Intrusion Detection},
  booktitle    = {Proceedings of the International Conference on Neuromorphic Systems,
                  {ICONS} 2020, Oak Ridge, Tennessee, USA, July, 2020},
  pages        = {25:1--25:8},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407197.3407608},
  doi          = {10.1145/3407197.3407608},
  timestamp    = {Wed, 05 Aug 2020 15:04:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icons2/AlamYST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictc/LeePL20,
  author       = {Joohwa Lee and
                  Ju{-}Geon Pak and
                  Myungsuk Lee},
  title        = {Network Intrusion Detection System using Feature Extraction based
                  on Deep Sparse Autoencoder},
  booktitle    = {International Conference on Information and Communication Technology
                  Convergence, {ICTC} 2020, Jeju Island, Korea (South), October 21-23,
                  2020},
  pages        = {1282--1287},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICTC49870.2020.9289253},
  doi          = {10.1109/ICTC49870.2020.9289253},
  timestamp    = {Sat, 11 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ictc/LeePL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idaacssws/BelejKSVA20,
  author       = {Olexander Belej and
                  Mikolaj P. Karpinski and
                  Aigul Shaikhanova and
                  Olga Veselska and
                  Azamat Azatov},
  title        = {Development of Intrusion Monitoring System in Wireless Sensor Networks
                  Based on Neural Networks},
  booktitle    = {2020 {IEEE} 5th International Symposium on Smart and Wireless Systems
                  within the Conferences on Intelligent Data Acquisition and Advanced
                  Computing Systems (IDAACS-SWS), Dortmund, Germany, September 17-18,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IDAACS-SWS50031.2020.9297080},
  doi          = {10.1109/IDAACS-SWS50031.2020.9297080},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idaacssws/BelejKSVA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iecon/RohLSHKP20,
  author       = {Jae{-}hee Roh and
                  Seok{-}Ki Lee and
                  Choul{-}Woong Son and
                  Cheonghwan Hwang and
                  Jiwoong Kang and
                  Jaehyun Park},
  title        = {Cyber Security System with FPGA-based Network Intrusion Detector for
                  Nuclear Power Plant},
  booktitle    = {The 46th Annual Conference of the {IEEE} Industrial Electronics Society,
                  {IECON} 2020, Singapore, October 18-21, 2020},
  pages        = {2121--2125},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IECON43393.2020.9255158},
  doi          = {10.1109/IECON43393.2020.9255158},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iecon/RohLSHKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/LeiLCLLK20,
  author       = {Mingjian Lei and
                  Xiaoyong Li and
                  Binsi Cai and
                  Yunfeng Li and
                  Limengwei Liu and
                  Wenping Kong},
  title        = {{P-DNN:} An Effective Intrusion Detection Method based on Pruning
                  Deep Neural Network},
  booktitle    = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020,
                  Glasgow, United Kingdom, July 19-24, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IJCNN48605.2020.9206805},
  doi          = {10.1109/IJCNN48605.2020.9206805},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/LeiLCLLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/GongLYF20,
  author       = {Yiguang Gong and
                  Yunping Liu and
                  Chuanyang Yin and
                  Zhiyong Fan},
  editor       = {Xiaofeng Chen and
                  Hongyang Yan and
                  Qiben Yan and
                  Xiangliang Zhang},
  title        = {A Two-Phase Cycle Algorithm Based on Multi-objective Genetic Algorithm
                  and Modified {BP} Neural Network for Effective Cyber Intrusion Detection},
  booktitle    = {Machine Learning for Cyber Security - Third International Conference,
                  {ML4CS} 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12486},
  pages        = {73--88},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62223-7\_7},
  doi          = {10.1007/978-3-030-62223-7\_7},
  timestamp    = {Wed, 11 Nov 2020 16:33:52 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/GongLYF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/MinawiWAE20,
  author       = {Omar Minawi and
                  Jason Whelan and
                  Abdulaziz Almehmadi and
                  Khalil El{-}Khatib},
  editor       = {Mirela Sechi Moretti Annoni Notare and
                  Peng Sun},
  title        = {Machine Learning-Based Intrusion Detection System for Controller Area
                  Networks},
  booktitle    = {DIVANet '20: Proceedings of the 10th {ACM} Symposium on Design and
                  Analysis of Intelligent Vehicular Networks and Applications, Alicante,
                  Spain, November 16-20, 2020},
  pages        = {41--47},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3416014.3424581},
  doi          = {10.1145/3416014.3424581},
  timestamp    = {Thu, 26 Nov 2020 17:57:37 +0100},
  biburl       = {https://dblp.org/rec/conf/mswim/MinawiWAE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LiTW20,
  author       = {Wenjuan Li and
                  Jiao Tan and
                  Yu Wang},
  editor       = {Miroslaw Kutylowski and
                  Jun Zhang and
                  Chao Chen},
  title        = {A Framework of Blockchain-Based Collaborative Intrusion Detection
                  in Software Defined Networking},
  booktitle    = {Network and System Security - 14th International Conference, {NSS}
                  2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12570},
  pages        = {261--276},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65745-1\_15},
  doi          = {10.1007/978-3-030-65745-1\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/LiTW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/AzminI20,
  author       = {Shuhana Azmin and
                  A. B. M. Alim Al Islam},
  title        = {Network Intrusion Detection System based on Conditional Variational
                  Laplace AutoEncoder},
  booktitle    = {7th NSysS 2020: 7th International Conference on Networking, Systems
                  and Security, Dhaka, Bangladesh, 22-24 December, 2020},
  pages        = {82--88},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3428363.3428371},
  doi          = {10.1145/3428363.3428371},
  timestamp    = {Thu, 21 Jan 2021 17:31:27 +0100},
  biburl       = {https://dblp.org/rec/conf/nsyss/AzminI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/TariqLW20,
  author       = {Shahroz Tariq and
                  Sangyup Lee and
                  Simon S. Woo},
  editor       = {Chih{-}Cheng Hung and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Dongwan Shin and
                  Alessio Bechini},
  title        = {CANTransfer: transfer learning based intrusion detection on a controller
                  area network using convolutional {LSTM} network},
  booktitle    = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online
                  event, [Brno, Czech Republic], March 30 - April 3, 2020},
  pages        = {1048--1055},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3341105.3373868},
  doi          = {10.1145/3341105.3373868},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/TariqLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sbrc/DAndradaAC20,
  author       = {Lu{\'{\i}}s Felipe Prado D'Andrada and
                  Paulo Freitas de Araujo{-}Filho and
                  Divanilson R. Campelo},
  editor       = {Marcelo Gon{\c{c}}alves Rubinstein and
                  Anelise Munaretto},
  title        = {A Real-time Anomaly-based Intrusion Detection System for Automotive
                  Controller Area Networks},
  booktitle    = {{XXXVIII} Brazilian Symposium on Computer Networks and Distributed
                  Systems, {SBRC} 2020, Rio de Janeiro, Brazil (virtual), December 7-10,
                  2020},
  pages        = {658--671},
  year         = {2020},
  url          = {https://doi.org/10.5753/sbrc.2020.12316},
  doi          = {10.5753/SBRC.2020.12316},
  timestamp    = {Tue, 18 Jan 2022 09:24:51 +0100},
  biburl       = {https://dblp.org/rec/conf/sbrc/DAndradaAC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcloud/CocorosSSC20,
  author       = {Peter Cocoros and
                  Matthew Sobocinski and
                  Kyle Steiger and
                  Joel Coffman},
  title        = {Evaluating Techniques for Practical Cloud-based Network Intrusion
                  Detection},
  booktitle    = {{IEEE} International Conference on Smart Cloud, SmartCloud 2020, Washington,
                  DC, USA, November 6-8, 2020},
  pages        = {62--67},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SmartCloud49737.2020.00020},
  doi          = {10.1109/SMARTCLOUD49737.2020.00020},
  timestamp    = {Thu, 03 Dec 2020 12:50:24 +0100},
  biburl       = {https://dblp.org/rec/conf/smartcloud/CocorosSSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/Liu20,
  author       = {Ze Liu},
  editor       = {Guojun Wang and
                  Bing Chen and
                  Wei Li and
                  Roberto Di Pietro and
                  Xuefeng Yan and
                  Hao Han},
  title        = {Reinforcement-Learning Based Network Intrusion Detection with Human
                  Interaction in the Loop},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 13th International Conference, SpaCCS 2020, Nanjing, China,
                  December 18-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12382},
  pages        = {131--144},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68851-6\_9},
  doi          = {10.1007/978-3-030-68851-6\_9},
  timestamp    = {Fri, 05 Feb 2021 12:16:10 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/Liu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spde/HanCM20,
  author       = {Mu Han and
                  Pengzhou Cheng and
                  Shidian Ma},
  editor       = {Shui Yu and
                  Peter Mueller and
                  Jiangbo Qian},
  title        = {CVNNs-IDS: Complex-Valued Neural Network Based In-Vehicle Intrusion
                  Detection System},
  booktitle    = {Security and Privacy in Digital Economy - First International Conference,
                  {SPDE} 2020, Quzhou, China, October 30 - November 1, 2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1268},
  pages        = {263--277},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-9129-7\_19},
  doi          = {10.1007/978-981-15-9129-7\_19},
  timestamp    = {Sun, 12 Nov 2023 02:16:41 +0100},
  biburl       = {https://dblp.org/rec/conf/spde/HanCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/svcc/SongFCP20,
  author       = {Chungsik Song and
                  Wenjun Fan and
                  Sang{-}Yoon Chang and
                  Younghee Park},
  editor       = {Younghee Park and
                  Divyesh Jadav and
                  Thomas H. Austin},
  title        = {Reconstructing Classification to Enhance Machine-Learning Based Network
                  Intrusion Detection by Embracing Ambiguity},
  booktitle    = {Silicon Valley Cybersecurity Conference - First Conference, {SVCC}
                  2020, San Jose, CA, USA, December 17-19, 2020, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1383},
  pages        = {169--187},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-72725-3\_13},
  doi          = {10.1007/978-3-030-72725-3\_13},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/svcc/SongFCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SchellK20,
  author       = {Oleg Schell and
                  Marcel Kneib},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {{VALID:} Voltage-Based Lightweight Intrusion Detection for the Controller
                  Area Network},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {225--232},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00041},
  doi          = {10.1109/TRUSTCOM50675.2020.00041},
  timestamp    = {Fri, 30 Apr 2021 12:35:40 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SchellK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wicon/SarhanLMP20,
  author       = {Mohanad Sarhan and
                  Siamak Layeghy and
                  Nour Moustafa and
                  Marius Portmann},
  editor       = {Deze Zeng and
                  Huan Huang and
                  Rui Hou and
                  Seungmin Rho and
                  Naveen K. Chilamkurti},
  title        = {NetFlow Datasets for Machine Learning-Based Network Intrusion Detection
                  Systems},
  booktitle    = {Big Data Technologies and Applications - 10th {EAI} International
                  Conference, {BDTA} 2020, and 13th {EAI} International Conference on
                  Wireless Internet, WiCON 2020, Virtual Event, December 11, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {371},
  pages        = {117--135},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-72802-1\_9},
  doi          = {10.1007/978-3-030-72802-1\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wicon/SarhanLMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiuKA20,
  author       = {Jinxin Liu and
                  Burak Kantarci and
                  Carlisle Adams},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Machine learning-driven intrusion detection for Contiki-NG-based IoT
                  networks exposed to {NSL-KDD} dataset},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402621},
  doi          = {10.1145/3395352.3402621},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/LiuKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpmc/SuLZ20,
  author       = {Bingying Su and
                  Rongpeng Li and
                  Honggang Zhang},
  title        = {Evolving Deep Convolutional Neural Network for Intrusion Detection
                  Based on {NEAT}},
  booktitle    = {23rd International Symposium on Wireless Personal Multimedia Communications,
                  {WPMC} 2020, Okayama, Japan, October 19-26, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WPMC50192.2020.9309451},
  doi          = {10.1109/WPMC50192.2020.9309451},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpmc/SuLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/GullaVVK20,
  author       = {Kishor Kumar Gulla and
                  P. Viswanath and
                  Suresh Babu Veluru and
                  R. Raja Kumar},
  editor       = {Brij B. Gupta and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Dharma P. Agrawal and
                  Deepak Gupta},
  title        = {Machine Learning Based Intrusion Detection Techniques},
  booktitle    = {Handbook of Computer Networks and Cyber Security, Principles and Paradigms},
  pages        = {873--888},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-22277-2\_35},
  doi          = {10.1007/978-3-030-22277-2\_35},
  timestamp    = {Sun, 12 Nov 2023 02:22:31 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/GullaVVK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/BlaiseSS20,
  author       = {Agathe Blaise and
                  Sandra Scott{-}Hayward and
                  Stefano Secci},
  editor       = {Jacek Rak and
                  David Hutchison},
  title        = {Scalable and Collaborative Intrusion Detection and Prevention Systems
                  Based on {SDN} and {NFV}},
  booktitle    = {Guide to Disaster-Resilient Communication Networks},
  series       = {Computer Communications and Networks},
  pages        = {653--673},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44685-7\_26},
  doi          = {10.1007/978-3-030-44685-7\_26},
  timestamp    = {Thu, 22 Sep 2022 08:31:34 +0200},
  biburl       = {https://dblp.org/rec/series/ccn/BlaiseSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-08527,
  author       = {Aritran Piplai and
                  Sai Sree Laya Chukkapalli and
                  Anupam Joshi},
  title        = {NAttack! Adversarial Attacks to bypass a {GAN} based classifier trained
                  to detect Network intrusion},
  journal      = {CoRR},
  volume       = {abs/2002.08527},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.08527},
  eprinttype    = {arXiv},
  eprint       = {2002.08527},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-08527.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-07405,
  author       = {Mubarak Albarka Umar and
                  Zhanfang Chen and
                  Yan Liu},
  title        = {Network Intrusion Detection Using Wrapper-based Decision Tree for
                  Feature Selection},
  journal      = {CoRR},
  volume       = {abs/2008.07405},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.07405},
  eprinttype    = {arXiv},
  eprint       = {2008.07405},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-07405.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-09011,
  author       = {Mario Di Mauro and
                  Giovanni Galatro and
                  Antonio Liotta},
  title        = {Experimental Review of Neural-based approaches for Network Intrusion
                  Management},
  journal      = {CoRR},
  volume       = {abs/2009.09011},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.09011},
  eprinttype    = {arXiv},
  eprint       = {2009.09011},
  timestamp    = {Wed, 23 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-09011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-10940,
  author       = {Punam Bedi and
                  Neha Gupta and
                  Vinita Jindal},
  title        = {I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based
                  intrusion detection systems},
  journal      = {CoRR},
  volume       = {abs/2009.10940},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.10940},
  eprinttype    = {arXiv},
  eprint       = {2009.10940},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-10940.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-11440,
  author       = {Riadul Islam and
                  Rafi Ud Daula Refat and
                  Sai Manikanta Yerram and
                  Hafiz Malik},
  title        = {Graph-Based Intrusion Detection System for Controller Area Networks},
  journal      = {CoRR},
  volume       = {abs/2009.11440},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.11440},
  eprinttype    = {arXiv},
  eprint       = {2009.11440},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-11440.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-09144,
  author       = {Mohanad Sarhan and
                  Siamak Layeghy and
                  Nour Moustafa and
                  Marius Portmann},
  title        = {NetFlow Datasets for Machine Learning-based Network Intrusion Detection
                  Systems},
  journal      = {CoRR},
  volume       = {abs/2011.09144},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.09144},
  eprinttype    = {arXiv},
  eprint       = {2011.09144},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-09144.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-00476,
  title        = {1D {CNN} Based Network Intrusion Detection with Normalization on Imbalanced
                  Data},
  journal      = {CoRR},
  volume       = {abs/2003.00476},
  year         = {2020},
  note         = {Withdrawn.},
  url          = {https://arxiv.org/abs/2003.00476},
  eprinttype    = {arXiv},
  eprint       = {2003.00476},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-00476.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HeSHZHR19,
  author       = {Haitao He and
                  Xiaobing Sun and
                  Hongdou He and
                  Guyu Zhao and
                  Ligang He and
                  Jiadong Ren},
  title        = {A Novel Multimodal-Sequential Approach Based on Multi-View Features
                  for Network Intrusion Detection},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {183207--183221},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2959131},
  doi          = {10.1109/ACCESS.2019.2959131},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HeSHZHR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NiaziF19,
  author       = {Rumaisa Aimen Niazi and
                  Yasir Faheem},
  title        = {A Bayesian Game-Theoretic Intrusion Detection System for Hypervisor-Based
                  Software Defined Networks in Smart Grids},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {88656--88672},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2924968},
  doi          = {10.1109/ACCESS.2019.2924968},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/NiaziF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WeiLZHLL19,
  author       = {Peng Wei and
                  Yufeng Li and
                  Zhen Zhang and
                  Tao Hu and
                  Ziyong Li and
                  Diyang Liu},
  title        = {An Optimization Method for Intrusion Detection Classification Model
                  Based on Deep Belief Network},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {87593--87605},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2925828},
  doi          = {10.1109/ACCESS.2019.2925828},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WeiLZHLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XiaoXZZ19,
  author       = {Yihan Xiao and
                  Cheng Xing and
                  Taining Zhang and
                  Zhongkai Zhao},
  title        = {An Intrusion Detection Model Based on Feature Reduction and Convolutional
                  Neural Networks},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {42210--42219},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2904620},
  doi          = {10.1109/ACCESS.2019.2904620},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XiaoXZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangQY19,
  author       = {Hongyu Yang and
                  Geng Qin and
                  Li Ye},
  title        = {Combined Wireless Network Intrusion Detection Model Based on Deep
                  Learning},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {82624--82632},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2923814},
  doi          = {10.1109/ACCESS.2019.2923814},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YangQY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangW19c,
  author       = {Hongyu Yang and
                  Fengyan Wang},
  title        = {Wireless Network Intrusion Detection Based on Improved Convolutional
                  Neural Network},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {64366--64374},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2917299},
  doi          = {10.1109/ACCESS.2019.2917299},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YangW19c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangZLLZ19,
  author       = {Aimin Yang and
                  Yunxi Zhuansun and
                  Chenshuai Liu and
                  Jie Li and
                  Chunying Zhang},
  title        = {Design of Intrusion Detection System for Internet of Things Based
                  on Improved {BP} Neural Network},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {106043--106052},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2929919},
  doi          = {10.1109/ACCESS.2019.2929919},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YangZLLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZengGWG19,
  author       = {Yi Zeng and
                  Huaxi Gu and
                  Wenting Wei and
                  Yantao Guo},
  title        = {{\textdollar}Deep-Full-Range{\textdollar} : {A} Deep Learning Based
                  Network Encrypted Traffic Classification and Intrusion Detection Framework},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {45182--45190},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2908225},
  doi          = {10.1109/ACCESS.2019.2908225},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZengGWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangCJWG19,
  author       = {Yong Zhang and
                  Xu Chen and
                  Lei Jin and
                  Xiaojuan Wang and
                  Da Guo},
  title        = {Network Intrusion Detection: Based on Deep Hierarchical Network and
                  Original Flow Data},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {37004--37016},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2905041},
  doi          = {10.1109/ACCESS.2019.2905041},
  timestamp    = {Sat, 07 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangCJWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangLW19,
  author       = {Ying Zhang and
                  Peisong Li and
                  Xinheng Wang},
  title        = {Intrusion Detection for IoT Based on Improved Genetic Algorithm and
                  Deep Belief Network},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {31711--31722},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2903723},
  doi          = {10.1109/ACCESS.2019.2903723},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ajiips/FuKHS19,
  author       = {Neng Fu and
                  Nuerbiye Kamili and
                  Yanhong Huang and
                  Jianqi Shi},
  title        = {A Novel Deep Intrusion Detection Model Based On a Convolutional Neural
                  Network},
  journal      = {Aust. J. Intell. Inf. Process. Syst.},
  volume       = {15},
  number       = {2},
  pages        = {52--59},
  year         = {2019},
  url          = {http://ajiips.com.au/papers/V15.2/v15n2\_56-63.pdf},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ajiips/FuKHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/LiangCZY19,
  author       = {Junwei Liang and
                  Jianyong Chen and
                  Yingying Zhu and
                  F. Richard Yu},
  title        = {A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs)
                  based on differences of traffic flow and position},
  journal      = {Appl. Soft Comput.},
  volume       = {75},
  pages        = {712--727},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.asoc.2018.12.001},
  doi          = {10.1016/J.ASOC.2018.12.001},
  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/asc/LiangCZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ci/ElmasryAZ19,
  author       = {Wisam Elmasry and
                  Akhan Akbulut and
                  Abdul Halim Zaim},
  title        = {Empirical study on multiclass classification-based network intrusion
                  detection},
  journal      = {Comput. Intell.},
  volume       = {35},
  number       = {4},
  pages        = {919--954},
  year         = {2019},
  url          = {https://doi.org/10.1111/coin.12220},
  doi          = {10.1111/COIN.12220},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ci/ElmasryAZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/SubbarayaluSK19,
  author       = {Venkatraman Subbarayalu and
                  B. Surendiran and
                  P. Arun Raj Kumar},
  title        = {Hybrid Network Intrusion Detection System for Smart Environments Based
                  on Internet of Things},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {12},
  pages        = {1822--1839},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxz082},
  doi          = {10.1093/COMJNL/BXZ082},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/SubbarayaluSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/BalaJC19,
  author       = {K. Bala and
                  Jothi Soundaram and
                  A. Chandrasekar},
  title        = {An enhanced intrusion detection system for mobile ad-hoc network based
                  on traffic analysis},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {6},
  pages        = {15205--15212},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-018-2545-9},
  doi          = {10.1007/S10586-018-2545-9},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/BalaJC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/BharathisindhuB19,
  author       = {P. Bharathisindhu and
                  S. Selva Brunda},
  title        = {An improved model based on genetic algorithm for detecting intrusion
                  in mobile ad hoc network},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {Suppl 1},
  pages        = {265--275},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-018-1745-7},
  doi          = {10.1007/S10586-018-1745-7},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/BharathisindhuB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ZhangSWLGC19,
  author       = {Kun Zhang and
                  Chong Shen and
                  Haifeng Wang and
                  Zhuang Li and
                  Qian Gao and
                  Xiaoyan Chen},
  title        = {Cluster computing data mining based on massive intrusion interference
                  constraints in hybrid networks},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {Supplement},
  pages        = {7481--7489},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-018-1780-4},
  doi          = {10.1007/S10586-018-1780-4},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/ZhangSWLGC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/CostaPLMA19,
  author       = {Kelton A. P. da Costa and
                  Jo{\~{a}}o P. Papa and
                  Celso O. Lisboa and
                  Roberto Mu{\~{n}}oz and
                  Victor Hugo C. de Albuquerque},
  title        = {Internet of Things: {A} survey on machine learning-based intrusion
                  detection approaches},
  journal      = {Comput. Networks},
  volume       = {151},
  pages        = {147--157},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.comnet.2019.01.023},
  doi          = {10.1016/J.COMNET.2019.01.023},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/CostaPLMA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BK19,
  author       = {Selvakumar B and
                  K. Muneeswaran},
  title        = {Firefly algorithm based feature selection for network intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {81},
  pages        = {148--155},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2018.11.005},
  doi          = {10.1016/J.COSE.2018.11.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RingWSLH19,
  author       = {Markus Ring and
                  Sarah Wunderlich and
                  Deniz Scheuring and
                  Dieter Landes and
                  Andreas Hotho},
  title        = {A survey of network-based intrusion detection data sets},
  journal      = {Comput. Secur.},
  volume       = {86},
  pages        = {147--167},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.06.005},
  doi          = {10.1016/J.COSE.2019.06.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RingWSLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/AzeezAMMD19,
  author       = {Nureni Ayofe Azeez and
                  Tolulope Jide Ayemobola and
                  Sanjay Misra and
                  Rytis Maskeliunas and
                  Robertas Damasevicius},
  title        = {Network Intrusion Detection with a Hashing Based Apriori Algorithm
                  Using Hadoop MapReduce},
  journal      = {Comput.},
  volume       = {8},
  number       = {4},
  pages        = {86},
  year         = {2019},
  url          = {https://doi.org/10.3390/computers8040086},
  doi          = {10.3390/COMPUTERS8040086},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/AzeezAMMD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/DuanHT19,
  author       = {Letian Duan and
                  Dezhi Han and
                  Qiuting Tian},
  title        = {Design of intrusion detection system based on improved ABC{\_}elite
                  and {BP} neural networks},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {16},
  number       = {3},
  pages        = {773--795},
  year         = {2019},
  url          = {https://doi.org/10.2298/CSIS181001026D},
  doi          = {10.2298/CSIS181001026D},
  timestamp    = {Mon, 11 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsis/DuanHT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/ChaabouniMZSF19,
  author       = {Nadia Chaabouni and
                  Mohamed Mosbah and
                  Akka Zemmari and
                  Cyrille Sauvignac and
                  Parvez Faruki},
  title        = {Network Intrusion Detection for IoT Security Based on Learning Techniques},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {21},
  number       = {3},
  pages        = {2671--2701},
  year         = {2019},
  url          = {https://doi.org/10.1109/COMST.2019.2896380},
  doi          = {10.1109/COMST.2019.2896380},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/ChaabouniMZSF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/LiuZ19a,
  author       = {Yansong Liu and
                  Li Zhu},
  title        = {A new intrusion detection and alarm correlation technology based on
                  neural network},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2019},
  pages        = {109},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13638-019-1419-z},
  doi          = {10.1186/S13638-019-1419-Z},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/LiuZ19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/evi/BenmessahelXCS19,
  author       = {Ilyas Benmessahel and
                  Kun Xie and
                  Mouna Chellal and
                  Thabo Semong},
  title        = {A new evolutionary neural networks based on intrusion detection systems
                  using locust swarm optimization},
  journal      = {Evol. Intell.},
  volume       = {12},
  number       = {2},
  pages        = {131--146},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12065-019-00199-5},
  doi          = {10.1007/S12065-019-00199-5},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/evi/BenmessahelXCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ViegasSBN19,
  author       = {Eduardo Viegas and
                  Altair Olivo Santin and
                  Alysson Bessani and
                  Nuno Neves},
  title        = {BigFlow: Real-time and reliable anomaly-based intrusion detection
                  for high-speed networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {93},
  pages        = {473--485},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2018.09.051},
  doi          = {10.1016/J.FUTURE.2018.09.051},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ViegasSBN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ict-express/KanimozhiJ19,
  author       = {V. Kanimozhi and
                  T. Prem Jacob},
  title        = {Artificial Intelligence based Network Intrusion Detection with hyper-parameter
                  optimization tuning on the realistic cyber dataset {CSE-CIC-IDS2018}
                  using cloud computing},
  journal      = {{ICT} Express},
  volume       = {5},
  number       = {3},
  pages        = {211--214},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.icte.2019.03.003},
  doi          = {10.1016/J.ICTE.2019.03.003},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ict-express/KanimozhiJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/JiaWW19,
  author       = {Yang Jia and
                  Meng Wang and
                  Yagang Wang},
  title        = {Network intrusion detection algorithm based on deep neural network},
  journal      = {{IET} Inf. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {48--53},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-ifs.2018.5258},
  doi          = {10.1049/IET-IFS.2018.5258},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/JiaWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaip/KukrejaDR19,
  author       = {Deepika Kukreja and
                  Sanjay K. Dhurandher and
                  B. V. Ramana Reddy},
  title        = {Securing ad hoc networks using energy efficient and distributed trust-based
                  intrusion detection system},
  journal      = {Int. J. Adv. Intell. Paradigms},
  volume       = {13},
  number       = {3/4},
  pages        = {430--448},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJAIP.2019.101990},
  doi          = {10.1504/IJAIP.2019.101990},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaip/KukrejaDR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbidm/ManickamRC19,
  author       = {M. Manickam and
                  N. Ramaraj and
                  C. Chellappan},
  title        = {A combined {PFCM} and recurrent neural network-based intrusion detection
                  system for cloud environment},
  journal      = {Int. J. Bus. Intell. Data Min.},
  volume       = {14},
  number       = {4},
  pages        = {504--527},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJBIDM.2019.099963},
  doi          = {10.1504/IJBIDM.2019.099963},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbidm/ManickamRC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijccc/LinWGW19,
  author       = {Tao Lin and
                  Peng Wu and
                  Fengmei Gao and
                  Tianshu Wu},
  title        = {Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation},
  journal      = {Int. J. Comput. Commun. Control},
  volume       = {14},
  number       = {5},
  pages        = {660--671},
  year         = {2019},
  url          = {https://doi.org/10.15837/ijccc.2019.5.3629},
  doi          = {10.15837/IJCCC.2019.5.3629},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijccc/LinWGW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcia/MohammadiA19,
  author       = {Shahriar Mohammadi and
                  Fatemeh Amiri},
  title        = {An Efficient Hybrid Self-Learning Intrusion Detection System Based
                  on Neural Networks},
  journal      = {Int. J. Comput. Intell. Appl.},
  volume       = {18},
  number       = {1},
  pages        = {1950001:1--1950001:19},
  year         = {2019},
  url          = {https://doi.org/10.1142/S1469026819500019},
  doi          = {10.1142/S1469026819500019},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcia/MohammadiA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnds/AdhanomM19,
  author       = {Alemtsehay Adhanom and
                  Henock M. Melaku},
  title        = {A hybrid behavioural-based cyber intrusion detection system},
  journal      = {Int. J. Commun. Networks Distributed Syst.},
  volume       = {23},
  number       = {4},
  pages        = {473--498},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJCNDS.2019.102986},
  doi          = {10.1504/IJCNDS.2019.102986},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnds/AdhanomM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Chiba19,
  author       = {Zouhair Chiba},
  title        = {New Anomaly Network Intrusion Detection System in Cloud Environment
                  Based on Optimized Back Propagation Neural Network Using Improved
                  Genetic Algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {1},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3764},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Chiba19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChibaAMOR19,
  author       = {Zouhair Chiba and
                  Noreddine Abghour and
                  Khalid Moussaid and
                  Amina El Omri and
                  Mohammed Rida},
  title        = {Intelligent and Improved Self-Adaptive Anomaly based Intrusion Detection
                  System for Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {2},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/4144},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChibaAMOR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/SinghKNLK19,
  author       = {Parminder Singh and
                  Sujatha Krishnamoorthy and
                  Anand Nayyar and
                  Ashish Kumar Luhach and
                  Avinash Kaur},
  title        = {Soft-computing-based false alarm reduction for hierarchical data of
                  intrusion detection system},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {15},
  number       = {10},
  year         = {2019},
  url          = {https://doi.org/10.1177/1550147719883132},
  doi          = {10.1177/1550147719883132},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/SinghKNLK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/ZhouC19,
  author       = {Peng Zhou and
                  Wen{-}Kuang Chou},
  title        = {IBBO-LSSVM-based network anomaly intrusion detection},
  journal      = {Int. J. Embed. Syst.},
  volume       = {11},
  number       = {3},
  pages        = {352--362},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJES.2019.099440},
  doi          = {10.1504/IJES.2019.099440},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/ZhouC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PektasA19,
  author       = {Abdurrahman Pektas and
                  Tankut Acarman},
  title        = {A deep learning method to detect network intrusion through flow-based
                  features},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2050},
  doi          = {10.1002/NEM.2050},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PektasA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/He19,
  author       = {Yunbin He},
  title        = {Identification and Processing of Network Abnormal Events Based on
                  Network Intrusion Detection Algorithm},
  journal      = {Int. J. Netw. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {153--159},
  year         = {2019},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n1/ijns-2019-v21-n1-p153-159.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/He19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Zhang19,
  author       = {Jinming Zhang},
  title        = {Detection of Network Protection Security Vulnerability Intrusion Based
                  on Data Mining},
  journal      = {Int. J. Netw. Secur.},
  volume       = {21},
  number       = {6},
  pages        = {979--984},
  year         = {2019},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n6/ijns-2019-v21-n6-p979-984.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Zhang19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijprai/LuLHZZ19,
  author       = {Jiazhong Lu and
                  Xiaolei Liu and
                  Teng Hu and
                  Jianwei Zhang and
                  Xiaosong Zhang},
  title        = {Network Intrusion Feature Map Node Equalization Algorithm Based on
                  Modified Variable Step-Size Constant Modulus},
  journal      = {Int. J. Pattern Recognit. Artif. Intell.},
  volume       = {33},
  number       = {14},
  pages        = {1955015:1--1955015:15},
  year         = {2019},
  url          = {https://doi.org/10.1142/S0218001419550152},
  doi          = {10.1142/S0218001419550152},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijprai/LuLHZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsinnov/SampathM19,
  author       = {Nithya Sampath and
                  M. Dinakaran},
  title        = {Flow Based Classification for Specification Based Intrusion Detection
                  in Software Defined Networking: FlowClassify},
  journal      = {Int. J. Softw. Innov.},
  volume       = {7},
  number       = {2},
  pages        = {1--8},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJSI.2019040101},
  doi          = {10.4018/IJSI.2019040101},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsinnov/SampathM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/Pandey19,
  author       = {Sushant Kumar Pandey},
  title        = {An anomaly detection technique-based intrusion detection system for
                  wireless sensor network},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {323--333},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJWMC.2019.103110},
  doi          = {10.1504/IJWMC.2019.103110},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmc/Pandey19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/XueTL19,
  author       = {Yu Xue and
                  Tao Tang and
                  Alex X. Liu},
  title        = {Feedforward neural network based on ensemble evolutionary algorithm
                  with self-adaptive strategy and parameter for intrusion detection},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {202--211},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJWMC.2019.10022941},
  doi          = {10.1504/IJWMC.2019.10022941},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmc/XueTL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/DeyYS19,
  author       = {Saurabh Dey and
                  Qiang Ye and
                  Srinivas Sampalli},
  title        = {A machine learning based intrusion detection scheme for data fusion
                  in mobile clouds involving heterogeneous client networks},
  journal      = {Inf. Fusion},
  volume       = {49},
  pages        = {205--215},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.inffus.2019.01.002},
  doi          = {10.1016/J.INFFUS.2019.01.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/inffus/DeyYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/XiaoX19,
  author       = {Yuelei Xiao and
                  Xing Xiao},
  title        = {An Intrusion Detection System Based on a Simplified Residual Network},
  journal      = {Inf.},
  volume       = {10},
  number       = {11},
  pages        = {356},
  year         = {2019},
  url          = {https://doi.org/10.3390/info10110356},
  doi          = {10.3390/INFO10110356},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/XiaoX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inis/TruongTNNT19,
  author       = {Thu Huong Truong and
                  Phuong Bac Ta and
                  Quoc{-}Th{\^{o}}ng Nguyen and
                  Huu Du Nguyen and
                  Kim Phuc Tran},
  title        = {A data-driven approach for Network Intrusion Detection and Monitoring
                  based on Kernel Null Space},
  journal      = {{EAI} Endorsed Trans. Ind. Networks Intell. Syst.},
  volume       = {6},
  number       = {20},
  pages        = {e1},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.13-6-2019.159801},
  doi          = {10.4108/EAI.13-6-2019.159801},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/inis/TruongTNNT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiZLZ19,
  author       = {Jiaqi Li and
                  Zhifeng Zhao and
                  Rongpeng Li and
                  Honggang Zhang},
  title        = {AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {2},
  pages        = {2093--2102},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2883344},
  doi          = {10.1109/JIOT.2018.2883344},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiZLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MoustafaTC19,
  author       = {Nour Moustafa and
                  Benjamin P. Turnbull and
                  Kim{-}Kwang Raymond Choo},
  title        = {An Ensemble Intrusion Detection Technique Based on Proposed Statistical
                  Flow Features for Protecting Network Traffic of Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {3},
  pages        = {4815--4830},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2871719},
  doi          = {10.1109/JIOT.2018.2871719},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/MoustafaTC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HanZJDX19,
  author       = {Lansheng Han and
                  Man Zhou and
                  Wenjing Jia and
                  Zakaria Dalil and
                  Xingbo Xu},
  title        = {Intrusion detection model of wireless sensor networks based on game
                  theory and an autoregressive model},
  journal      = {Inf. Sci.},
  volume       = {476},
  pages        = {491--504},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.06.017},
  doi          = {10.1016/J.INS.2018.06.017},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/HanZJDX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiK19,
  author       = {Wenjuan Li and
                  Lam For Kwok},
  title        = {Challenge-based collaborative intrusion detection networks under passive
                  message fingerprint attack: {A} further analysis},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {47},
  pages        = {1--7},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.019},
  doi          = {10.1016/J.JISA.2019.03.019},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/WangG19,
  author       = {Benyou Wang and
                  Li Gu},
  title        = {Detection of Network Intrusion Threat Based on the Probabilistic Neural
                  Network Model},
  journal      = {Inf. Technol. Control.},
  volume       = {48},
  number       = {4},
  pages        = {618--625},
  year         = {2019},
  url          = {https://doi.org/10.5755/j01.itc.48.4.24036},
  doi          = {10.5755/J01.ITC.48.4.24036},
  timestamp    = {Sun, 13 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itc/WangG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcnc/GhugarPBS19,
  author       = {Umashankar Ghugar and
                  Jayaram Pradhan and
                  Sourav Kumar Bhoi and
                  Rashmi Ranjan Sahoo},
  title        = {{LB-IDS:} Securing Wireless Sensor Network Using Protocol Layer Trust-Based
                  Intrusion Detection System},
  journal      = {J. Comput. Networks Commun.},
  volume       = {2019},
  pages        = {2054298:1--2054298:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2054298},
  doi          = {10.1155/2019/2054298},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcnc/GhugarPBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcnc/ThangP19,
  author       = {Vu Viet Thang and
                  Fedor F. Pashchenko},
  title        = {Multistage System-Based Machine Learning Techniques for Intrusion
                  Detection in WiFi Network},
  journal      = {J. Comput. Networks Commun.},
  volume       = {2019},
  pages        = {4708201:1--4708201:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4708201},
  doi          = {10.1155/2019/4708201},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcnc/ThangP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/LiuZL19,
  author       = {Yansong Liu and
                  Li Zhu and
                  Feng Liu},
  title        = {Optimal design of hadoop intrusion detection system based on neural
                  network boosting algorithms},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {37},
  number       = {5},
  pages        = {6127--6138},
  year         = {2019},
  url          = {https://doi.org/10.3233/JIFS-179197},
  doi          = {10.3233/JIFS-179197},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/LiuZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/MaziniSM19,
  author       = {Mehrnaz Mazini and
                  Babak Shirazi and
                  Iraj Mahdavi},
  title        = {Anomaly network-based intrusion detection system using a reliable
                  hybrid artificial bee colony and AdaBoost algorithms},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {31},
  number       = {4},
  pages        = {541--553},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jksuci.2018.03.011},
  doi          = {10.1016/J.JKSUCI.2018.03.011},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/MaziniSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmmis/KimSC19,
  author       = {Jiyeon Kim and
                  Yulim Shin and
                  EunJung Choi},
  title        = {An Intrusion Detection Model based on a Convolutional Neural Network},
  journal      = {J. Multim. Inf. Syst.},
  volume       = {6},
  number       = {4},
  pages        = {165--172},
  year         = {2019},
  url          = {https://doi.org/10.33851/jmis.2019.6.4.165},
  doi          = {10.33851/JMIS.2019.6.4.165},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmmis/KimSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/ZhangX19,
  author       = {Ruirui Zhang and
                  Xin Xiao},
  title        = {Intrusion Detection in Wireless Sensor Networks with an Improved {NSA}
                  Based on Space Division},
  journal      = {J. Sensors},
  volume       = {2019},
  pages        = {5451263:1--5451263:20},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5451263},
  doi          = {10.1155/2019/5451263},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/js/ZhangX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/DingWZLX19,
  author       = {Hongwei Ding and
                  Liang Wan and
                  Kang Zhou and
                  Tingyan Long and
                  Zhuang Xin},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{28145}}{\unicode{24230}}{\unicode{21367}}{\unicode{31215}}{\unicode{31070}}{\unicode{32463}}{\unicode{32593}}{\unicode{32476}}{\unicode{30340}}{\unicode{20837}}{\unicode{20405}}{\unicode{26816}}{\unicode{27979}}{\unicode{30740}}{\unicode{31350}}
                  (Study on Intrusion Detection Based on Deep Convolution Neural Network)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {46},
  number       = {10},
  pages        = {173--179},
  year         = {2019},
  url          = {https://doi.org/10.11896/jsjkx.180801429},
  doi          = {10.11896/JSJKX.180801429},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/DingWZLX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/LiangMSY19,
  author       = {Junwei Liang and
                  Maode Ma and
                  Muhammad Sadiq and
                  Kai{-}Hau Yeung},
  title        = {A filter model for intrusion detection system in Vehicle Ad Hoc Networks:
                  {A} hidden Markov methodology},
  journal      = {Knowl. Based Syst.},
  volume       = {163},
  pages        = {611--623},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.knosys.2018.09.022},
  doi          = {10.1016/J.KNOSYS.2018.09.022},
  timestamp    = {Thu, 05 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/LiangMSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/LiuHZMTNG19,
  author       = {Jinping Liu and
                  Jiezhou He and
                  Wuxia Zhang and
                  Tianyu Ma and
                  Zhaohui Tang and
                  Jean Paul Niyoyita and
                  Weihua Gui},
  title        = {ANID-SEoKELM: Adaptive network intrusion detection based on selective
                  ensemble of kernel ELMs with random features},
  journal      = {Knowl. Based Syst.},
  volume       = {177},
  pages        = {104--116},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.knosys.2019.04.008},
  doi          = {10.1016/J.KNOSYS.2019.04.008},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/LiuHZMTNG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ZhouLDSWT19,
  author       = {Mu Zhou and
                  Yaoping Li and
                  Zhian Deng and
                  Yongliang Sun and
                  Yanmeng Wang and
                  Zengshan Tian},
  title        = {Indoor Target Intrusion Detection via Iterative Transfer Learning
                  Based Cognitive Sensing},
  journal      = {Mob. Networks Appl.},
  volume       = {24},
  number       = {6},
  pages        = {2002--2013},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11036-019-01335-2},
  doi          = {10.1007/S11036-019-01335-2},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/ZhouLDSWT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pnc/ShangZLYZ19,
  author       = {Fengjun Shang and
                  Dan Zhou and
                  Cheng Li and
                  Han{-}Yun Yeh and
                  Yuting Zhao},
  title        = {Research on the intrusion detection model based on improved cumulative
                  summation and evidence theory for wireless sensor network},
  journal      = {Photonic Netw. Commun.},
  volume       = {37},
  number       = {2},
  pages        = {212--223},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11107-018-0810-8},
  doi          = {10.1007/S11107-018-0810-8},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pnc/ShangZLYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/SultanaCPA19,
  author       = {Nasrin Sultana and
                  Naveen K. Chilamkurti and
                  Wei Peng and
                  Rabei Alhadad},
  title        = {Survey on {SDN} based network intrusion detection system using machine
                  learning approaches},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {12},
  number       = {2},
  pages        = {493--501},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12083-017-0630-0},
  doi          = {10.1007/S12083-017-0630-0},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/SultanaCPA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Albahar19,
  author       = {Marwan Ali Albahar},
  title        = {Recurrent Neural Network Model Based on a New Regularization Technique
                  for Real-Time Intrusion Detection in {SDN} Environments},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8939041:1--8939041:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8939041},
  doi          = {10.1155/2019/8939041},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Albahar19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChuLL19,
  author       = {Ankang Chu and
                  Yingxu Lai and
                  Jing Liu},
  title        = {Industrial Control Intrusion Detection Approach Based on Multiclassification
                  GoogLeNet-LSTM Model},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6757685:1--6757685:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6757685},
  doi          = {10.1155/2019/6757685},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChuLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/IraqiB19,
  author       = {Omar Iraqi and
                  Hanan El Bakkali},
  title        = {Application-Level Unsupervised Outlier-Based Intrusion Detection and
                  Prevention},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8368473:1--8368473:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8368473},
  doi          = {10.1155/2019/8368473},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/IraqiB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RenGWYXJ19,
  author       = {Jiadong Ren and
                  Jiawei Guo and
                  Qian Wang and
                  Yuan Huang and
                  Hao Xiaobing and
                  Hu Jingjing},
  title        = {Building an Effective Intrusion Detection System by Using Hybrid Data
                  Optimization Based on Machine Learning Algorithms},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7130868:1--7130868:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7130868},
  doi          = {10.1155/2019/7130868},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RenGWYXJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShenZC19,
  author       = {Zhidong Shen and
                  Yuhao Zhang and
                  Weiying Chen},
  title        = {A Bayesian Classification Intrusion Detection Method Based on the
                  Fusion of {PCA} and {LDA}},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6346708:1--6346708:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6346708},
  doi          = {10.1155/2019/6346708},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShenZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShenZWY19,
  author       = {Yanping Shen and
                  Kangfeng Zheng and
                  Chunhua Wu and
                  Yixian Yang},
  title        = {A Neighbor Prototype Selection Method Based on {CCHPSO} for Intrusion
                  Detection},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1283495:1--1283495:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1283495},
  doi          = {10.1155/2019/1283495},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShenZWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AlqahtaniGMI19,
  author       = {Mnahi Alqahtani and
                  Abdu Gumaei and
                  Hassan Mathkour and
                  Mohamed Maher Ben Ismail},
  title        = {A Genetic-Based Extreme Gradient Boosting Model for Detecting Intrusions
                  in Wireless Sensor Networks},
  journal      = {Sensors},
  volume       = {19},
  number       = {20},
  pages        = {4383},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19204383},
  doi          = {10.3390/S19204383},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AlqahtaniGMI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/TanSHGZSL19,
  author       = {Xiaopeng Tan and
                  Shaojing Su and
                  Zhiping Huang and
                  Xiaojun Guo and
                  Zhen Zuo and
                  Xiaoyong Sun and
                  Longqing Li},
  title        = {Wireless Sensor Networks Intrusion Detection Based on {SMOTE} and
                  the Random Forest Algorithm},
  journal      = {Sensors},
  volume       = {19},
  number       = {1},
  pages        = {203},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19010203},
  doi          = {10.3390/S19010203},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/TanSHGZSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/TanSZGS19,
  author       = {Xiaopeng Tan and
                  Shaojing Su and
                  Zhen Zuo and
                  Xiaojun Guo and
                  Xiaoyong Sun},
  title        = {Intrusion Detection of UAVs Based on the Deep Belief Network Optimized
                  by {PSO}},
  journal      = {Sensors},
  volume       = {19},
  number       = {24},
  pages        = {5529},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19245529},
  doi          = {10.3390/S19245529},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/TanSZGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HomoliakTOBHH19,
  author       = {Ivan Homoliak and
                  Martin Teknos and
                  Mart{\'{\i}}n Ochoa and
                  Dominik Breitenbacher and
                  Saeid Hosseini and
                  Petr Han{\'{a}}cek},
  title        = {Improving Network Intrusion Detection Classifiers by Non-payload-Based
                  Exploit-Independent Obfuscations: An Adversarial Approach},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {17},
  pages        = {e4},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.10-1-2019.156245},
  doi          = {10.4108/EAI.10-1-2019.156245},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/HomoliakTOBHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/KhanKK19,
  author       = {Muhammad Ashfaq Khan and
                  Md. Rezaul Karim and
                  Yangwoo Kim},
  title        = {A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM
                  Network},
  journal      = {Symmetry},
  volume       = {11},
  number       = {4},
  pages        = {583},
  year         = {2019},
  url          = {https://doi.org/10.3390/sym11040583},
  doi          = {10.3390/SYM11040583},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/KhanKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/Ye19,
  author       = {Kai Ye},
  title        = {Key Feature Recognition Algorithm of Network Intrusion Signal Based
                  on Neural Network and Support Vector Machine},
  journal      = {Symmetry},
  volume       = {11},
  number       = {3},
  pages        = {380},
  year         = {2019},
  url          = {https://doi.org/10.3390/sym11030380},
  doi          = {10.3390/SYM11030380},
  timestamp    = {Tue, 16 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/Ye19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/PajouhJKDC19,
  author       = {Hamed Haddad Pajouh and
                  Reza Javidan and
                  Raouf Khayami and
                  Ali Dehghantanha and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Two-Layer Dimension Reduction and Two-Tier Classification Model
                  for Anomaly-Based Intrusion Detection in IoT Backbone Networks},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {7},
  number       = {2},
  pages        = {314--323},
  year         = {2019},
  url          = {https://doi.org/10.1109/TETC.2016.2633228},
  doi          = {10.1109/TETC.2016.2633228},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/PajouhJKDC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YingSCBP19,
  author       = {Xuhang Ying and
                  Sang Uk Sagong and
                  Andrew Clark and
                  Linda Bushnell and
                  Radha Poovendran},
  title        = {Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion
                  Detection System in Controller Area Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {9},
  pages        = {2300--2314},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2895957},
  doi          = {10.1109/TIFS.2019.2895957},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YingSCBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics