Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "network-based intrusion"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/access/AlQuayedAH24, author = {Fatima Al{-}Quayed and Zulfiqar Ahmad and Mamoona Humayun}, title = {A Situation Based Predictive Approach for Cybersecurity Intrusion Detection and Prevention Using Machine Learning and Deep Learning Algorithms in Wireless Sensor Networks of Industry 4.0}, journal = {{IEEE} Access}, volume = {12}, pages = {34800--34819}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3372187}, doi = {10.1109/ACCESS.2024.3372187}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AlQuayedAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlshehriSAAA24, author = {Mohammed S. Alshehri and Oumaima Saidani and Fatma S. Alrayes and Saadullah Farooq Abbasi and Jawad Ahmad}, title = {A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection}, journal = {{IEEE} Access}, volume = {12}, pages = {45762--45772}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3380816}, doi = {10.1109/ACCESS.2024.3380816}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AlshehriSAAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CengizLDIK24, author = {Korhan Cengiz and Swati Lipsa and Ranjan Kumar Dash and Nikola Ivkovic and Mario Konecki}, title = {A Novel Intrusion Detection System Based on Artificial Neural Network and Genetic Algorithm With a New Dimensionality Reduction Technique for {UAV} Communication}, journal = {{IEEE} Access}, volume = {12}, pages = {4925--4937}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3349469}, doi = {10.1109/ACCESS.2024.3349469}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/CengizLDIK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DaiLJH24, author = {Wei Dai and Xinhui Li and Wenxin Ji and Sicheng He}, title = {Network Intrusion Detection Method Based on CNN-BiLSTM-Attention Model}, journal = {{IEEE} Access}, volume = {12}, pages = {53099--53111}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3384528}, doi = {10.1109/ACCESS.2024.3384528}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DaiLJH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HeZZL24, author = {Kan He and Wei Zhang and Xuejun Zong and Lian Lian}, title = {Network Intrusion Detection Based on Feature Image and Deformable Vision Transformer Classification}, journal = {{IEEE} Access}, volume = {12}, pages = {44335--44350}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3376434}, doi = {10.1109/ACCESS.2024.3376434}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HeZZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuMLL24, author = {Xuntao Hu and Xiancai Meng and Shaoqing Liu and Lizhen Liang}, title = {An Improved Algorithm for Network Intrusion Detection Based on Deep Residual Networks}, journal = {{IEEE} Access}, volume = {12}, pages = {66432--66441}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3398007}, doi = {10.1109/ACCESS.2024.3398007}, timestamp = {Sun, 19 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuMLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JiangFW24, author = {Tingyao Jiang and Xiaobo Fu and Min Wang}, title = {{BBO-CFAT:} Network Intrusion Detection Model Based on {BBO} Algorithm and Hierarchical Transformer}, journal = {{IEEE} Access}, volume = {12}, pages = {54191--54201}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3386405}, doi = {10.1109/ACCESS.2024.3386405}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JiangFW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RahmanKABIC24, author = {Khaista Rahman and Muhammad Asghar Khan and Fatemeh Afghah and Gordana Barb and Nisreen Innab and Tanveer Ahmed Cheema}, title = {An Efficient Authentication and Access Control Protocol for Securing {UAV} Networks Against Anomaly-Based Intrusion}, journal = {{IEEE} Access}, volume = {12}, pages = {62750--62764}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3395494}, doi = {10.1109/ACCESS.2024.3395494}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RahmanKABIC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SadiaFHSMBK24, author = {Halima Sadia and Saima Farhan and Yasin Ul Haq and Rabia Sana and Tariq Mahmood and Saeed Ali Omer Bahaj and Amjad Rehman Khan}, title = {Intrusion Detection System for Wireless Sensor Networks: {A} Machine Learning Based Approach}, journal = {{IEEE} Access}, volume = {12}, pages = {52565--52582}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3380014}, doi = {10.1109/ACCESS.2024.3380014}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SadiaFHSMBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ThankappanRG24, author = {Manesh Thankappan and Helena Rif{\`{a}}{-}Pous and Carles Garrigues}, title = {A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks}, journal = {{IEEE} Access}, volume = {12}, pages = {23096--23121}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3362803}, doi = {10.1109/ACCESS.2024.3362803}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ThankappanRG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TripathiSSV24, author = {Gaurav Tripathi and Vishal Krishna Singh and Varun Sharma and Majithia Vivek Vinodbhai}, title = {Weighted Feature Selection for Machine Learning Based Accurate Intrusion Detection in Communication Networks}, journal = {{IEEE} Access}, volume = {12}, pages = {20973--20982}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3362794}, doi = {10.1109/ACCESS.2024.3362794}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/TripathiSSV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/AliLY24, author = {Saqib Ali and Qianmu Li and Abdullah Yousafzai}, title = {Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey}, journal = {Ad Hoc Networks}, volume = {152}, pages = {103320}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2023.103320}, doi = {10.1016/J.ADHOC.2023.103320}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/AliLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/SarveshwaranPBGS24, author = {Velliangiri Sarveshwaran and Shanthini Pandiaraj and Garikapati Bindu and Vithya Ganesan and Iwin Thanakumar Joseph Swamidason}, title = {Binarized Spiking Neural Network with blockchain based intrusion detection framework for enhancing privacy and security in cloud computing environment}, journal = {Appl. Soft Comput.}, volume = {154}, pages = {111218}, year = {2024}, url = {https://doi.org/10.1016/j.asoc.2023.111218}, doi = {10.1016/J.ASOC.2023.111218}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/SarveshwaranPBGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/ShenCLSWY24, author = {Shigen Shen and Chenpeng Cai and Zhenwei Li and Yizhou Shen and Guowen Wu and Shui Yu}, title = {Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks}, journal = {Appl. Soft Comput.}, volume = {150}, pages = {111080}, year = {2024}, url = {https://doi.org/10.1016/j.asoc.2023.111080}, doi = {10.1016/J.ASOC.2023.111080}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/ShenCLSWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cas/VenkataswamyMK24, author = {Srinivas Byatarayanapura Venkataswamy and Indrajit Mandal and Seetharam Keshavarao}, title = {Virtual Machine Migration-Based Intrusion Detection System in Cloud Environment Using Deep Recurrent Neural Network}, journal = {Cybern. Syst.}, volume = {55}, number = {2}, pages = {450--470}, year = {2024}, url = {https://doi.org/10.1080/01969722.2022.2122008}, doi = {10.1080/01969722.2022.2122008}, timestamp = {Fri, 02 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cas/VenkataswamyMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/KumarK24, author = {Neeraj Kumar and Upendra Kumar}, title = {Artificial intelligence for classification and regression tree based feature selection method for network intrusion detection system in various telecommunication technologies}, journal = {Comput. Intell.}, volume = {40}, number = {1}, year = {2024}, url = {https://doi.org/10.1111/coin.12500}, doi = {10.1111/COIN.12500}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ci/KumarK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MohammedFF24, author = {Ahmed Burhan Mohammed and Lamia Chaari Fourati and Ahmed Fakhrudeen}, title = {Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security}, journal = {Comput. Networks}, volume = {239}, pages = {110140}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2023.110140}, doi = {10.1016/J.COMNET.2023.110140}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MohammedFF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/IoannouNABKMV24, author = {Iacovos Ioannou and Prabagarane Nagaradjane and Pelin Angin and Palaniappan Balasubramanian and Karthick Jeyagopal Kavitha and Palani Murugan and Vasos Vassiliou}, title = {{GEMLIDS-MIOT:} {A} Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening}, journal = {Comput. Commun.}, volume = {218}, pages = {209--239}, year = {2024}, url = {https://doi.org/10.1016/j.comcom.2024.02.023}, doi = {10.1016/J.COMCOM.2024.02.023}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/IoannouNABKMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/RoshanZH24, author = {Khushnaseeb Roshan and Aasim Zafar and Shiekh Burhan Ul Haque}, title = {Untargeted white-box adversarial attack with heuristic defence methods in real-time deep learning based network intrusion detection system}, journal = {Comput. Commun.}, volume = {218}, pages = {97--113}, year = {2024}, url = {https://doi.org/10.1016/j.comcom.2023.09.030}, doi = {10.1016/J.COMCOM.2023.09.030}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/RoshanZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RekaKRS24, author = {R. Reka and R. Karthick and R. Saravana Ram and Gurkirpal Singh}, title = {Multi head self-attention gated graph convolutional network based multi{\unicode{8209}}attack intrusion detection in {MANET}}, journal = {Comput. Secur.}, volume = {136}, pages = {103526}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103526}, doi = {10.1016/J.COSE.2023.103526}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RekaKRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangWZW24, author = {Zhongjun Yang and Qi Wang and Xuejun Zong and Guogang Wang}, title = {Intrusion detection method based on improved social network search algorithm}, journal = {Comput. Secur.}, volume = {140}, pages = {103781}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103781}, doi = {10.1016/J.COSE.2024.103781}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangWZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ChetouaneK24, author = {Ameni Chetouane and Kamel Karoui}, title = {Risk based intrusion detection system in software defined networking}, journal = {Concurr. Comput. Pract. Exp.}, volume = {36}, number = {9}, year = {2024}, url = {https://doi.org/10.1002/cpe.7988}, doi = {10.1002/CPE.7988}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/ChetouaneK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/KaurBR24, author = {Prabhjot Kaur and Shalini Batra and Prashant Singh Rana}, title = {Border-hunting optimization for mobile agent-based intrusion detection with deep convolutional neural network}, journal = {Concurr. Comput. Pract. Exp.}, volume = {36}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/cpe.7876}, doi = {10.1002/CPE.7876}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/KaurBR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/VibhuteKKPGPS24, author = {Amol D. Vibhute and Minhaj Khan and Anuradha Kanade and Chandrashekhar H. Patil and Sandeep V. Gaikwad and Kanubhai K. Patel and Jatinderkumar R. Saini}, title = {An LSTM-based novel near-real-time multiclass network intrusion detection system for complex cloud environments}, journal = {Concurr. Comput. Pract. Exp.}, volume = {36}, number = {11}, year = {2024}, url = {https://doi.org/10.1002/cpe.8024}, doi = {10.1002/CPE.8024}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/VibhuteKKPGPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eait/ShankarHCCP24, author = {S. Siva Shankar and Bui Thanh Hung and Prasun Chakrabarti and Tulika Chakrabarti and Gayatri Parasa}, title = {A novel optimization based deep learning with artificial intelligence approach to detect intrusion attack in network system}, journal = {Educ. Inf. Technol.}, volume = {29}, number = {4}, pages = {3859--3883}, year = {2024}, url = {https://doi.org/10.1007/s10639-023-11885-4}, doi = {10.1007/S10639-023-11885-4}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eait/ShankarHCCP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/NivaashiniESPB24, author = {Mathappan Nivaashini and Suganya Elavarasan and Sountharrajan Sehar and M. Prabu and Durga Prasad Bavirisetti}, title = {{FEDDBN-IDS:} federated deep belief network-based wireless network intrusion detection system}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {8}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00156-5}, doi = {10.1186/S13635-024-00156-5}, timestamp = {Sun, 26 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/NivaashiniESPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/DuzgunCUD24, author = {Berkant D{\"{u}}zg{\"{u}}n and Aykut {\c{C}}ayir and Ugur {\"{U}}nal and Hasan Dag}, title = {Network intrusion detection system by learning jointly from tabular and text-based features}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {41}, number = {4}, year = {2024}, url = {https://doi.org/10.1111/exsy.13518}, doi = {10.1111/EXSY.13518}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/es/DuzgunCUD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/DevendiranT24, author = {Ramkumar Devendiran and Anil V. Turukmane}, title = {Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy}, journal = {Expert Syst. Appl.}, volume = {245}, pages = {123027}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2023.123027}, doi = {10.1016/J.ESWA.2023.123027}, timestamp = {Sun, 26 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/DevendiranT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/ManocchioLLKSP24, author = {Liam Daly Manocchio and Siamak Layeghy and Wai Weng Lo and Gayan K. Kulatilleke and Mohanad Sarhan and Marius Portmann}, title = {FlowTransformer: {A} transformer framework for flow-based network intrusion detection systems}, journal = {Expert Syst. Appl.}, volume = {241}, pages = {122564}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2023.122564}, doi = {10.1016/J.ESWA.2023.122564}, timestamp = {Sun, 26 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/ManocchioLLKSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/SharmaSLR24, author = {Bhawana Sharma and Lokesh Sharma and Chhagan Lal and Satyabrata Roy}, title = {Explainable artificial intelligence for intrusion detection in IoT networks: {A} deep learning based approach}, journal = {Expert Syst. Appl.}, volume = {238}, number = {Part {A}}, pages = {121751}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2023.121751}, doi = {10.1016/J.ESWA.2023.121751}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/SharmaSLR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/WangJRLWZ24, author = {Qian Wang and Haiyang Jiang and Jiadong Ren and Han Liu and Xuehang Wang and Bing Zhang}, title = {An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network}, journal = {Expert Syst. Appl.}, volume = {244}, pages = {123014}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2023.123014}, doi = {10.1016/J.ESWA.2023.123014}, timestamp = {Sun, 26 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/WangJRLWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeenl/BaldiniS24, author = {Gianmarco Baldini and Kandeepan Sithamparanathan}, title = {Intrusion Detection System for {MIL-STD-1553} Based on Convolutional Neural Networks With Binary Images and Adaptive Quantization}, journal = {{IEEE} Netw. Lett.}, volume = {6}, number = {1}, pages = {50--54}, year = {2024}, url = {https://doi.org/10.1109/LNET.2023.3324508}, doi = {10.1109/LNET.2023.3324508}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeenl/BaldiniS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/Wu24, author = {Hongjiao Wu}, title = {Intrusion Detection Model for Wireless Sensor Networks Based on FedAvg and XGBoost Algorithm}, journal = {Int. J. Distributed Sens. Networks}, volume = {2024}, pages = {1--14}, year = {2024}, url = {https://doi.org/10.1155/2024/5536615}, doi = {10.1155/2024/5536615}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/Wu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AsadAG24, author = {H. Asad and S. Adhikari and Ilir Gashi}, title = {A perspective-retrospective analysis of diversity in signature-based open-source network intrusion detection systems}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {2}, pages = {1331--1346}, year = {2024}, url = {https://doi.org/10.1007/s10207-023-00794-9}, doi = {10.1007/S10207-023-00794-9}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AsadAG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijswis/ZhouS24, author = {Qi Zhou and Chun Shi}, title = {A Network Intrusion Detection Method for Various Information Systems Based on Federated and Deep Learning}, journal = {Int. J. Semantic Web Inf. Syst.}, volume = {20}, number = {1}, pages = {1--28}, year = {2024}, url = {https://doi.org/10.4018/ijswis.335495}, doi = {10.4018/IJSWIS.335495}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijswis/ZhouS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/SchrotterNS24, author = {Max Schr{\"{o}}tter and Andreas Niemann and Bettina Schnor}, title = {A Comparison of Neural-Network-Based Intrusion Detection against Signature-Based Detection in IoT Networks}, journal = {Inf.}, volume = {15}, number = {3}, pages = {164}, year = {2024}, url = {https://doi.org/10.3390/info15030164}, doi = {10.3390/INFO15030164}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/SchrotterNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YuZSWZYS24, author = {Shoujian Yu and Rong Zhai and Yizhou Shen and Guowen Wu and Hong Zhang and Shui Yu and Shigen Shen}, title = {Deep Q-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {7}, pages = {12536--12550}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3333903}, doi = {10.1109/JIOT.2023.3333903}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YuZSWZYS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbd/TalukderIUHSAM24, author = {Md. Alamin Talukder and Md. Manowarul Islam and Md. Ashraf Uddin and Khondokar Fida Hasan and Selina Sharmin and Salem A. Alyami and Mohammad Ali Moni}, title = {Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction}, journal = {J. Big Data}, volume = {11}, number = {1}, pages = {33}, year = {2024}, url = {https://doi.org/10.1186/s40537-024-00886-w}, doi = {10.1186/S40537-024-00886-W}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbd/TalukderIUHSAM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/LongYSZHC24, author = {Zhenyue Long and Huiru Yan and Guiquan Shen and Xiaolu Zhang and Haoyang He and Long Cheng}, title = {A Transformer-based network intrusion detection approach for cloud security}, journal = {J. Cloud Comput.}, volume = {13}, number = {1}, pages = {5}, year = {2024}, url = {https://doi.org/10.1186/s13677-023-00574-9}, doi = {10.1186/S13677-023-00574-9}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcloudc/LongYSZHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/DuY24, author = {Jiawei Du and Kai Yang}, title = {{NIDS-FLGDP:} Network Intrusion Detection Algorithm Based on Gaussian Differential Privacy Federated Learning}, journal = {J. Circuits Syst. Comput.}, volume = {33}, number = {3}, year = {2024}, url = {https://doi.org/10.1142/s0218126624500488}, doi = {10.1142/S0218126624500488}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsc/DuY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Deng24, author = {Yongsheng Deng}, title = {Design of Industrial IoT Intrusion Security Detection System Based on LightGBM Feature Algorithm and Multi-layer Perception Network}, journal = {J. Cyber Secur. Mobil.}, volume = {13}, number = {2}, pages = {327--348}, year = {2024}, url = {https://doi.org/10.13052/jcsm2245-1439.1327}, doi = {10.13052/JCSM2245-1439.1327}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Deng24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/SakthimohanDR24, author = {M. Sakthimohan and J. Deny and G. Elizabeth Rani}, title = {Secure deep learning-based energy efficient routing with intrusion detection system for wireless sensor networks}, journal = {J. Intell. Fuzzy Syst.}, volume = {46}, number = {4}, pages = {8587--8603}, year = {2024}, url = {https://doi.org/10.3233/jifs-235512}, doi = {10.3233/JIFS-235512}, timestamp = {Fri, 03 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/SakthimohanDR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/WangYCSLYW24, author = {Chia{-}Hung Wang and Qing Ye and Jiongbiao Cai and Yifan Suo and Shengming Lin and Jinchen Yuan and Xiaojing Wu}, title = {A novel data-driven integrated detection method for network intrusion classification based on multi-feature imbalanced data}, journal = {J. Intell. Fuzzy Syst.}, volume = {46}, number = {3}, pages = {5893--5910}, year = {2024}, url = {https://doi.org/10.3233/jifs-234402}, doi = {10.3233/JIFS-234402}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/WangYCSLYW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/XieC24, author = {Ying Xie and Hong Chen}, title = {A novel method for effective intrusion detection based on convolutional speaking neural networks}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {36}, number = {2}, pages = {101975}, year = {2024}, url = {https://doi.org/10.1016/j.jksuci.2024.101975}, doi = {10.1016/J.JKSUCI.2024.101975}, timestamp = {Sat, 23 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/XieC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/ZhangCZHGYF24, author = {Jiawei Zhang and Rui Chen and Yanchun Zhang and Weihong Han and Zhaoquan Gu and Shuqiang Yang and Yongquan Fu}, title = {{MF2POSE:} Multi-task Feature Fusion Pseudo-Siamese Network for intrusion detection using Category-distance Promotion Loss}, journal = {Knowl. Based Syst.}, volume = {283}, pages = {111110}, year = {2024}, url = {https://doi.org/10.1016/j.knosys.2023.111110}, doi = {10.1016/J.KNOSYS.2023.111110}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/ZhangCZHGYF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/Ravi24, author = {Vinayakumar Ravi}, title = {Deep learning-based network intrusion detection in smart healthcare enterprise systems}, journal = {Multim. Tools Appl.}, volume = {83}, number = {13}, pages = {39097--39115}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-17300-x}, doi = {10.1007/S11042-023-17300-X}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/Ravi24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/SaravananMRSRB24, author = {V. Saravanan and M. Madiajagan and Shaik Mohammad Rafee and P. Sanju and Tasneem Bano Rehman and Pattanaik Balachandra}, title = {IoT-based blockchain intrusion detection using optimized recurrent neural network}, journal = {Multim. Tools Appl.}, volume = {83}, number = {11}, pages = {31505--31526}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-16662-6}, doi = {10.1007/S11042-023-16662-6}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/SaravananMRSRB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcs/ChatzimiltisSMT24, author = {Sotiris Chatzimiltis and Mohammad Shojafar and Mahdi Boloursaz Mashhadi and Rahim Tafazolli}, title = {A Collaborative Software Defined Network-Based Smart Grid Intrusion Detection System}, journal = {{IEEE} Open J. Commun. Soc.}, volume = {5}, pages = {700--711}, year = {2024}, url = {https://doi.org/10.1109/OJCOMS.2024.3351088}, doi = {10.1109/OJCOMS.2024.3351088}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ojcs/ChatzimiltisSMT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiLYY24, author = {Longlong Li and Yuliang Lu and Guozheng Yang and Xuehu Yan}, title = {End-to-End Network Intrusion Detection Based on Contrastive Learning}, journal = {Sensors}, volume = {24}, number = {7}, pages = {2122}, year = {2024}, url = {https://doi.org/10.3390/s24072122}, doi = {10.3390/S24072122}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LiLYY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/MedinaArcoMRG24, author = {Joaqu{\'{\i}}n Gaspar Medina{-}Arco and Roberto Mag{\'{a}}n{-}Carri{\'{o}}n and Rafael Alejandro Rodr{\'{\i}}guez{-}G{\'{o}}mez and Pedro Garc{\'{\i}}a{-}Teodoro}, title = {Methodology for the Detection of Contaminated Training Datasets for Machine Learning-Based Network Intrusion-Detection Systems}, journal = {Sensors}, volume = {24}, number = {2}, pages = {479}, year = {2024}, url = {https://doi.org/10.3390/s24020479}, doi = {10.3390/S24020479}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/MedinaArcoMRG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZengZZDW24, author = {Yiming Zeng and Jianwei Zhang and Yuzhong Zhong and Lin Deng and Maoning Wang}, title = {STNet: {A} Time-Frequency Analysis-Based Intrusion Detection Network for Distributed Optical Fiber Acoustic Sensing Systems}, journal = {Sensors}, volume = {24}, number = {5}, pages = {1570}, year = {2024}, url = {https://doi.org/10.3390/s24051570}, doi = {10.3390/S24051570}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ZengZZDW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/CiricMSM24, author = {Vladimir M. Ciric and Marija S. Milosevic and Danijel Sokolovic and Ivan Z. Milentijevic}, title = {Modular deep learning-based network intrusion detection architecture for real-world cyber-attack simulation}, journal = {Simul. Model. Pract. Theory}, volume = {133}, pages = {102916}, year = {2024}, url = {https://doi.org/10.1016/j.simpat.2024.102916}, doi = {10.1016/J.SIMPAT.2024.102916}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simpra/CiricMSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/suscom/KristiantoLH24, author = {Edy Kristianto and Po{-}Ching Lin and Ren{-}Hung Hwang}, title = {Sustainable and lightweight domain-based intrusion detection system for in-vehicle network}, journal = {Sustain. Comput. Informatics Syst.}, volume = {41}, pages = {100936}, year = {2024}, url = {https://doi.org/10.1016/j.suscom.2023.100936}, doi = {10.1016/J.SUSCOM.2023.100936}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/suscom/KristiantoLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/UllahSUYZ24, author = {Farhan Ullah and Gautam Srivastava and Shamsher Ullah and Kenji Yoshigoe and Yue Zhao}, title = {{NIDS-VSB:} Network Intrusion Detection System for {VANET} Using Spark-Based Big Data Optimization and Transfer Learning}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {70}, number = {1}, pages = {1798--1809}, year = {2024}, url = {https://doi.org/10.1109/TCE.2023.3328320}, doi = {10.1109/TCE.2023.3328320}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/UllahSUYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YanLZWLZLL24, author = {Haonan Yan and Xiaoguang Li and Wenjing Zhang and Rui Wang and Hui Li and Xingwen Zhao and Fenghua Li and Xiaodong Lin}, title = {Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {153--167}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3247585}, doi = {10.1109/TDSC.2023.3247585}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YanLZWLZLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DengLXQ24, author = {Zhouyan Deng and Jiajia Liu and Yijie Xun and Junman Qin}, title = {IdentifierIDS: {A} Practical Voltage-Based Intrusion Detection System for Real In-Vehicle Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {661--676}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3327026}, doi = {10.1109/TIFS.2023.3327026}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DengLXQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DingSHSC24, author = {Hongwei Ding and Yu Sun and Nana Huang and Zhidong Shen and Xiaohui Cui}, title = {{TMG-GAN:} Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1156--1167}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3331240}, doi = {10.1109/TIFS.2023.3331240}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DingSHSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangLJLLL24, author = {Xiangming Wang and Yang Liu and Kexin Jiao and Pengfei Liu and Xiapu Luo and Ting Liu}, title = {Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group Fingerprint}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4012--4027}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3374596}, doi = {10.1109/TIFS.2024.3374596}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangLJLLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/AliUSKKGANOH24, author = {Bakht Sher Ali and Inam Ullah and Tamara Al Shloul and Izhar Ahmed Khan and Ijaz Khan and Yazeed Yasin Ghadi and Akmalbek Abdusalomov and Rashid Nasimov and Khmaies Ouahada and Habib Hamam}, title = {{ICS-IDS:} application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in {ICS} networks}, journal = {J. Supercomput.}, volume = {80}, number = {6}, pages = {7876--7905}, year = {2024}, url = {https://doi.org/10.1007/s11227-023-05764-5}, doi = {10.1007/S11227-023-05764-5}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/AliUSKKGANOH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/JeongLLK24, author = {Seonghoon Jeong and Sangho Lee and Hwejae Lee and Huy Kang Kim}, title = {{X-CANIDS:} Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {73}, number = {3}, pages = {3230--3246}, year = {2024}, url = {https://doi.org/10.1109/TVT.2023.3327275}, doi = {10.1109/TVT.2023.3327275}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/JeongLLK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/BhuttaMM24, author = {Areeb Ahmed Bhutta and Mehr{-}Un{-}Nisa and Adnan Noor Mian}, title = {Lightweight real-time WiFi-based intrusion detection system using LightGBM}, journal = {Wirel. Networks}, volume = {30}, number = {2}, pages = {749--761}, year = {2024}, url = {https://doi.org/10.1007/s11276-023-03516-0}, doi = {10.1007/S11276-023-03516-0}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/winet/BhuttaMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/DandapatM24, author = {Asimkiran Dandapat and Bhaskar Mondal}, title = {Design of Intrusion Detection System Using {GA} and {CNN} for MQTT-Based IoT Networks}, journal = {Wirel. Pers. Commun.}, volume = {134}, number = {4}, pages = {2059--2082}, year = {2024}, url = {https://doi.org/10.1007/s11277-024-10984-w}, doi = {10.1007/S11277-024-10984-W}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/DandapatM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/GuptaKJ24, author = {Chetan Gupta and Amit Kumar and Neelesh Kumar Jain}, title = {An Enhanced Hybrid Intrusion Detection Based on Crow Search Analysis Optimizations and Artificial Neural Network}, journal = {Wirel. Pers. Commun.}, volume = {134}, number = {1}, pages = {43--68}, year = {2024}, url = {https://doi.org/10.1007/s11277-024-10880-3}, doi = {10.1007/S11277-024-10880-3}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/GuptaKJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpits/ZamriiVS24, author = {Iryna Zamrii and Viktor Vyshnivskyi and Valentyn Sobchuk}, editor = {Volodymyr Sokolov and Vasyl Ustimenko and Tamara Radivilova and Mariya Nazarkevych}, title = {Method of Ensuring the Functional Stability of the Information System based on Detection of Intrusions and Reconfiguration of Virtual Networks}, booktitle = {Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems {(CPITS} 2024), Kyiv, Ukraine, February 28, 2024 (online)}, series = {{CEUR} Workshop Proceedings}, volume = {3654}, pages = {252--264}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3654/paper21.pdf}, timestamp = {Thu, 11 Apr 2024 17:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cpits/ZamriiVS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/giis/JiaoM24, author = {Qihang Jiao and Lotfi Mhamdi}, title = {Deep Learning based Intrusion Detection for IoT Networks}, booktitle = {Global Information Infrastructure and Networking Symposium, {GIIS} 2024, Dubai, United Arab Emirates, February 19-21, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/GIIS59465.2024.10449910}, doi = {10.1109/GIIS59465.2024.10449910}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/giis/JiaoM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SyneCH24, author = {Lamine Syne and Pino Caballero{-}Gil and Candelaria Hern{\'{a}}ndez{-}Goya}, editor = {Jiman Hong and Juw Won Park}, title = {Improving Privacy in Federated Learning-Based Intrusion Detection for IoT Networks}, booktitle = {Proceedings of the 39th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2024, Avila, Spain, April 8-12, 2024}, pages = {580--583}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3605098.3636183}, doi = {10.1145/3605098.3636183}, timestamp = {Wed, 22 May 2024 10:31:05 +0200}, biburl = {https://dblp.org/rec/conf/sac/SyneCH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-10207, author = {Jesse Ables and Nathaniel Childers and William Anderson and Sudip Mittal and Shahram Rahimi and Ioana Banicescu and Maria Seale}, title = {Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems}, journal = {CoRR}, volume = {abs/2401.10207}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.10207}, doi = {10.48550/ARXIV.2401.10207}, eprinttype = {arXiv}, eprint = {2401.10207}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-10207.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-10691, author = {Hangsheng Zhang and Dongqi Han and Yinlong Liu and Zhiliang Wang and Jiyan Sun and Shangyuan Zhuang and Jiqiang Liu and Jinsong Dong}, title = {Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors}, journal = {CoRR}, volume = {abs/2401.10691}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.10691}, doi = {10.48550/ARXIV.2401.10691}, eprinttype = {arXiv}, eprint = {2401.10691}, timestamp = {Fri, 02 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-10691.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-11968, author = {Jiyuan Shen and Wenzhuo Yang and Zhaowei Chu and Jiani Fan and Dusit Niyato and Kwok{-}Yan Lam}, title = {Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning}, journal = {CoRR}, volume = {abs/2401.11968}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.11968}, doi = {10.48550/ARXIV.2401.11968}, eprinttype = {arXiv}, eprint = {2401.11968}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-11968.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-12262, author = {Md. Alamin Talukder and Md. Manowarul Islam and Md. Ashraf Uddin and Khondokar Fida Hasan and Selina Sharmin and Salem A. Alyami and Mohammad Ali Moni}, title = {Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction}, journal = {CoRR}, volume = {abs/2401.12262}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.12262}, doi = {10.48550/ARXIV.2401.12262}, eprinttype = {arXiv}, eprint = {2401.12262}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-12262.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-14037, author = {Moutaz Alazab and Ruba Abu Khurma and Pedro A. Castillo and Bilal Abu{-}Salih and Alejandro Mart{\'{\i}}n and David Camacho}, title = {An Effective Networks Intrusion Detection Approach Based on Hybrid Harris Hawks and Multi-Layer Perceptron}, journal = {CoRR}, volume = {abs/2402.14037}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.14037}, doi = {10.48550/ARXIV.2402.14037}, eprinttype = {arXiv}, eprint = {2402.14037}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-14037.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-11830, author = {Andrea Venturi and Dario Stabili and Mirco Marchetti}, title = {Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks}, journal = {CoRR}, volume = {abs/2403.11830}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.11830}, doi = {10.48550/ARXIV.2403.11830}, eprinttype = {arXiv}, eprint = {2403.11830}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-11830.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Das23, author = {Tapadhir Das}, title = {Modeling the Abnormality: Machine Learning-based Anomaly and Intrusion Detection in Software-defined Networks}, school = {University of Nevada, Reno, {USA}}, year = {2023}, url = {http://hdl.handle.net/11714/10016}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Das23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/tr/Almamoori23, author = {Zainab Ali Abbood Almamoori}, title = {Embedding intrusion detection in distributed computing artificial intelligence-based routing in {AD} {HOC} networks {()}}, school = {Alt{\i}nba{\c{s}} University, Turkey}, year = {2023}, url = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=2Gr9rGfDEtLbkTrmoaOWsg\&no=u8zNLtshUs6QOFE5E3sEkw}, timestamp = {Sun, 29 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/tr/Almamoori23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlmorabeaKAHA23, author = {Omar Mohammed Almorabea and Tariq Jamil Saifullah Khanzada and Muhammad Ahtisham Aslam and Fatheah A. Hendi and Ahmad Mohammed Almorabea}, title = {IoT Network-Based Intrusion Detection Framework: {A} Solution to Process Ping Floods Originating From Embedded Devices}, journal = {{IEEE} Access}, volume = {11}, pages = {119118--119145}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3327061}, doi = {10.1109/ACCESS.2023.3327061}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AlmorabeaKAHA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DongWL23, author = {Chen Dong and Hao Wu and Qingyuan Li}, title = {Multiple Observation HMM-Based {CAN} Bus Intrusion Detection System for In-Vehicle Network}, journal = {{IEEE} Access}, volume = {11}, pages = {35639--35648}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3265018}, doi = {10.1109/ACCESS.2023.3265018}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DongWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DuYHJ23, author = {Jiawei Du and Kai Yang and Yanjing Hu and Lingjie Jiang}, title = {{NIDS-CNNLSTM:} Network Intrusion Detection Classification Model Based on Deep Learning}, journal = {{IEEE} Access}, volume = {11}, pages = {24808--24821}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3254915}, doi = {10.1109/ACCESS.2023.3254915}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DuYHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhatriLN23, author = {Narayan Khatri and Sihyung Lee and Seung Yeob Nam}, title = {Transfer Learning-Based Intrusion Detection System for a Controller Area Network}, journal = {{IEEE} Access}, volume = {11}, pages = {120963--120982}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3328182}, doi = {10.1109/ACCESS.2023.3328182}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KhatriLN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuHLRYX23, author = {Zhipeng Liu and Junyi Hu and Yang Liu and Kaushik Roy and Xiaohong Yuan and Jinsheng Xu}, title = {Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network}, journal = {{IEEE} Access}, volume = {11}, pages = {91116--91132}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3307463}, doi = {10.1109/ACCESS.2023.3307463}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LiuHLRYX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LucasFTASBPC23, author = {Thiago Jos{\'{e}} Lucas and Ina{\^{e}} Soares de Figueiredo and Carlos Alexandre Carvalho Tojeiro and Alex Marino Gon{\c{c}}alves de Almeida and Rafal Scherer and Jos{\'{e}} Remo Ferreira Brega and Jo{\~{a}}o Paulo Papa and Kelton Augusto Pontara da Costa}, title = {A Comprehensive Survey on Ensemble Learning-Based Intrusion Detection Approaches in Computer Networks}, journal = {{IEEE} Access}, volume = {11}, pages = {122638--122676}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3328535}, doi = {10.1109/ACCESS.2023.3328535}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LucasFTASBPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MirsadeghiBVI23, author = {Seyed Mohammad Hadi Mirsadeghi and Hayretdin Bahsi and Risto Vaarandi and Wissem Inoubli}, title = {Learning From Few Cyber-Attacks: Addressing the Class Imbalance Problem in Machine Learning-Based Intrusion Detection in Software-Defined Networking}, journal = {{IEEE} Access}, volume = {11}, pages = {140428--140442}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3341755}, doi = {10.1109/ACCESS.2023.3341755}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MirsadeghiBVI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NayakB23, author = {Nanavath Kiran Singh Nayak and Budhaditya Bhattacharyya}, title = {{MAC} Protocol Based IoT Network Intrusion Detection Using Improved Efficient Shuffle Bidirectional {COOT} Channel Attention Network}, journal = {{IEEE} Access}, volume = {11}, pages = {77385--77402}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3299031}, doi = {10.1109/ACCESS.2023.3299031}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/NayakB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NguyenNK23, author = {Trieu Phong Nguyen and Heungwoo Nam and Daehee Kim}, title = {Transformer-Based Attention Network for In-Vehicle Intrusion Detection}, journal = {{IEEE} Access}, volume = {11}, pages = {55389--55403}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3282110}, doi = {10.1109/ACCESS.2023.3282110}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/NguyenNK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/UllahBKA23, author = {Safi Ullah and Wadii Boulila and Anis Koub{\^{a}}a and Jawad Ahmad}, title = {{MAGRU-IDS:} {A} Multi-Head Attention-Based Gated Recurrent Unit for Intrusion Detection in IIoT Networks}, journal = {{IEEE} Access}, volume = {11}, pages = {114590--114601}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3324657}, doi = {10.1109/ACCESS.2023.3324657}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/UllahBKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangG23a, author = {Zhen Wang and Fuad A. Ghaleb}, title = {An Attention-Based Convolutional Neural Network for Intrusion Detection Model}, journal = {{IEEE} Access}, volume = {11}, pages = {43116--43127}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3271408}, doi = {10.1109/ACCESS.2023.3271408}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangG23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YuKXY23, author = {Hongchen Yu and Chunying Kang and Yao Xiao and Yuting Yang}, title = {Network Intrusion Detection Method Based on Hybrid Improved Residual Network Blocks and Bidirectional Gated Recurrent Units}, journal = {{IEEE} Access}, volume = {11}, pages = {68961--68971}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3271866}, doi = {10.1109/ACCESS.2023.3271866}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YuKXY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZouLZYW23, author = {Li Zou and Xuemei Luo and Yan Zhang and Xiao Yang and Xiangwen Wang}, title = {{HC-DTTSVM:} {A} Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering}, journal = {{IEEE} Access}, volume = {11}, pages = {21404--21416}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3251354}, doi = {10.1109/ACCESS.2023.3251354}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZouLZYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/accs/KalininT23, author = {Maxim O. Kalinin and E. I. Tkacheva}, title = {A Decentralized Approach to Intrusion Detection in Dynamic Networks of the Internet of Things Based on Multiagent Reinforcement Learning with Interagent Interaction}, journal = {Autom. Control. Comput. Sci.}, volume = {57}, number = {8}, pages = {1025--1032}, year = {2023}, url = {https://doi.org/10.3103/S0146411623080096}, doi = {10.3103/S0146411623080096}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/accs/KalininT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/OrsL23, author = {Faik Kerem {\"{O}}rs and Albert Levi}, title = {Data driven intrusion detection for 6LoWPAN based IoT systems}, journal = {Ad Hoc Networks}, volume = {143}, pages = {103120}, year = {2023}, url = {https://doi.org/10.1016/j.adhoc.2023.103120}, doi = {10.1016/J.ADHOC.2023.103120}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/OrsL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aghcs/PandeK23, author = {Sagar Pande and Aditya Khamparia}, title = {Explainable Deep Neural Network based Analysis on Intrusion Detection Systems}, journal = {Comput. Sci.}, volume = {24}, number = {1}, year = {2023}, url = {https://doi.org/10.7494/csci.2023.24.1.4551}, doi = {10.7494/CSCI.2023.24.1.4551}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aghcs/PandeK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithms/LiMS23, author = {Xue Jun Li and Maode Ma and Yihan Sun}, title = {An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers for Intrusion Detection in Smart Grids}, journal = {Algorithms}, volume = {16}, number = {6}, pages = {288}, year = {2023}, url = {https://doi.org/10.3390/a16060288}, doi = {10.3390/A16060288}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithms/LiMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/HeWSXC23, author = {Jiaxing He and Xiaodan Wang and Yafei Song and Qian Xiang and Chen Chen}, title = {Network intrusion detection based on conditional wasserstein variational autoencoder with generative adversarial network and one-dimensional convolutional neural networks}, journal = {Appl. Intell.}, volume = {53}, number = {10}, pages = {12416--12436}, year = {2023}, url = {https://doi.org/10.1007/s10489-022-03995-2}, doi = {10.1007/S10489-022-03995-2}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apin/HeWSXC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/LanLLZ23, author = {Jinghong Lan and Xudong Liu and Bo Li and Jun Zhao}, title = {A novel hierarchical attention-based triplet network with unsupervised domain adaptation for network intrusion detection}, journal = {Appl. Intell.}, volume = {53}, number = {10}, pages = {11705--11726}, year = {2023}, url = {https://doi.org/10.1007/s10489-022-04076-0}, doi = {10.1007/S10489-022-04076-0}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/LanLLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/PrasadTD23, author = {Mahendra Prasad and Sachin Tripathi and Keshav P. Dahal}, title = {A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network}, journal = {Appl. Intell.}, volume = {53}, number = {6}, pages = {7169--7185}, year = {2023}, url = {https://doi.org/10.1007/s10489-022-03763-2}, doi = {10.1007/S10489-022-03763-2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apin/PrasadTD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/XiaoYZCL23, author = {Junchao Xiao and Lin Yang and Fuli Zhong and Hongbo Chen and Xiangxue Li}, title = {Robust anomaly-based intrusion detection system for in-vehicle network by graph neural network framework}, journal = {Appl. Intell.}, volume = {53}, number = {3}, pages = {3183--3206}, year = {2023}, url = {https://doi.org/10.1007/s10489-022-03412-8}, doi = {10.1007/S10489-022-03412-8}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apin/XiaoYZCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/array/HossainI23, author = {Md. Alamgir Hossain and Md. Saiful Islam}, title = {Ensuring network security with a robust intrusion detection system using ensemble-based machine learning}, journal = {Array}, volume = {19}, pages = {100306}, year = {2023}, url = {https://doi.org/10.1016/j.array.2023.100306}, doi = {10.1016/J.ARRAY.2023.100306}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/array/HossainI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/MohammadianGL23, author = {Hesamodin Mohammadian and Ali A. Ghorbani and Arash Habibi Lashkari}, title = {A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems}, journal = {Appl. Soft Comput.}, volume = {137}, pages = {110173}, year = {2023}, url = {https://doi.org/10.1016/j.asoc.2023.110173}, doi = {10.1016/J.ASOC.2023.110173}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/MohammadianGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bspc/Patel23, author = {Sagarkumar K. Patel}, title = {Improving intrusion detection in cloud-based healthcare using neural network}, journal = {Biomed. Signal Process. Control.}, volume = {83}, pages = {104680}, year = {2023}, url = {https://doi.org/10.1016/j.bspc.2023.104680}, doi = {10.1016/J.BSPC.2023.104680}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bspc/Patel23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cas/SontakkeC23, author = {Prakash Vijay Sontakke and Nilkanth B. Chopade}, title = {Optimized Deep Neural Model-Based Intrusion Detection and Mitigation System for Vehicular Ad-Hoc Network}, journal = {Cybern. Syst.}, volume = {54}, number = {7}, pages = {985--1013}, year = {2023}, url = {https://doi.org/10.1080/01969722.2022.2137643}, doi = {10.1080/01969722.2022.2137643}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cas/SontakkeC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/CaoWDZL23, author = {Yongzhong Cao and Zhihui Wang and Hongwei Ding and Jiale Zhang and Bin Li}, title = {An intrusion detection system based on stacked ensemble learning for IoT network}, journal = {Comput. Electr. Eng.}, volume = {110}, pages = {108836}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108836}, doi = {10.1016/J.COMPELECENG.2023.108836}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/CaoWDZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LayeghyP23, author = {Siamak Layeghy and Marius Portmann}, title = {Explainable Cross-domain Evaluation of ML-based Network Intrusion Detection Systems}, journal = {Comput. Electr. Eng.}, volume = {108}, pages = {108692}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108692}, doi = {10.1016/J.COMPELECENG.2023.108692}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/LayeghyP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/PingaleS23, author = {Subhash V. Pingale and Sanjay R. Sutar}, title = {Remora based Deep Maxout Network model for network intrusion detection using Convolutional Neural Network features}, journal = {Comput. Electr. Eng.}, volume = {110}, pages = {108831}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108831}, doi = {10.1016/J.COMPELECENG.2023.108831}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/PingaleS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/SharmaSLR23, author = {Bhawana Sharma and Lokesh Sharma and Chhagan Lal and Satyabrata Roy}, title = {Anomaly based network intrusion detection for IoT attacks using deep learning technique}, journal = {Comput. Electr. Eng.}, volume = {107}, pages = {108626}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108626}, doi = {10.1016/J.COMPELECENG.2023.108626}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/SharmaSLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/Song23, author = {Yuqiao Song}, title = {Public cloud network intrusion and internet legal supervision based on abnormal feature detection}, journal = {Comput. Electr. Eng.}, volume = {112}, pages = {109015}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.109015}, doi = {10.1016/J.COMPELECENG.2023.109015}, timestamp = {Mon, 01 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/Song23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/Wang23, author = {Man Wang}, title = {Optimization of Network Security in University Laboratories Based on Anomaly Intrusion Detection in Public Cloud Networks}, journal = {Comput. Electr. Eng.}, volume = {111}, number = {Part {B}}, pages = {108968}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108968}, doi = {10.1016/J.COMPELECENG.2023.108968}, timestamp = {Wed, 22 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/Wang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Li23, author = {Long Li}, title = {A Network Intrusion Detection Model Based on GA-Improved {NSA}}, journal = {J. Comput. Inf. Technol.}, volume = {31}, number = {2}, pages = {91--106}, year = {2023}, url = {http://cit.fer.hr/index.php/CIT/article/view/5737}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cit/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/SantosGRM23, author = {Leonel Santos and Ramiro Gon{\c{c}}alves and Carlos Rabad{\~{a}}o and Jos{\'{e}} Martins}, title = {A flow-based intrusion detection framework for internet of things networks}, journal = {Clust. Comput.}, volume = {26}, number = {1}, pages = {37--57}, year = {2023}, url = {https://doi.org/10.1007/s10586-021-03238-y}, doi = {10.1007/S10586-021-03238-Y}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/SantosGRM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/BugshanKKA23, author = {Neda Bugshan and Ibrahim Khalil and Aditya Pribadi Kalapaaking and Mohammed Atiquzzaman}, title = {Intrusion Detection-Based Ensemble Learning and Microservices for Zero Touch Networks}, journal = {{IEEE} Commun. Mag.}, volume = {61}, number = {6}, pages = {86--92}, year = {2023}, url = {https://doi.org/10.1109/MCOM.001.2200535}, doi = {10.1109/MCOM.001.2200535}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/BugshanKKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MabroukN23, author = {Abdelfettah Mabrouk and Assia Naja}, title = {Intrusion detection game for ubiquitous security in vehicular networks: {A} signaling game based approach}, journal = {Comput. Networks}, volume = {225}, pages = {109649}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109649}, doi = {10.1016/J.COMNET.2023.109649}, timestamp = {Sun, 02 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MabroukN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/OliveiraGMJGOF23, author = {Jonathas A. de Oliveira and Vin{\'{\i}}cius P. Gon{\c{c}}alves and Rodolfo Ipolito Meneguette and Rafael Tim{\'{o}}teo de Sousa J{\'{u}}nior and Daniel L. Guidoni and Jos{\'{e}} C. M. Oliveira and Geraldo P. Rocha Filho}, title = {{F-NIDS} - {A} Network Intrusion Detection System based on federated learning}, journal = {Comput. Networks}, volume = {236}, pages = {110010}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.110010}, doi = {10.1016/J.COMNET.2023.110010}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/OliveiraGMJGOF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SyedGB23, author = {Naeem Firdous Syed and Mengmeng Ge and Zubair A. Baig}, title = {Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection for IoT networks}, journal = {Comput. Networks}, volume = {225}, pages = {109662}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109662}, doi = {10.1016/J.COMNET.2023.109662}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SyedGB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/UllahAKABKJC23, author = {Safi Ullah and Jawad Ahmad and Muazzam Ali Khan and Mohammed S. Alshehri and Wadii Boulila and Anis Koubaa and Sana Ullah Jan and M. Munawwar Iqbal Ch}, title = {{TNN-IDS:} Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks}, journal = {Comput. Networks}, volume = {237}, pages = {110072}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.110072}, doi = {10.1016/J.COMNET.2023.110072}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/UllahAKABKJC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Kasongo23, author = {Sydney Mambwe Kasongo}, title = {A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework}, journal = {Comput. Commun.}, volume = {199}, pages = {113--125}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2022.12.010}, doi = {10.1016/J.COMCOM.2022.12.010}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Kasongo23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/MaheswariSN23, author = {K. G. Maheswari and C. Siva and G. NaliniPriya}, title = {Optimal cluster based feature selection for intrusion detection system in web and cloud computing environment using hybrid teacher learning optimization enables deep recurrent neural network}, journal = {Comput. Commun.}, volume = {202}, pages = {145--153}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2023.02.003}, doi = {10.1016/J.COMCOM.2023.02.003}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/MaheswariSN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HanCLZJL23, author = {Xueying Han and Susu Cui and Song Liu and Chen Zhang and Bo Jiang and Zhigang Lu}, title = {Network intrusion detection based on n-gram frequency and time-aware transformer}, journal = {Comput. Secur.}, volume = {128}, pages = {103171}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103171}, doi = {10.1016/J.COSE.2023.103171}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HanCLZJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangZGWLZ23, author = {Jia{-}Cheng Huang and Guo{-}Qiang Zeng and Guang{-}Gang Geng and Jian Weng and Kang{-}Di Lu and Yu Zhang}, title = {Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems}, journal = {Comput. Secur.}, volume = {132}, pages = {103310}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103310}, doi = {10.1016/J.COSE.2023.103310}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuangZGWLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LopesZAALRP23, author = {Ivandro Ortet Lopes and Deqing Zou and Ihsan H. Abdulqadder and Saeed Akbar and Zhen Li and Francis A. Ruambo and Wagner Pereira}, title = {Network intrusion detection based on the temporal convolutional model}, journal = {Comput. Secur.}, volume = {135}, pages = {103465}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103465}, doi = {10.1016/J.COSE.2023.103465}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LopesZAALRP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PandeyVARV23, author = {Bishwajeet K. Pandey and M. R. M. VeeraManickam and Shabeer Ahmad and Ciro Rodriguez Rodriguez and Doris Esenarro Vargas}, title = {ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based Deep maxout network for intrusion detection using big data in cloud computing framework}, journal = {Comput. Secur.}, volume = {124}, pages = {102975}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102975}, doi = {10.1016/J.COSE.2022.102975}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PandeyVARV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SantosVST23, author = {Roger Robson dos Santos and Eduardo K. Viegas and Altair O. Santin and Pietro Tedeschi}, title = {Federated learning for reliable model updates in network-based intrusion detection}, journal = {Comput. Secur.}, volume = {133}, pages = {103413}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103413}, doi = {10.1016/J.COSE.2023.103413}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SantosVST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TsengC23, author = {Chinyang Henry Tseng and Ya{-}Ting Chang}, title = {{EBDM:} Ensemble binary detection models for multi-class wireless intrusion detection based on deep neural network}, journal = {Comput. Secur.}, volume = {133}, pages = {103419}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103419}, doi = {10.1016/J.COSE.2023.103419}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TsengC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/Awajan23, author = {Albara W. Awajan}, title = {A Novel Deep Learning-Based Intrusion Detection System for IoT Networks}, journal = {Comput.}, volume = {12}, number = {2}, pages = {34}, year = {2023}, url = {https://doi.org/10.3390/computers12020034}, doi = {10.3390/COMPUTERS12020034}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/Awajan23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/WangYGW23, author = {Minxiao Wang and Ning Yang and Dulaj Gunasinghe and Ning Weng}, title = {On the Robustness of ML-Based Network Intrusion Detection Systems: An Adversarial and Distribution Shift Perspective}, journal = {Comput.}, volume = {12}, number = {10}, pages = {209}, year = {2023}, url = {https://doi.org/10.3390/computers12100209}, doi = {10.3390/COMPUTERS12100209}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computers/WangYGW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/AlzahraniA23, author = {Abdulsalam O. Alzahrani and Mohammed J. F. Alenazi}, title = {{ML-IDSDN:} Machine learning based intrusion detection system for software-defined network}, journal = {Concurr. Comput. Pract. Exp.}, volume = {35}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/cpe.7438}, doi = {10.1002/CPE.7438}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/AlzahraniA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/NarengbamD23, author = {Lenin Narengbam and Shouvik Dey}, title = {Harris hawk optimization trained artificial neural network for anomaly based intrusion detection system}, journal = {Concurr. Comput. Pract. Exp.}, volume = {35}, number = {23}, year = {2023}, url = {https://doi.org/10.1002/cpe.7771}, doi = {10.1002/CPE.7771}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/NarengbamD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/SiddharthanT23, author = {Hariprasad Siddharthan and Deepa Thangavel}, title = {A novel framework approach for intrusion detection based on improved critical feature selection in Internet of Things networks}, journal = {Concurr. Comput. Pract. Exp.}, volume = {35}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/cpe.7445}, doi = {10.1002/CPE.7445}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/SiddharthanT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/VarmaRV23, author = {P. Ravi Kiran Varma and Sathiya R. R and M. Vanitha}, title = {Enhanced Elman spike neural network based intrusion attack detection in software defined Internet of Things network}, journal = {Concurr. Comput. Pract. Exp.}, volume = {35}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/cpe.7503}, doi = {10.1002/CPE.7503}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/VarmaRV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/connection/GebremariamPI23, author = {Gebrekiros Gebreyesus Gebremariam and J. Panda and S. Indu}, title = {Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks}, journal = {Connect. Sci.}, volume = {35}, number = {1}, year = {2023}, url = {https://doi.org/10.1080/09540091.2023.2246703}, doi = {10.1080/09540091.2023.2246703}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/connection/GebremariamPI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/GautamiSK23, author = {A. Gautami and J. Shanthini and S. Karthik}, title = {A Quasi-Newton Neural Network Based Efficient Intrusion Detection System for Wireless Sensor Network}, journal = {Comput. Syst. Sci. Eng.}, volume = {45}, number = {1}, pages = {427--443}, year = {2023}, url = {https://doi.org/10.32604/csse.2023.026688}, doi = {10.32604/CSSE.2023.026688}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/GautamiSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/SivananthamMSS23, author = {S. Sivanantham and V. Mohanraj and Y. Suresh and J. Senthilkumar}, title = {Association Rule Mining Frequent-Pattern-Based Intrusion Detection in Network}, journal = {Comput. Syst. Sci. Eng.}, volume = {44}, number = {2}, pages = {1617--1631}, year = {2023}, url = {https://doi.org/10.32604/csse.2023.025893}, doi = {10.32604/CSSE.2023.025893}, timestamp = {Fri, 16 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/SivananthamMSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/RajapakshaKAPMC23, author = {Sampath Rajapaksha and Harsha K. Kalutarage and M. Omar Al{-}Kadri and Andrei Petrovski and Garikayi Madzudzo and Madeline Cheah}, title = {AI-Based Intrusion Detection Systems for In-Vehicle Networks: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {11}, pages = {237:1--237:40}, year = {2023}, url = {https://doi.org/10.1145/3570954}, doi = {10.1145/3570954}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/RajapakshaKAPMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/FanZLH23, author = {Kaisheng Fan and Weizhe Zhang and Guangrui Liu and Hui He}, title = {{FMSA:} a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems}, journal = {Cybersecur.}, volume = {6}, number = {1}, pages = {35}, year = {2023}, url = {https://doi.org/10.1186/s42400-023-00171-y}, doi = {10.1186/S42400-023-00171-Y}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/FanZLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/datascience/LiSS23, author = {Junzhou Li and Qianhui Sun and Feixian Sun}, title = {Enhancing Privacy-Preserving Intrusion Detection in Blockchain-Based Networks with Deep Learning}, journal = {Data Sci. J.}, volume = {22}, year = {2023}, url = {https://doi.org/10.5334/dsj-2023-031}, doi = {10.5334/DSJ-2023-031}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/datascience/LiSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/AlladiKCY23, author = {Tejasvi Alladi and Varun Kohli and Vinay Chamola and F. Richard Yu}, title = {A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems}, journal = {Digit. Commun. Networks}, volume = {9}, number = {5}, pages = {1113--1122}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.06.018}, doi = {10.1016/J.DCAN.2022.06.018}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcan/AlladiKCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/LinXFB23, author = {Haifeng Lin and Qilin Xue and Jiayin Feng and Di Bai}, title = {Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine}, journal = {Digit. Commun. Networks}, volume = {9}, number = {1}, pages = {111--124}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.09.021}, doi = {10.1016/J.DCAN.2022.09.021}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcan/LinXFB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/WeiWDLH23, author = {Pengcheng Wei and Bo Wang and Xiaojun Dai and Li Li and Fangcheng He}, title = {A novel intrusion detection model for the {CAN} bus packet of in-vehicle network based on attention mechanism and autoencoder}, journal = {Digit. Commun. Networks}, volume = {9}, number = {1}, pages = {14--21}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.04.021}, doi = {10.1016/J.DCAN.2022.04.021}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/WeiWDLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eaai/Ninu23, author = {S. B. Ninu}, title = {An intrusion detection system using Exponential Henry Gas Solubility Optimization based Deep Neuro Fuzzy Network in {MANET}}, journal = {Eng. Appl. Artif. Intell.}, volume = {123}, number = {Part {A}}, pages = {105969}, year = {2023}, url = {https://doi.org/10.1016/j.engappai.2023.105969}, doi = {10.1016/J.ENGAPPAI.2023.105969}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eaai/Ninu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/WangLZ23, author = {Xiaoning Wang and Jia Liu and Chunjiong Zhang}, title = {Network intrusion detection based on multi-domain data and ensemble-bidirectional {LSTM}}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {5}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00139-y}, doi = {10.1186/S13635-023-00139-Y}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/WangLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/XiaCYLZGY23, author = {Zhuoqun Xia and Yaling Chen and Bo Yin and Haolan Liang and Hongmei Zhou and Ke Gu and Fei Yu}, title = {Fed{\_}ADBN: An efficient intrusion detection framework based on client selection in {AMI} network}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {40}, number = {4}, year = {2023}, url = {https://doi.org/10.1111/exsy.12983}, doi = {10.1111/EXSY.12983}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/es/XiaCYLZGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/AlghanamASA23, author = {Orieb Abu Alghanam and Wesam Almobaideen and Maha Saadeh and Omar Adwan}, title = {An improved {PIO} feature selection algorithm for IoT network intrusion detection system based on ensemble learning}, journal = {Expert Syst. Appl.}, volume = {213}, number = {Part}, pages = {118745}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2022.118745}, doi = {10.1016/J.ESWA.2022.118745}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/AlghanamASA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/IdrissiAMMOYB23, author = {Meryem Janati Idrissi and Hamza Alami and Abdelkader El Mahdaouy and Abdellah El Mekki and Soufiane Oualil and Zakaria Yartaoui and Ismail Berrada}, title = {Fed-ANIDS: Federated learning for anomaly-based network intrusion detection systems}, journal = {Expert Syst. Appl.}, volume = {234}, pages = {121000}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2023.121000}, doi = {10.1016/J.ESWA.2023.121000}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/IdrissiAMMOYB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/LoukT23, author = {Maya Hilda Lestari Louk and Bayu Adhi Tama}, title = {Dual-IDS: {A} bagging-based gradient boosting decision tree model for network anomaly intrusion detection system}, journal = {Expert Syst. Appl.}, volume = {213}, number = {Part}, pages = {119030}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2022.119030}, doi = {10.1016/J.ESWA.2022.119030}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/LoukT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/DebichaBDDKM23, author = {Islam Debicha and Richard Bauwens and Thibault Debatty and Jean{-}Michel Dricot and Tayeb Kenaza and Wim Mees}, title = {{TAD:} Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems}, journal = {Future Gener. Comput. Syst.}, volume = {138}, pages = {185--197}, year = {2023}, url = {https://doi.org/10.1016/j.future.2022.08.011}, doi = {10.1016/J.FUTURE.2022.08.011}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/DebichaBDDKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/NgoLTPTMP23, author = {Duc{-}Minh Ngo and Dominic Lightbody and Andriy Temko and Cuong Pham{-}Quoc and Ngoc{-}Thinh Tran and Colin C. Murphy and Emanuel M. Popovici}, title = {{HH-NIDS:} Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security}, journal = {Future Internet}, volume = {15}, number = {1}, pages = {9}, year = {2023}, url = {https://doi.org/10.3390/fi15010009}, doi = {10.3390/FI15010009}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/NgoLTPTMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/RangelovLBBDTB23, author = {Denis Rangelov and Philipp L{\"{a}}mmel and Lisa Brunzel and Stephan Borgert and Paul L. Darius and Nikolay Tcholtchev and Michell Boerger}, title = {Towards an Integrated Methodology and Toolchain for Machine Learning-Based Intrusion Detection in Urban IoT Networks and Platforms}, journal = {Future Internet}, volume = {15}, number = {3}, pages = {98}, year = {2023}, url = {https://doi.org/10.3390/fi15030098}, doi = {10.3390/FI15030098}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/RangelovLBBDTB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/FarahCA23, author = {Khamsa Farah and Karim Chabir and Mohamed Naceur Abdelkrim}, title = {High level Petri nets-based proposal of an integrated intrusion detection and prevention mechanism in network controlled systems}, journal = {{IET} Commun.}, volume = {17}, number = {4}, pages = {469--477}, year = {2023}, url = {https://doi.org/10.1049/cmu2.12557}, doi = {10.1049/CMU2.12557}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/FarahCA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaacs/DengY23, author = {Hongli Deng and Tao Yang}, title = {Real time detection of intrusion trace information in sensor network based on Bayesian belief network}, journal = {Int. J. Auton. Adapt. Commun. Syst.}, volume = {16}, number = {1}, pages = {48--65}, year = {2023}, url = {https://doi.org/10.1504/IJAACS.2023.10052877}, doi = {10.1504/IJAACS.2023.10052877}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaacs/DengY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaacs/ZhaoCHQZ23, author = {Yun Zhao and Ziwen Cai and Tao Huang and Bin Qian and Mi Zhou}, title = {Heuristic positioning method for intrusion nodes in sensor networks based on quantum annealing algorithm}, journal = {Int. J. Auton. Adapt. Commun. Syst.}, volume = {16}, number = {5}, pages = {436--450}, year = {2023}, url = {https://doi.org/10.1504/IJAACS.2023.134094}, doi = {10.1504/IJAACS.2023.134094}, timestamp = {Wed, 08 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijaacs/ZhaoCHQZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/GowthamiP23, author = {G. Gowthami and S. Silvia Priscila}, title = {Tuna swarm optimisation-based feature selection and deep multimodal-sequential-hierarchical progressive network for network intrusion detection approach}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {10}, number = {4}, pages = {355--374}, year = {2023}, url = {https://doi.org/10.1504/IJCCBS.2023.136338}, doi = {10.1504/IJCCBS.2023.136338}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijccbs/GowthamiP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcisys/AwotundeAPGBB23, author = {Joseph Bamidele Awotunde and Femi Emmanuel Ayo and Ranjit Panigrahi and Amik Garg and Akash Kumar Bhoi and Paolo Barsocchi}, title = {A Multi-level Random Forest Model-Based Intrusion Detection Using Fuzzy Inference System for Internet of Things Networks}, journal = {Int. J. Comput. Intell. Syst.}, volume = {16}, number = {1}, pages = {31}, year = {2023}, url = {https://doi.org/10.1007/s44196-023-00205-w}, doi = {10.1007/S44196-023-00205-W}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcisys/AwotundeAPGBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcisys/EssaGM23, author = {Mohamed Saied Essa and Shawkat K. Guirguis and Magda M. Madbouly}, title = {A Comparative Study of Using Boosting-Based Machine Learning Algorithms for IoT Network Intrusion Detection}, journal = {Int. J. Comput. Intell. Syst.}, volume = {16}, number = {1}, pages = {177}, year = {2023}, url = {https://doi.org/10.1007/s44196-023-00355-x}, doi = {10.1007/S44196-023-00355-X}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcisys/EssaGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LiLW23, author = {Qingfeng Li and Bo Li and Linzhi Wen}, title = {An Intrusion Detection Model Based on Feature Selection and Improved One-Dimensional Convolutional Neural Network}, journal = {Int. J. Distributed Sens. Networks}, volume = {2023}, pages = {1--12}, year = {2023}, url = {https://doi.org/10.1155/2023/1982173}, doi = {10.1155/2023/1982173}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/LiLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PatelMW23, author = {N. D. Patel and B. M. Mehtre and Rajeev Wankar}, title = {Artificial neural network-based intrusion detection system using multi-objective genetic algorithm}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {3/4}, pages = {320--335}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.132726}, doi = {10.1504/IJICS.2023.132726}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PatelMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiei/SinghV23, author = {C. Edwin Singh and S. Maria Celestin Vigila}, title = {An investigation of machine learning-based intrusion detection system in mobile ad hoc network}, journal = {Int. J. Intell. Eng. Informatics}, volume = {11}, number = {1}, pages = {54--70}, year = {2023}, url = {https://doi.org/10.1504/IJIEI.2023.130704}, doi = {10.1504/IJIEI.2023.130704}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiei/SinghV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/ChitraSR23, author = {N. Chitra and Safinaz S. and K. Bhanu Rekha}, title = {Divergence Based Feature Selection for Pattern Recognizing of the Performance of Intrusion Detection in Mobile Communications Merged with the Computer Communication Networks}, journal = {Int. J. Interact. Mob. Technol.}, volume = {17}, number = {4}, pages = {75--88}, year = {2023}, url = {https://doi.org/10.3991/ijim.v17i04.37733}, doi = {10.3991/IJIM.V17I04.37733}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/ChitraSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AliMDUMMM23, author = {Muhammad Ali and Mansoor{-}ul{-}haque and Muhammad Hanif Durad and Anila Usman and Syed Muhammad Mohsin and Hana Mujlid and Carsten Maple}, title = {Effective network intrusion detection using stacking-based ensemble approach}, journal = {Int. J. Inf. Sec.}, volume = {22}, number = {6}, pages = {1781--1798}, year = {2023}, url = {https://doi.org/10.1007/s10207-023-00718-7}, doi = {10.1007/S10207-023-00718-7}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/AliMDUMMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MazumderKSIA23, author = {Md. Mumtahin Habib Ullah Mazumder and Md. Eusha Kadir and Sadia Sharmin and Md. Shariful Islam and Muhammad Mahbub Alam}, title = {cFEM: a cluster based feature extraction method for network intrusion detection}, journal = {Int. J. Inf. Sec.}, volume = {22}, number = {5}, pages = {1355--1369}, year = {2023}, url = {https://doi.org/10.1007/s10207-023-00694-y}, doi = {10.1007/S10207-023-00694-Y}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MazumderKSIA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MohamedE23, author = {Safa Mohamed and Ridha Ejbali}, title = {Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system}, journal = {Int. J. Inf. Sec.}, volume = {22}, number = {1}, pages = {235--247}, year = {2023}, url = {https://doi.org/10.1007/s10207-022-00634-2}, doi = {10.1007/S10207-022-00634-2}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/MohamedE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitsa/FanY23, author = {Xingliang Fan and Ruimei Yang}, title = {A Network Intrusion Detection Method Based on Improved Bi-LSTM in Internet of Things Environment}, journal = {Int. J. Inf. Technol. Syst. Approach}, volume = {16}, number = {3}, pages = {1--14}, year = {2023}, url = {https://doi.org/10.4018/ijitsa.319737}, doi = {10.4018/IJITSA.319737}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitsa/FanY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/HeWSX23, author = {Jiaxing He and Xiaodan Wang and Yafei Song and Qian Xiang}, title = {A multiscale intrusion detection system based on pyramid depthwise separable convolution neural network}, journal = {Neurocomputing}, volume = {530}, pages = {48--59}, year = {2023}, url = {https://doi.org/10.1016/j.neucom.2023.01.072}, doi = {10.1016/J.NEUCOM.2023.01.072}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/HeWSX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsc/DeelipK23, author = {Mali Shrikant Deelip and Govinda Kannayaram}, title = {ExpSFROA-Based {DRN:} Exponential Sunflower Rider Optimization Algorithm-Driven Deep Residual Network for the Intrusion Detection in IOT-Based Plant Disease Monitoring}, journal = {Int. J. Semantic Comput.}, volume = {17}, number = {1}, pages = {5--31}, year = {2023}, url = {https://doi.org/10.1142/S1793351X22400165}, doi = {10.1142/S1793351X22400165}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsc/DeelipK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhangYSLG23, author = {Hehui Zhang and Yong Yang and Xi Song and Wenhui Li and Shuqiang Guo}, title = {An abnormal intrusion detection method based on self-organising model}, journal = {Int. J. Secur. Networks}, volume = {18}, number = {2}, pages = {117--124}, year = {2023}, url = {https://doi.org/10.1504/IJSN.2023.131598}, doi = {10.1504/IJSN.2023.131598}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhangYSLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/ThakkarL23, author = {Ankit Thakkar and Ritika Lohiya}, title = {Fusion of statistical importance for feature selection in Deep Neural Network-based Intrusion Detection System}, journal = {Inf. Fusion}, volume = {90}, pages = {353--363}, year = {2023}, url = {https://doi.org/10.1016/j.inffus.2022.09.026}, doi = {10.1016/J.INFFUS.2022.09.026}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/ThakkarL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/SongWHJ23, author = {Jiaming Song and Xiaojuan Wang and Mingshu He and Lei Jin}, title = {{CSK-CNN:} Network Intrusion Detection Model Based on Two-Layer Convolution Neural Network for Handling Imbalanced Dataset}, journal = {Inf.}, volume = {14}, number = {2}, pages = {130}, year = {2023}, url = {https://doi.org/10.3390/info14020130}, doi = {10.3390/INFO14020130}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/information/SongWHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/GaberATAHL23, author = {Tarek Gaber and Joseph Bamidele Awotunde and Mohamed Torky and Sunday Adeola Ajagbe and Mohammad Hammoudeh and Wei Li}, title = {Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks}, journal = {Internet Things}, volume = {24}, pages = {100977}, year = {2023}, url = {https://doi.org/10.1016/j.iot.2023.100977}, doi = {10.1016/J.IOT.2023.100977}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iot/GaberATAHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GyamfiJ23, author = {Eric Gyamfi and Anca Delia Jurcut}, title = {Novel Online Network Intrusion Detection System for Industrial IoT Based on {OI-SVDD} and {AS-ELM}}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {5}, pages = {3827--3839}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3172393}, doi = {10.1109/JIOT.2022.3172393}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/GyamfiJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HeCTWL23, author = {Xiaoqiang He and Qianbin Chen and Lun Tang and Weili Wang and Tong Liu}, title = {CGAN-Based Collaborative Intrusion Detection for {UAV} Networks: {A} Blockchain-Empowered Distributed Federated Learning Approach}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {1}, pages = {120--132}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3200121}, doi = {10.1109/JIOT.2022.3200121}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/HeCTWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HeCTWLLLL23, author = {Xiaoqiang He and Qianbin Chen and Lun Tang and Weili Wang and Tong Liu and Li Li and Qinghai Liu and Jia Luo}, title = {Federated Continuous Learning Based on Stacked Broad Learning System Assisted by Digital Twin Networks: An Incremental Learning Approach for Intrusion Detection in {UAV} Networks}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {22}, pages = {19825--19838}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3282648}, doi = {10.1109/JIOT.2023.3282648}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/HeCTWLLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ParkLKPKH23, author = {Cheolhee Park and Jonghoon Lee and Youngsoo Kim and Jong{-}Geun Park and Hyunjin Kim and Dowon Hong}, title = {An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {3}, pages = {2330--2345}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3211346}, doi = {10.1109/JIOT.2022.3211346}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ParkLKPKH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ShahriarXMLH23, author = {Md Hasan Shahriar and Yang Xiao and Pablo Moriano and Wenjing Lou and Y. Thomas Hou}, title = {CANShield: Deep-Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal Level}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {24}, pages = {22111--22127}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3303271}, doi = {10.1109/JIOT.2023.3303271}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ShahriarXMLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ThakkarL23, author = {Ankit Thakkar and Ritika Lohiya}, title = {Attack Classification of Imbalanced Intrusion Data for IoT Network Using Ensemble-Learning-Based Deep Neural Network}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {13}, pages = {11888--11895}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3244810}, doi = {10.1109/JIOT.2023.3244810}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ThakkarL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/RaviPA23, author = {Vinayakumar Ravi and Tuan D. Pham and Mamoun Alazab}, title = {Deep Learning-Based Network Intrusion Detection System for Internet of Medical Things}, journal = {{IEEE} Internet Things Mag.}, volume = {6}, number = {2}, pages = {50--54}, year = {2023}, url = {https://doi.org/10.1109/IOTM.001.2300021}, doi = {10.1109/IOTM.001.2300021}, timestamp = {Sat, 17 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotm/RaviPA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/ViegasST23, author = {Eduardo K. Viegas and Altair O. Santin and Pietro Tedeschi}, title = {Toward a Reliable Evaluation of Machine Learning Schemes for Network-Based Intrusion Detection}, journal = {{IEEE} Internet Things Mag.}, volume = {6}, number = {2}, pages = {70--75}, year = {2023}, url = {https://doi.org/10.1109/IOTM.001.2300106}, doi = {10.1109/IOTM.001.2300106}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotm/ViegasST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DuyKHHP23, author = {Phan The Duy and Nghi Hoang Khoa and Do Thi Thu Hien and Hien Do Hoang and Van{-}Hau Pham}, title = {Investigating on the robustness of flow-based intrusion detection system against adversarial samples using Generative Adversarial Networks}, journal = {J. Inf. Secur. Appl.}, volume = {74}, pages = {103472}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103472}, doi = {10.1016/J.JISA.2023.103472}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DuyKHHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itl/SuiL23, author = {Qingru Sui and Xiaoyan Liu}, title = {Edge computing and AIoT based network intrusion detection mechanism}, journal = {Internet Technol. Lett.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/itl2.324}, doi = {10.1002/ITL2.324}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itl/SuiL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/EssaG23, author = {Mohamed Saied Essa and Shawkat Kamal Guirguis}, title = {Evaluation of Tree-Based Machine Learning Algorithms for Network Intrusion Detection in the Internet of Things}, journal = {{IT} Prof.}, volume = {25}, number = {5}, pages = {45--56}, year = {2023}, url = {https://doi.org/10.1109/MITP.2023.3303919}, doi = {10.1109/MITP.2023.3303919}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/EssaG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/AlsarhanAAA023, author = {Ayoub Alsarhan and Mohammad Alauthman and Esra'a Alshdaifat and Abdel{-}Rahman Al{-}Ghuwairi and Ahmed Al{-}Dubai}, title = {Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {5}, pages = {6113--6122}, year = {2023}, url = {https://doi.org/10.1007/s12652-021-02963-x}, doi = {10.1007/S12652-021-02963-X}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/AlsarhanAAA023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/GhanbarzadehHG23, author = {Reza Ghanbarzadeh and Ali Hosseinalipour and Ali Ghaffari}, title = {A novel network intrusion detection method based on metaheuristic optimisation algorithms}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {6}, pages = {7575--7592}, year = {2023}, url = {https://doi.org/10.1007/s12652-023-04571-3}, doi = {10.1007/S12652-023-04571-3}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/GhanbarzadehHG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbd/RenZZSZ23, author = {Kezhou Ren and Yifan Zeng and Yuanfu Zhong and Biao Sheng and Yingchao Zhang}, title = {{MAFSIDS:} a reinforcement learning-based intrusion detection model for multi-agent feature selection networks}, journal = {J. Big Data}, volume = {10}, number = {1}, pages = {137}, year = {2023}, url = {https://doi.org/10.1186/s40537-023-00814-4}, doi = {10.1186/S40537-023-00814-4}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbd/RenZZSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbd/YinJXSZSK23, author = {Yuhua Yin and Julian Jang{-}Jaccard and Wen Xu and Amardeep Singh and Jinting Zhu and Fariza Sabrina and Jin Kwak}, title = {{IGRF-RFE:} a hybrid feature selection method for MLP-based network intrusion detection on {UNSW-NB15} dataset}, journal = {J. Big Data}, volume = {10}, number = {1}, pages = {15}, year = {2023}, url = {https://doi.org/10.1186/s40537-023-00694-8}, doi = {10.1186/S40537-023-00694-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbd/YinJXSZSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/DingWCL23, author = {Defeng Ding and Yehua Wei and Can Cheng and Jing Long}, title = {Intrusion Detection for In-Vehicle {CAN} Bus Based on Lightweight Neural Network}, journal = {J. Circuits Syst. Comput.}, volume = {32}, number = {7}, pages = {2350110:1--2350110:16}, year = {2023}, url = {https://doi.org/10.1142/S0218126623501104}, doi = {10.1142/S0218126623501104}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/DingWCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Zhang23a, author = {Junlin Zhang}, title = {{WSN} Network Node Malicious Intrusion Detection Method Based on Reputation Score}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {1}, pages = {55--76}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1213}, doi = {10.13052/JCSM2245-1439.1213}, timestamp = {Sat, 25 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Zhang23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/LakhotiaDSS23, author = {Parul Lakhotia and Rinky Dwivedi and Deepak Kumar Sharma and Nonita Sharma}, title = {Intrusion Detection System for IoE-Based Medical Networks}, journal = {J. Database Manag.}, volume = {34}, number = {2}, pages = {1--18}, year = {2023}, url = {https://doi.org/10.4018/jdm.321465}, doi = {10.4018/JDM.321465}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/LakhotiaDSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jece/X23ak, title = {Retracted: Intrusion Detection-Data Security Protection Scheme Based on Particle Swarm-BP Network Algorithm in Cloud Computing Environment}, journal = {J. Electr. Comput. Eng.}, volume = {2023}, pages = {9853289:1--9853289:1}, year = {2023}, url = {https://doi.org/10.1155/2023/9853289}, doi = {10.1155/2023/9853289}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jece/X23ak.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/SakthiK23, author = {K. Sakthi and P. Nirmal Kumar}, title = {A novel attention-based feature learning and optimal deep learning approach for network intrusion detection}, journal = {J. Intell. Fuzzy Syst.}, volume = {45}, number = {3}, pages = {5123--5140}, year = {2023}, url = {https://doi.org/10.3233/JIFS-231758}, doi = {10.3233/JIFS-231758}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/SakthiK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmm/AmaranMJ23, author = {Sibi Amaran and Ramalingam Madhan Mohan and Rethnaraj Jebakumar}, title = {Optimal Machine Learning Based Intrusion Detection System in Wireless Sensor Networks for Surveillance Applications}, journal = {J. Mobile Multimedia}, volume = {19}, number = {2}, pages = {437--450}, year = {2023}, url = {https://doi.org/10.13052/jmm1550-4646.1924}, doi = {10.13052/JMM1550-4646.1924}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmm/AmaranMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KhanIIJK23, author = {Murad{-}Ali Khan and Naeem Iqbal and Imran and Harun Jamil and Do{-}Hyeun Kim}, title = {An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection}, journal = {J. Netw. Comput. Appl.}, volume = {212}, pages = {103560}, year = {2023}, url = {https://doi.org/10.1016/j.jnca.2022.103560}, doi = {10.1016/J.JNCA.2022.103560}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/KhanIIJK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/VoDN23, author = {Hoang V. Vo and Hanh Phuong Du and Hoa Ngoc Nguyen}, title = {AI-powered intrusion detection in large-scale traffic networks based on flow sensing strategy and parallel deep analysis}, journal = {J. Netw. Comput. Appl.}, volume = {220}, pages = {103735}, year = {2023}, url = {https://doi.org/10.1016/j.jnca.2023.103735}, doi = {10.1016/J.JNCA.2023.103735}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/VoDN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YaoSZ23, author = {Wei Yao and Han Shi and Hai Zhao}, title = {Scalable anomaly-based intrusion detection for secure Internet of Things using generative adversarial networks in fog environment}, journal = {J. Netw. Comput. Appl.}, volume = {214}, pages = {103622}, year = {2023}, url = {https://doi.org/10.1016/j.jnca.2023.103622}, doi = {10.1016/J.JNCA.2023.103622}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YaoSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/AzarSMHE23, author = {Ahmad Taher Azar and Esraa Shehab and Ahmed M. Mattar and Ibrahim A. Hameed and Shaimaa Ahmed El{-}Said}, title = {Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks}, journal = {J. Netw. Syst. Manag.}, volume = {31}, number = {4}, pages = {82}, year = {2023}, url = {https://doi.org/10.1007/s10922-023-09767-8}, doi = {10.1007/S10922-023-09767-8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnsm/AzarSMHE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/SarhanLMP23, author = {Mohanad Sarhan and Siamak Layeghy and Nour Moustafa and Marius Portmann}, title = {Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection}, journal = {J. Netw. Syst. Manag.}, volume = {31}, number = {1}, pages = {3}, year = {2023}, url = {https://doi.org/10.1007/s10922-022-09691-3}, doi = {10.1007/S10922-022-09691-3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnsm/SarhanLMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/Shiomoto23, author = {Kohei Shiomoto}, title = {Network Intrusion Detection System Based on an Adversarial Auto-Encoder with Few Labeled Training Samples}, journal = {J. Netw. Syst. Manag.}, volume = {31}, number = {1}, pages = {5}, year = {2023}, url = {https://doi.org/10.1007/s10922-022-09698-w}, doi = {10.1007/S10922-022-09698-W}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnsm/Shiomoto23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/AsgharzadehGMG23, author = {Hossein Asgharzadeh and Ali Ghaffari and Mohammad Masdari and Farhad Soleimanian Gharehchopogh}, title = {Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm}, journal = {J. Parallel Distributed Comput.}, volume = {175}, pages = {1--21}, year = {2023}, url = {https://doi.org/10.1016/j.jpdc.2022.12.009}, doi = {10.1016/J.JPDC.2022.12.009}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/AsgharzadehGMG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrie/HosseiniS23, author = {Soodeh Hosseini and Saman Rafiee Sardo}, title = {Network intrusion detection based on deep learning method in internet of thing}, journal = {J. Reliab. Intell. Environ.}, volume = {9}, number = {2}, pages = {147--159}, year = {2023}, url = {https://doi.org/10.1007/s40860-021-00169-8}, doi = {10.1007/S40860-021-00169-8}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrie/HosseiniS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/AwadF23, author = {Mohammed Awad and Salam Fraihat}, title = {Recursive Feature Elimination with Cross-Validation with Decision Tree: Feature Selection Method for Machine Learning-Based Intrusion Detection Systems}, journal = {J. Sens. Actuator Networks}, volume = {12}, number = {5}, pages = {67}, year = {2023}, url = {https://doi.org/10.3390/jsan12050067}, doi = {10.3390/JSAN12050067}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsan/AwadF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/ElsayedHHAE23, author = {Rania A. Elsayed and Reem Hamada and Mohammad Hammoudeh and Mahmoud I. Abdalla and Shaimaa Ahmed Elsaid}, title = {A Hierarchical Deep Learning-Based Intrusion Detection Architecture for Clustered Internet of Things}, journal = {J. Sens. Actuator Networks}, volume = {12}, number = {1}, pages = {3}, year = {2023}, url = {https://doi.org/10.3390/jsan12010003}, doi = {10.3390/JSAN12010003}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsan/ElsayedHHAE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/SawafiTH23, author = {Yahya Al Sawafi and Abderezak Touzene and Rachid Hedjam}, title = {Hybrid Deep Learning-Based Intrusion Detection System for {RPL} IoT Networks}, journal = {J. Sens. Actuator Networks}, volume = {12}, number = {2}, pages = {21}, year = {2023}, url = {https://doi.org/10.3390/jsan12020021}, doi = {10.3390/JSAN12020021}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsan/SawafiTH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/LayeghyBP23, author = {Siamak Layeghy and Mahsa Baktashmotlagh and Marius Portmann}, title = {{DI-NIDS:} Domain invariant network intrusion detection system}, journal = {Knowl. Based Syst.}, volume = {273}, pages = {110626}, year = {2023}, url = {https://doi.org/10.1016/j.knosys.2023.110626}, doi = {10.1016/J.KNOSYS.2023.110626}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/LayeghyBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/NguyenK23, author = {Hoang Nguyen and Rasha F. Kashef}, title = {{TS-IDS:} Traffic-aware self-supervised learning for IoT Network Intrusion Detection}, journal = {Knowl. Based Syst.}, volume = {279}, pages = {110966}, year = {2023}, url = {https://doi.org/10.1016/j.knosys.2023.110966}, doi = {10.1016/J.KNOSYS.2023.110966}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/NguyenK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/KilincerTES23, author = {Ilhan Firat Kilincer and Turker Tuncer and Fatih Ertam and Abdulkadir Seng{\"{u}}r}, title = {{SPA-IDS:} An intelligent intrusion detection system based on vertical mode decomposition and iterative feature selection in computer networks}, journal = {Microprocess. Microsystems}, volume = {96}, pages = {104752}, year = {2023}, url = {https://doi.org/10.1016/j.micpro.2022.104752}, doi = {10.1016/J.MICPRO.2022.104752}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/KilincerTES23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mdpinetwork/RashidKERSE23, author = {Md. Mamunur Rashid and Shahriar Usman Khan and Fariha Eusufzai and Md. Azharuddin Redwan and Saifur Rahman Sabuj and Mahmoud A. El{-}Sharief}, title = {A Federated Learning-Based Approach for Improving Intrusion Detection in Industrial Internet of Things Networks}, journal = {Network}, volume = {3}, number = {1}, pages = {158--179}, year = {2023}, url = {https://doi.org/10.3390/network3010008}, doi = {10.3390/NETWORK3010008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mdpinetwork/RashidKERSE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/MuhammadMSK23, author = {Ali Muhammad and Iqbal Murtza and Ayesha Saadia and Kashif Kifayat}, title = {Cortex-inspired ensemble based network intrusion detection system}, journal = {Neural Comput. Appl.}, volume = {35}, number = {21}, pages = {15415--15428}, year = {2023}, url = {https://doi.org/10.1007/s00521-023-08561-6}, doi = {10.1007/S00521-023-08561-6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/MuhammadMSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/SivamohanS23, author = {Sivanandam Sivamohan and S. S. Sridhar}, title = {An optimized model for network intrusion detection systems in industry 4.0 using {XAI} based Bi-LSTM framework}, journal = {Neural Comput. Appl.}, volume = {35}, number = {15}, pages = {11459--11475}, year = {2023}, url = {https://doi.org/10.1007/s00521-023-08319-0}, doi = {10.1007/S00521-023-08319-0}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/SivamohanS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/SoleymanzadehK23, author = {Raha Soleymanzadeh and Rasha F. Kashef}, title = {Efficient intrusion detection using multi-player generative adversarial networks (GANs): an ensemble-based deep learning architecture}, journal = {Neural Comput. Appl.}, volume = {35}, number = {17}, pages = {12545--12563}, year = {2023}, url = {https://doi.org/10.1007/s00521-023-08398-z}, doi = {10.1007/S00521-023-08398-Z}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/SoleymanzadehK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/WangLCWZ23, author = {Yuhang Wang and Yingxu Lai and Ye Chen and Jingwen Wei and Zhaoyi Zhang}, title = {Transfer learning-based self-learning intrusion detection system for in-vehicle networks}, journal = {Neural Comput. Appl.}, volume = {35}, number = {14}, pages = {10257--10273}, year = {2023}, url = {https://doi.org/10.1007/s00521-023-08233-5}, doi = {10.1007/S00521-023-08233-5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/WangLCWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/ZavrakI23, author = {Sultan Zavrak and Murat Iskefiyeli}, title = {Flow-based intrusion detection on software-defined networks: a multivariate time series anomaly detection approach}, journal = {Neural Comput. Appl.}, volume = {35}, number = {16}, pages = {12175--12193}, year = {2023}, url = {https://doi.org/10.1007/s00521-023-08376-5}, doi = {10.1007/S00521-023-08376-5}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/ZavrakI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/ZavrakI23a, author = {Sultan Zavrak and Murat Iskefiyeli}, title = {Correction: Flow-based intrusion detection on software-defined networks: a multivariate time series anomaly detection approach}, journal = {Neural Comput. Appl.}, volume = {35}, number = {24}, pages = {18091}, year = {2023}, url = {https://doi.org/10.1007/s00521-023-08711-w}, doi = {10.1007/S00521-023-08711-W}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/ZavrakI23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npl/KarthicK23, author = {S. Karthic and S. Manoj Kumar}, title = {Hybrid Optimized Deep Neural Network with Enhanced Conditional Random Field Based Intrusion Detection on Wireless Sensor Network}, journal = {Neural Process. Lett.}, volume = {55}, number = {1}, pages = {459--479}, year = {2023}, url = {https://doi.org/10.1007/s11063-022-10892-9}, doi = {10.1007/S11063-022-10892-9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/npl/KarthicK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/patterns/HoussiauSRSM23, author = {Florimond Houssiau and Piotr Sapiezynski and Laura Radaelli and Erez Shmueli and Yves{-}Alexandre de Montjoye}, title = {Detrimental network effects in privacy: {A} graph-theoretic model for node-based intrusions}, journal = {Patterns}, volume = {4}, number = {1}, pages = {100662}, year = {2023}, url = {https://doi.org/10.1016/j.patter.2022.100662}, doi = {10.1016/J.PATTER.2022.100662}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/patterns/HoussiauSRSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/LuoWZJLL23, author = {Feng Luo and Jiajia Wang and Xuan Zhang and Yifan Jiang and Zhihao Li and Cheng Luo}, title = {In-vehicle network intrusion detection systems: a systematic survey of deep learning-based approaches}, journal = {PeerJ Comput. Sci.}, volume = {9}, pages = {e1648}, year = {2023}, url = {https://doi.org/10.7717/peerj-cs.1648}, doi = {10.7717/PEERJ-CS.1648}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/peerj-cs/LuoWZJLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/ZhaoRWHC23, author = {Guosheng Zhao and Cai Ren and Jian Wang and Yuyan Huang and Huan Chen}, title = {IoT intrusion detection model based on gated recurrent unit and residual network}, journal = {Peer Peer Netw. Appl.}, volume = {16}, number = {4}, pages = {1887--1899}, year = {2023}, url = {https://doi.org/10.1007/s12083-023-01510-z}, doi = {10.1007/S12083-023-01510-Z}, timestamp = {Mon, 24 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/ZhaoRWHC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/JothiP23, author = {B. Jothi and M. Pushpalatha}, title = {{WILS-TRS} - a novel optimized deep learning based intrusion detection framework for IoT networks}, journal = {Pers. Ubiquitous Comput.}, volume = {27}, number = {3}, pages = {1285--1301}, year = {2023}, url = {https://doi.org/10.1007/s00779-021-01578-5}, doi = {10.1007/S00779-021-01578-5}, timestamp = {Fri, 16 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/JothiP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/WangLZHZWH23, author = {Yalu Wang and Jie Li and Wei Zhao and Zhijie Han and Hang Zhao and Lei Wang and Xin He}, title = {{N-STGAT:} Spatio-Temporal Graph Neural Network Based Network Intrusion Detection for Near-Earth Remote Sensing}, journal = {Remote. Sens.}, volume = {15}, number = {14}, pages = {3611}, year = {2023}, url = {https://doi.org/10.3390/rs15143611}, doi = {10.3390/RS15143611}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/WangLZHZWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saem/SharmaSS23, author = {Hanjabam Saratchandra Sharma and Arindam Sarkar and Moirangthem Marjit Singh}, title = {An efficient deep learning-based solution for network intrusion detection in wireless sensor network}, journal = {Int. J. Syst. Assur. Eng. Manag.}, volume = {14}, number = {6}, pages = {2423--2446}, year = {2023}, url = {https://doi.org/10.1007/s13198-023-02090-0}, doi = {10.1007/S13198-023-02090-0}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saem/SharmaSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/ZhangZ23, author = {Jinfeng Zhang and Dongdong Zhang}, title = {Internet of things network intrusion detection model based on quantum artificial fish group and fuzzy kernel clustering algorithm}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.220}, doi = {10.1002/SPY2.220}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/ZhangZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AbosataAI23, author = {Nasr Abosata and Saba Al{-}Rubaye and G{\"{o}}khan Inalhan}, title = {Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called {FTL-CID}}, journal = {Sensors}, volume = {23}, number = {1}, pages = {321}, year = {2023}, url = {https://doi.org/10.3390/s23010321}, doi = {10.3390/S23010321}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AbosataAI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AbualiNA23, author = {Khadija M. Abuali and Liyth Nissirat and Aida Al{-}Samawi}, title = {Advancing Network Security with {AI:} SVM-Based Deep Learning for Intrusion Detection}, journal = {Sensors}, volume = {23}, number = {21}, pages = {8959}, year = {2023}, url = {https://doi.org/10.3390/s23218959}, doi = {10.3390/S23218959}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AbualiNA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AlHaddadBKEJ23, author = {Ulaa AlHaddad and Abdullah Basuhail and Maher Khemakhem and Fathy Elbouraey Eassa and Kamal Mansur Jambi}, title = {Ensemble Model Based on Hybrid Deep Learning for Intrusion Detection in Smart Grid Networks}, journal = {Sensors}, volume = {23}, number = {17}, pages = {7464}, year = {2023}, url = {https://doi.org/10.3390/s23177464}, doi = {10.3390/S23177464}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AlHaddadBKEJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AlabsiAR23, author = {Basim Ahmad Alabsi and Mohammed Anbar and Shaza Dawood Ahmed Rihan}, title = {Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks}, journal = {Sensors}, volume = {23}, number = {12}, pages = {5644}, year = {2023}, url = {https://doi.org/10.3390/s23125644}, doi = {10.3390/S23125644}, timestamp = {Thu, 13 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AlabsiAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AldhaheriA23, author = {Sahar Aldhaheri and Abeer Alhuzali}, title = {{SGAN-IDS:} Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems}, journal = {Sensors}, volume = {23}, number = {18}, pages = {7796}, year = {2023}, url = {https://doi.org/10.3390/s23187796}, doi = {10.3390/S23187796}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AldhaheriA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AljebreenASMDAD23, author = {Mohammed Aljebreen and Manal Abdullah Alohali and Muhammad Kashif Saeed and Heba Mohsen and Mesfer Al Duhayyim and Amgad Atta Abdelmageed and Suhanda Drar and Sitelbanat Abdelbagi}, title = {Binary Chimp Optimization Algorithm with {ML} Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks}, journal = {Sensors}, volume = {23}, number = {8}, pages = {4073}, year = {2023}, url = {https://doi.org/10.3390/s23084073}, doi = {10.3390/S23084073}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AljebreenASMDAD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GouZZ23, author = {Wanting Gou and Haodi Zhang and Ronghui Zhang}, title = {Multi-Classification and Tree-Based Ensemble Network for the Intrusion Detection System in the Internet of Vehicles}, journal = {Sensors}, volume = {23}, number = {21}, pages = {8788}, year = {2023}, url = {https://doi.org/10.3390/s23218788}, doi = {10.3390/S23218788}, timestamp = {Sat, 20 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/GouZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KhanLK23, author = {Junaid Khan and Dae{-}Woon Lim and Young{-}Sik Kim}, title = {Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks}, journal = {Sensors}, volume = {23}, number = {7}, pages = {3554}, year = {2023}, url = {https://doi.org/10.3390/s23073554}, doi = {10.3390/S23073554}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KhanLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Luo0ZWWW23, author = {Feng Luo and Zhenyu Yang and Zhaojing Zhang and Zitong Wang and Bowen Wang and Mingzhi Wu}, title = {A Multi-Layer Intrusion Detection System for SOME/IP-Based In-Vehicle Network}, journal = {Sensors}, volume = {23}, number = {9}, pages = {4376}, year = {2023}, url = {https://doi.org/10.3390/s23094376}, doi = {10.3390/S23094376}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/Luo0ZWWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/MaGH23, author = {Wei Ma and Chao Gou and Yunyun Hou}, title = {Research on Adaptive 1DCNN Network Intrusion Detection Technology Based on {BSGM} Mixed Sampling}, journal = {Sensors}, volume = {23}, number = {13}, pages = {6206}, year = {2023}, url = {https://doi.org/10.3390/s23136206}, doi = {10.3390/S23136206}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/MaGH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/RaoB23, author = {Yamarthi Narasimha Rao and Kunda Suresh Babu}, title = {An Imbalanced Generative Adversarial Network-Based Approach for Network Intrusion Detection in an Imbalanced Dataset}, journal = {Sensors}, volume = {23}, number = {1}, pages = {550}, year = {2023}, url = {https://doi.org/10.3390/s23010550}, doi = {10.3390/S23010550}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/RaoB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SalmanTHMMK23, author = {Emad Hmood Salman and Montadar Abas Taher and Yousif I. Hammadi and Omar Abdulkareem Mahmood and Ammar Muthanna and Andrey Koucheryavy}, title = {An Anomaly Intrusion Detection for High-Density Internet of Things Wireless Communication Network Based Deep Learning Algorithms}, journal = {Sensors}, volume = {23}, number = {1}, pages = {206}, year = {2023}, url = {https://doi.org/10.3390/s23010206}, doi = {10.3390/S23010206}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/SalmanTHMMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/TangLLBYY23, author = {Bin Tang and Yan Lu and Qi Li and Yueying Bai and Jie Yu and Xu Yu}, title = {A Diffusion Model Based on Network Intrusion Detection Method for Industrial Cyber-Physical Systems}, journal = {Sensors}, volume = {23}, number = {3}, pages = {1141}, year = {2023}, url = {https://doi.org/10.3390/s23031141}, doi = {10.3390/S23031141}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/TangLLBYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WangHCT23, author = {Yung{-}Chung Wang and Yi{-}Chun Houng and Han{-}Xuan Chen and Shu{-}Ming Tseng}, title = {Network Anomaly Intrusion Detection Based on Deep Learning Approach}, journal = {Sensors}, volume = {23}, number = {4}, pages = {2171}, year = {2023}, url = {https://doi.org/10.3390/s23042171}, doi = {10.3390/S23042171}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/WangHCT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZhangZWZ23, author = {Rui Zhang and Jing Zhang and Qiqi Wang and Hehe Zhang}, title = {{DOIDS:} An Intrusion Detection Scheme Based on {DBSCAN} for Opportunistic Routing in Underwater Wireless Sensor Networks}, journal = {Sensors}, volume = {23}, number = {4}, pages = {2096}, year = {2023}, url = {https://doi.org/10.3390/s23042096}, doi = {10.3390/S23042096}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ZhangZWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/DeoreB23, author = {Bhushan Deore and Surendra Bhosale}, title = {Adaptive Dolphin Atom Search Optimization-Based {DRNN} for Network Intrusion Detection System}, journal = {{SN} Comput. Sci.}, volume = {4}, number = {5}, pages = {578}, year = {2023}, url = {https://doi.org/10.1007/s42979-023-02006-6}, doi = {10.1007/S42979-023-02006-6}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/DeoreB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/PatelVS23, author = {Bimal Patel and Jalpesh Vasa and Parth Shah}, title = {Forwarding Neighbor Based Sink Reputed Trust Based Intrusion Detection System to Mitigate Selective Forwarding Attack in {RPL} for IoT Networks}, journal = {{SN} Comput. Sci.}, volume = {4}, number = {4}, pages = {420}, year = {2023}, url = {https://doi.org/10.1007/s42979-023-01841-x}, doi = {10.1007/S42979-023-01841-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/PatelVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/MeddebJTK23, author = {Rahma Meddeb and Farah Jemili and Bayrem Triki and Ouajdi Korbaa}, title = {A deep learning-based intrusion detection approach for mobile Ad-hoc network}, journal = {Soft Comput.}, volume = {27}, number = {14}, pages = {9425--9439}, year = {2023}, url = {https://doi.org/10.1007/s00500-023-08324-4}, doi = {10.1007/S00500-023-08324-4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/MeddebJTK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/WangG23a, author = {Shaorong Wang and Long Guiling}, title = {Research on campus network security protection system framework based on cloud data and intrusion detection algorithm}, journal = {Soft Comput.}, volume = {27}, number = {10}, pages = {6835--6844}, year = {2023}, url = {https://doi.org/10.1007/s00500-023-08115-x}, doi = {10.1007/S00500-023-08115-X}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/WangG23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/ChuaS23, author = {Tuan{-}Hong Chua and Iftekhar Salam}, title = {Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection Using Progressive Dataset}, journal = {Symmetry}, volume = {15}, number = {6}, pages = {1251}, year = {2023}, url = {https://doi.org/10.3390/sym15061251}, doi = {10.3390/SYM15061251}, timestamp = {Thu, 13 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/ChuaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/systems/PerumalSANQ23, author = {Ganeshkumar Perumal and Gopalakrishnan Subburayalu and Qaisar Abbas and Syed Muhammad Naqi and Imran Qureshi}, title = {VBQ-Net: {A} Novel Vectorization-Based Boost Quantized Network Model for Maximizing the Security Level of IoT System to Prevent Intrusions}, journal = {Syst.}, volume = {11}, number = {8}, pages = {436}, year = {2023}, url = {https://doi.org/10.3390/systems11080436}, doi = {10.3390/SYSTEMS11080436}, timestamp = {Thu, 01 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/systems/PerumalSANQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WeiCX23, author = {Yehua Wei and Can Cheng and Guoqi Xie}, title = {{OFIDS} : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {6}, pages = {4607--4620}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3230501}, doi = {10.1109/TDSC.2022.3230501}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WeiCX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenZLFX23, author = {Jiahui Chen and Yi Zhao and Qi Li and Xuewei Feng and Ke Xu}, title = {FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {4561--4576}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3297369}, doi = {10.1109/TIFS.2023.3297369}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenZLFX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/YuLXLLY23, author = {Zhangwei Yu and Yan Liu and Guoqi Xie and Renfa Li and Siming Liu and Laurence T. Yang}, title = {{TCE-IDS:} Time Interval Conditional Entropy- Based Intrusion Detection System for Automotive Controller Area Networks}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {2}, pages = {1185--1195}, year = {2023}, url = {https://doi.org/10.1109/TII.2022.3202539}, doi = {10.1109/TII.2022.3202539}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/YuLXLLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/ChouguleKCY23, author = {Amit Chougule and Varun Kohli and Vinay Chamola and Fei Richard Yu}, title = {Multibranch Reconstruction Error (MbRE) Intrusion Detection Architecture for Intelligent Edge-Based Policing in Vehicular Ad-Hoc Networks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {11}, pages = {13068--13077}, year = {2023}, url = {https://doi.org/10.1109/TITS.2022.3201548}, doi = {10.1109/TITS.2022.3201548}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/ChouguleKCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WangXCSW23, author = {Zhongru Wang and Xinzhou Xie and Lei Chen and Shouyou Song and Zhongjie Wang}, title = {Intrusion Detection and Network Information Security Based on Deep Learning Algorithm in Urban Rail Transit Management System}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {2}, pages = {2135--2143}, year = {2023}, url = {https://doi.org/10.1109/TITS.2021.3127681}, doi = {10.1109/TITS.2021.3127681}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/WangXCSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WangZSW23, author = {Kai Wang and Aiheng Zhang and Haoran Sun and Bailing Wang}, title = {Analysis of Recent Deep-Learning-Based Intrusion Detection Methods for In-Vehicle Network}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {2}, pages = {1843--1854}, year = {2023}, url = {https://doi.org/10.1109/TITS.2022.3222486}, doi = {10.1109/TITS.2022.3222486}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/WangZSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/ZhangGWTC23, author = {Jiangjiang Zhang and Bei Gong and Muhammad Waqas and Shanshan Tu and Sheng Chen}, title = {Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network Security}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {12}, pages = {15051--15065}, year = {2023}, url = {https://doi.org/10.1109/TITS.2023.3296002}, doi = {10.1109/TITS.2023.3296002}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/ZhangGWTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/LiZLL23, author = {Jieling Li and Hao Zhang and Zhihuang Liu and Yanhua Liu}, title = {Network intrusion detection via tri-broad learning system based on spatial-temporal granularity}, journal = {J. Supercomput.}, volume = {79}, number = {8}, pages = {9180--9205}, year = {2023}, url = {https://doi.org/10.1007/s11227-022-05025-x}, doi = {10.1007/S11227-022-05025-X}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/LiZLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/YanZZSHY23, author = {Fengru Yan and Guanghua Zhang and Dongwen Zhang and Xinghua Sun and Botao Hou and Naiwen Yu}, title = {{TL-CNN-IDS:} transfer learning-based intrusion detection system using convolutional neural network}, journal = {J. Supercomput.}, volume = {79}, number = {15}, pages = {17562--17584}, year = {2023}, url = {https://doi.org/10.1007/s11227-023-05347-4}, doi = {10.1007/S11227-023-05347-4}, timestamp = {Sun, 10 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/YanZZSHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/ZhangYHL23, author = {Yichi Zhang and Chunhua Yang and Keke Huang and Yonggang Li}, title = {Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {5}, pages = {2894--2905}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2022.3184975}, doi = {10.1109/TNSE.2022.3184975}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/ZhangYHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/AraujoFilhoNKFZ23, author = {Paulo Freitas de Araujo{-}Filho and Mohamed Naili and Georges Kaddoum and Emmanuel Thepie Fapi and Zhongwen Zhu}, title = {Unsupervised GAN-Based Intrusion Detection System Using Temporal Convolutional Networks and Self-Attention}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {4}, pages = {4951--4963}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2023.3260039}, doi = {10.1109/TNSM.2023.3260039}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/AraujoFilhoNKFZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/DengZPZLX23, author = {Xiaoheng Deng and Jincai Zhu and Xinjun Pei and Lan Zhang and Zhen Ling and Kaiping Xue}, title = {Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT Networks}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {1}, pages = {684--696}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2022.3213807}, doi = {10.1109/TNSM.2022.3213807}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/DengZPZLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/TuWBYA23, author = {Shanshan Tu and Muhammad Waqas and Akhtar Badshah and Mingxi Yin and Ghulam Abbas}, title = {Network Intrusion Detection System {(NIDS)} Based on Pseudo-Siamese Stacked Autoencoders in Fog Computing}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {6}, pages = {4317--4327}, year = {2023}, url = {https://doi.org/10.1109/TSC.2023.3319953}, doi = {10.1109/TSC.2023.3319953}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/TuWBYA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/ShamsRU23, author = {Erfan A. Shams and Ahmet Rizaner and Ali Hakan Ulusoy}, title = {Flow-based intrusion detection system in Vehicular Ad hoc Network using context-aware feature extraction}, journal = {Veh. Commun.}, volume = {41}, pages = {100585}, year = {2023}, url = {https://doi.org/10.1016/j.vehcom.2023.100585}, doi = {10.1016/J.VEHCOM.2023.100585}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/ShamsRU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/MaLG23, author = {Xiaoxue Ma and Yun Li and Yan Gao}, title = {Decision model of intrusion response based on markov game in fog computing environment}, journal = {Wirel. Networks}, volume = {29}, number = {8}, pages = {3383--3392}, year = {2023}, url = {https://doi.org/10.1007/s11276-023-03382-w}, doi = {10.1007/S11276-023-03382-W}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/MaLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ShailajaSTGBP23, author = {K. Shailaja and B. Srinivasulu and Lingala Thirupathi and Rekha Gangula and Thejoramnaresh Reddy Boya and Vemulamma Polem}, title = {An Intelligent Deep Feature Based Intrusion Detection System for Network Applications}, journal = {Wirel. Pers. Commun.}, volume = {129}, number = {1}, pages = {345--370}, year = {2023}, url = {https://doi.org/10.1007/s11277-022-10100-w}, doi = {10.1007/S11277-022-10100-W}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/ShailajaSTGBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Wang0LLG23, author = {Yiwen Wang and Lei Xu and Wanli Liu and Rongzhen Li and Junjie Gu}, title = {Network Intrusion Detection Based on Explainable Artificial Intelligence}, journal = {Wirel. Pers. Commun.}, volume = {131}, number = {2}, pages = {1115--1130}, year = {2023}, url = {https://doi.org/10.1007/s11277-023-10472-7}, doi = {10.1007/S11277-023-10472-7}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/Wang0LLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FrijiOS23, author = {Hamdi Friji and Alexis Olivereau and Mireille Sarkiss}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Efficient Network Representation for GNN-Based Intrusion Detection}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13905}, pages = {532--554}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33488-7\_20}, doi = {10.1007/978-3-031-33488-7\_20}, timestamp = {Fri, 02 Jun 2023 14:41:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/FrijiOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acr/RaisKNK23, author = {Rao Naveed Bin Rais and Osman Khalid and Jazib{-}e Nazar and Muhammad Usman Shahid Khan}, editor = {Kevin Daimi and Abeer Alsadoon}, title = {Analysis of Intrusion Detection Using Ensemble Stacking-Based Machine Learning Techniques in IoT Networks}, booktitle = {Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23), Orlando, FL, USA, 8-10 May 2023}, series = {Lecture Notes in Networks and Systems}, volume = {700}, pages = {329--344}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33743-7\_27}, doi = {10.1007/978-3-031-33743-7\_27}, timestamp = {Mon, 21 Aug 2023 08:35:10 +0200}, biburl = {https://dblp.org/rec/conf/acr/RaisKNK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/AlalmaieNH23, author = {Abeer Z. Alalmaie and Priyadarsi Nanda and Xiangjian He}, title = {Zero Trust Network Intrusion Detection System {(NIDS)} using Auto Encoder for Attention-based CNN-BiLSTM}, booktitle = {Proceedings of the 2023 Australasian Computer Science Week, {ACSW} 2023, Melbourne, VIC, Australia, 30 January 2023- 3 February 2023}, pages = {1--9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579375.3579376}, doi = {10.1145/3579375.3579376}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsw/AlalmaieNH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adma/LiuCQ23, author = {Wanxiao Liu and Jue Chen and Xihe Qiu}, editor = {Xiaochun Yang and Heru Suhartanto and Guoren Wang and Bin Wang and Jing Jiang and Bing Li and Huaijie Zhu and Ningning Cui}, title = {{CRNN-SA:} {A} Network Intrusion Detection Method Based on Deep Learning}, booktitle = {Advanced Data Mining and Applications - 19th International Conference, {ADMA} 2023, Shenyang, China, August 21-23, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14177}, pages = {471--485}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-46664-9\_32}, doi = {10.1007/978-3-031-46664-9\_32}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/adma/LiuCQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/BahlaliB23, author = {Ahmed Ramzi Bahlali and Abdelmalik Bachir}, editor = {Leonard Barolli}, title = {Machine Learning Anomaly-Based Network Intrusion Detection: Experimental Evaluation}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Juiz de Fora, Brazil, 29-31 March 2023, Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {654}, pages = {392--403}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-28451-9\_34}, doi = {10.1007/978-3-031-28451-9\_34}, timestamp = {Thu, 16 Mar 2023 10:11:29 +0100}, biburl = {https://dblp.org/rec/conf/aina/BahlaliB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SoulaMMP23, author = {Meriem Soula and Bacem Mbarek and Aref Meddeb and Tom{\'{a}}s Pitner}, editor = {Leonard Barolli}, title = {A Survey of Intrusion Detection-Based Trust Management Approaches in IoT Networks}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Juiz de Fora, Brazil, 29-31 March 2023, Volume 3}, series = {Lecture Notes in Networks and Systems}, volume = {655}, pages = {504--517}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-28694-0\_48}, doi = {10.1007/978-3-031-28694-0\_48}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/SoulaMMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ViegasMOS23, author = {Eduardo K. Viegas and Everton de Matos and Paulo R. de Oliveira and Altair O. Santin}, editor = {Leonard Barolli}, title = {A Dynamic Machine Learning Scheme for Reliable Network-Based Intrusion Detection}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Juiz de Fora, Brazil, 29-31 March 2023, Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {654}, pages = {439--451}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-28451-9\_39}, doi = {10.1007/978-3-031-28451-9\_39}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/ViegasMOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisp/GongJJZ23, author = {Zhongyuan Gong and Jinyun Jiang and Nan Jiang and Yuejin Zhang}, editor = {Jaideep Vaidya and Moncef Gabbouj and Jin Li}, title = {An Improved Hybrid Sampling Model for Network Intrusion Detection Based on Data Imbalance}, booktitle = {Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS{\&}P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14510}, pages = {164--175}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9788-6\_14}, doi = {10.1007/978-981-99-9788-6\_14}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aisp/GongJJZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/AssyMEM23, author = {Ahmed Tamer Assy and Yahia Mostafa and Ahmed Abd El{-}Khaleq and Maggie Mashaly}, editor = {Elhadi M. Shakshuki and Ansar{-}Ul{-}Haque Yasar}, title = {Anomaly-Based Intrusion Detection System using One-Dimensional Convolutional Neural Network}, booktitle = {The 14th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2023) / The 6th International Conference on Emerging Data and Industry 4.0 {(EDI40} 2023) / Affiliated Workshops, March 15-17, 2023, Leuven, Belgium}, series = {Procedia Computer Science}, volume = {220}, pages = {78--85}, publisher = {Elsevier}, year = {2023}, url = {https://doi.org/10.1016/j.procs.2023.03.013}, doi = {10.1016/J.PROCS.2023.03.013}, timestamp = {Tue, 12 Sep 2023 15:26:58 +0200}, biburl = {https://dblp.org/rec/conf/ant/AssyMEM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apit/Wang23, author = {Wenxi Wang}, title = {An Improved {ELM} Wireless Sensor Network Intrusion Detection Model Based on an Optimization Algorithm}, booktitle = {Proceedings of the 2023 5th Asia Pacific Information Technology Conference, {APIT} 2023, Ho Chi Minh City, Vietnam, February 9-11, 2023}, pages = {95--102}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3588155.3588170}, doi = {10.1145/3588155.3588170}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apit/Wang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apnoms/LeeKC23, author = {Beom{-}Su Lee and Jong{-}Wouk Kim and Mi{-}Jung Choi}, title = {Federated Learning Based Network Intrusion Detection Model}, booktitle = {24st Asia-Pacific Network Operations and Management Symposium, {APNOMS} 2023, Sejong, Korea, Republic of, September 6-8, 2023}, pages = {330--333}, publisher = {{IEEE}}, year = {2023}, url = {https://ieeexplore.ieee.org/document/10258140}, timestamp = {Mon, 02 Oct 2023 20:30:43 +0200}, biburl = {https://dblp.org/rec/conf/apnoms/LeeKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bcd/PengLLL23, author = {Tzu{-}En Peng and I{-}Hsien Liu and Jung{-}Shian Li and Chuan{-}Kang Liu}, title = {Network Intrusion Detection Using CNN-based Classification Method}, booktitle = {8th {IEEE/ACIS} International Conference on Big Data, Cloud Computing, and Data Science, {BCD} 2023, Hochimin City, Vietnam, December 14-16, 2023}, pages = {361--364}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BCD57833.2023.10466285}, doi = {10.1109/BCD57833.2023.10466285}, timestamp = {Tue, 02 Apr 2024 21:06:06 +0200}, biburl = {https://dblp.org/rec/conf/bcd/PengLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdcloud/GaoHLDZ23, author = {Kai Gao and Hao Huang and Linhong Liu and Ronghua Du and Jinlai Zhang}, title = {A Multi-attention Based CNN-BiLSTM Intrusion Detection Model for In-vehicle Networks}, booktitle = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom, 2023, Wuhan, China, December 21-24, 2023}, pages = {809--816}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00138}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM59178.2023.00138}, timestamp = {Thu, 18 Apr 2024 16:12:26 +0200}, biburl = {https://dblp.org/rec/conf/bdcloud/GaoHLDZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdcloud/LongLC0023, author = {Jing Long and Cuiting Luo and Ruxin Chen and Wei Liang and Zheng Qin}, title = {Adaboost-based Graph Convolutional Networks with Channel Attention for Intrusion Detection in Internet-of-Things}, booktitle = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom, 2023, Wuhan, China, December 21-24, 2023}, pages = {207--212}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00060}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM59178.2023.00060}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bdcloud/LongLC0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdmip/ZengLX23, author = {Jing Zeng and Shuo Li and Xiangsen Xu}, title = {Simulation Design of a Network Security Intrusion Detection Model for Cloud Computing Based on Neural Network Model}, booktitle = {Proceedings of the International Conference on Big Data Mining and Information Processing, {BDMIP} 2023, Xiamen City, China, China, November 17-19, 2023}, pages = {111--115}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3645279.3645299}, doi = {10.1145/3645279.3645299}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bdmip/ZengLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caasafeproc/ZhangWWWZ23, author = {Lina Zhang and Yang Wang and Minyue Wu and Yanwei Wang and Ying Zheng}, title = {Network Intrusion Detection Based on Graph Neural Network and Ensemble Learning}, booktitle = {{CAA} Symposium on Fault Detection, Supervision and Safety for Technical Processes, {SAFEPROCESS} 2023, Yibin, China, September 22-24, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SAFEPROCESS58597.2023.10295926}, doi = {10.1109/SAFEPROCESS58597.2023.10295926}, timestamp = {Thu, 16 Nov 2023 16:58:41 +0100}, biburl = {https://dblp.org/rec/conf/caasafeproc/ZhangWWWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccwc/GuoPLLPH23, author = {Ge Guo and Xuefeng Pan and He Liu and Fen Li and Lang Pei and Kewei Hu}, title = {An IoT Intrusion Detection System Based on {TON} IoT Network Dataset}, booktitle = {13th {IEEE} Annual Computing and Communication Workshop and Conference, {CCWC} 2023, Las Vegas, NV, USA, March 8-11, 2023}, pages = {333--338}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CCWC57344.2023.10099144}, doi = {10.1109/CCWC57344.2023.10099144}, timestamp = {Wed, 26 Apr 2023 16:58:06 +0200}, biburl = {https://dblp.org/rec/conf/ccwc/GuoPLLPH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccwc/WangMDF23, author = {Lidong Wang and Reed L. Mosher and Patti Duett and Terril C. Falls}, title = {Data Analytics of Network Intrusion Based on Deep Neural Networks with Weights Initialized by Stacked Autoencoders and Deep Belief Networks}, booktitle = {13th {IEEE} Annual Computing and Communication Workshop and Conference, {CCWC} 2023, Las Vegas, NV, USA, March 8-11, 2023}, pages = {511--515}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CCWC57344.2023.10099108}, doi = {10.1109/CCWC57344.2023.10099108}, timestamp = {Wed, 26 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccwc/WangMDF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/FarzanehSMT23, author = {Behnam Farzaneh and Nashid Shahriar and Abu Hena Al Muktadir and Md. Shamim Towhid}, title = {{DTL-IDS:} Deep Transfer Learning-Based Intrusion Detection System in 5G Networks}, booktitle = {19th International Conference on Network and Service Management, {CNSM} 2023, Niagara Falls, ON, Canada, October 30 - Nov. 2, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CNSM59352.2023.10327918}, doi = {10.23919/CNSM59352.2023.10327918}, timestamp = {Tue, 05 Dec 2023 20:47:36 +0100}, biburl = {https://dblp.org/rec/conf/cnsm/FarzanehSMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/DayIB23, author = {Patrick Day and Stefano Iannucci and Ioana Banicescu}, editor = {Hossain Shahriar and Yuuichi Teranishi and Alfredo Cuzzocrea and Moushumi Sharmin and Dave Towey and A. K. M. Jahangir Alam Majumder and Hiroki Kashiwazaki and Ji{-}Jiang Yang and Michiharu Takemoto and Nazmus Sakib and Ryohei Banno and Sheikh Iqbal Ahamed}, title = {Generating Host-Based Data from Network Traces for Intrusion Detection}, booktitle = {47th {IEEE} Annual Computers, Software, and Applications Conference, {COMPSAC} 2023, Torino, Italy, June 26-30, 2023}, pages = {268--273}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/COMPSAC57700.2023.00041}, doi = {10.1109/COMPSAC57700.2023.00041}, timestamp = {Mon, 07 Aug 2023 15:56:21 +0200}, biburl = {https://dblp.org/rec/conf/compsac/DayIB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/RahmanSCHR23, author = {Md. Abdur Rahman and Hossain Shahriar and Victor Clincy and Md Faruque Hossain and Muhammad Asadur Rahman}, editor = {Hossain Shahriar and Yuuichi Teranishi and Alfredo Cuzzocrea and Moushumi Sharmin and Dave Towey and A. K. M. Jahangir Alam Majumder and Hiroki Kashiwazaki and Ji{-}Jiang Yang and Michiharu Takemoto and Nazmus Sakib and Ryohei Banno and Sheikh Iqbal Ahamed}, title = {A Quantum Generative Adversarial Network-based Intrusion Detection System}, booktitle = {47th {IEEE} Annual Computers, Software, and Applications Conference, {COMPSAC} 2023, Torino, Italy, June 26-30, 2023}, pages = {1810--1815}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/COMPSAC57700.2023.00280}, doi = {10.1109/COMPSAC57700.2023.00280}, timestamp = {Mon, 07 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/RahmanSCHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/CasajusSetienBL23, author = {Jorge Casaj{\'{u}}s{-}Seti{\'{e}}n and Concha Bielza and Pedro Larra{\~{n}}aga}, title = {Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023}, pages = {72--77}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSR57506.2023.10224965}, doi = {10.1109/CSR57506.2023.10224965}, timestamp = {Wed, 06 Sep 2023 08:09:39 +0200}, biburl = {https://dblp.org/rec/conf/csr2/CasajusSetienBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/TermosGBFJZ23, author = {Mortada Termos and Zakariya Ghalmane and Mohamed{-}el{-}Amine Brahmia and Ahmad Fadlallah and Ali Jaber and Mourad Zghal}, title = {Intrusion Detection System for IoT Based on Complex Networks and Machine Learning}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023, Abu Dhabi, United Arab Emirates, November 14-17, 2023}, pages = {471--477}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361433}, doi = {10.1109/DASC/PICOM/CBDCOM/CY59711.2023.10361433}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/TermosGBFJZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ChenXLLC23, author = {Xiansen Chen and Kun Xiao and Lei Luo and Yun Li and Lirong Chen}, title = {{GAN-IVDS:} An Intrusion Detection System for Intelligent Connected Vehicles Based on Generative Adversarial Networks}, booktitle = {8th International Conference on Data Science in Cyberspace, {DSC} 2023, Hefei, China, August 18-20, 2023}, pages = {237--244}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC59305.2023.00042}, doi = {10.1109/DSC59305.2023.00042}, timestamp = {Fri, 09 Feb 2024 20:38:47 +0100}, biburl = {https://dblp.org/rec/conf/dsc/ChenXLLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/LuLQ23, author = {Zhuoer Lu and Xiaoyong Li and Pengfei Qiu}, title = {An AdamW-Based Deep Neural Network Using Feature Selection and Data Oversampling for Intrusion Detection}, booktitle = {8th International Conference on Data Science in Cyberspace, {DSC} 2023, Hefei, China, August 18-20, 2023}, pages = {213--220}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC59305.2023.00039}, doi = {10.1109/DSC59305.2023.00039}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/LuLQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dtesi/AliRYNAK23, author = {Mohsin Ali and Abdul Razaque and Damelya M. Yeskendirova and Talgat A. Nurlybayev and Nessibeli Y. Askarbekova and Zarina A. Kashaganova}, editor = {Askar Khikmetov and Kateryna Kolesnikova and Madina T. Ipalakova}, title = {Enhancing Cloud Computing Security through AI-Based Intelligent Intrusion Detection Leveraging Neural Networks and Artificial Bee Colony Optimization}, booktitle = {Workshops and Short Paper Proceedings of the 8th International Conference on Digital Technologies in Education, Science and Industry 2023, Almaty, Kazakhstan, December 6-7, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3680}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3680/S4Paper5.pdf}, timestamp = {Tue, 21 May 2024 17:19:33 +0200}, biburl = {https://dblp.org/rec/conf/dtesi/AliRYNAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DiasVFPMV23, author = {Tiago Fontes Dias and Jo{\~{a}}o Vitorino and Tiago Fonseca and Isabel Pra{\c{c}}a and Eva Maia and Maria Jo{\~{a}}o Viamonte}, editor = {Sokratis K. Katsikas and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Rita Maria Ugarelli and Isabel Pra{\c{c}}a and Wenjuan Li and Weizhi Meng and Steven Furnell and Basel Katt and Sandeep Pirbhulal and Ankur Shukla and Michele Ianni and Mila Dalla Preda and Kim{-}Kwang Raymond Choo and Miguel Pupo Correia and Abhishta Abhishta and Giovanni Sileno and Mina Alishahi and Harsha K. Kalutarage and Naoto Yanai}, title = {Unravelling Network-Based Intrusion Detection: {A} Neutrosophic Rule Mining and Optimization Framework}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14399}, pages = {59--75}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54129-2\_4}, doi = {10.1007/978-3-031-54129-2\_4}, timestamp = {Mon, 25 Mar 2024 20:43:51 +0100}, biburl = {https://dblp.org/rec/conf/esorics/DiasVFPMV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GiagkosKLP23, author = {Dimitrios Giagkos and Orestis Kompougias and Antonis Litke and Nikolaos Papadakis}, editor = {Sokratis K. Katsikas and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Rita Maria Ugarelli and Isabel Pra{\c{c}}a and Wenjuan Li and Weizhi Meng and Steven Furnell and Basel Katt and Sandeep Pirbhulal and Ankur Shukla and Michele Ianni and Mila Dalla Preda and Kim{-}Kwang Raymond Choo and Miguel Pupo Correia and Abhishta Abhishta and Giovanni Sileno and Mina Alishahi and Harsha K. Kalutarage and Naoto Yanai}, title = {ZeekFlow: Deep Learning-Based Network Intrusion Detection a Multimodal Approach}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14399}, pages = {409--425}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54129-2\_24}, doi = {10.1007/978-3-031-54129-2\_24}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GiagkosKLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HongPRM23, author = {Xin Hong and Zafeirios C. Papazachos and Jes{\'{u}}s Mart{\'{\i}}nez del Rinc{\'{o}}n and Paul Miller}, editor = {Sokratis K. Katsikas and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Rita Maria Ugarelli and Isabel Pra{\c{c}}a and Wenjuan Li and Weizhi Meng and Steven Furnell and Basel Katt and Sandeep Pirbhulal and Ankur Shukla and Michele Ianni and Mila Dalla Preda and Kim{-}Kwang Raymond Choo and Miguel Pupo Correia and Abhishta Abhishta and Giovanni Sileno and Mina Alishahi and Harsha K. Kalutarage and Naoto Yanai}, title = {Network Intrusion Detection by Variational Component-Based Feature Saliency Gaussian Mixture Clustering}, booktitle = {Computer Security. {ESORICS} 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14399}, pages = {761--772}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54129-2\_45}, doi = {10.1007/978-3-031-54129-2\_45}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HongPRM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/ParkPSK23, author = {Cheolhee Park and Kyungmin Park and Jihyeon Song and Jonghyun Kim}, title = {Distributed Learning-Based Intrusion Detection in 5G and Beyond Networks}, booktitle = {2023 Joint European Conference on Networks and Communications {\&} 6G Summit, EuCNC/6G Summit 2023, Gothenburg, Sweden, June 6-9, 2023}, pages = {490--495}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuCNC/6GSummit58263.2023.10188312}, doi = {10.1109/EUCNC/6GSUMMIT58263.2023.10188312}, timestamp = {Mon, 31 Jul 2023 13:56:43 +0200}, biburl = {https://dblp.org/rec/conf/eucnc/ParkPSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdse/NguyenTL23, author = {Dinh Hoang Nguyen and Nam Khanh Tran and Nhien{-}An Le{-}Khac}, editor = {Tran Khanh Dang and Josef K{\"{u}}ng and Tai M. Chung}, title = {A Siamese-Based Approach for Network Intrusion Detection Systems in Software-Defined Networks}, booktitle = {Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications - 10th International Conference, {FDSE} 2023, Da Nang, Vietnam, November 22-24, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1925}, pages = {199--211}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8296-7\_14}, doi = {10.1007/978-981-99-8296-7\_14}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdse/NguyenTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficloud/GuidaNMP23, author = {Ciro Guida and Alfredo Nascita and Antonio Montieri and Antonio Pescap{\`{e}}}, editor = {Irfan Awan and Muhammad Younas and Markus Aleksy}, title = {Cross-Evaluation of Deep Learning-based Network Intrusion Detection Systems}, booktitle = {10th International Conference on Future Internet of Things and Cloud, FiCloud 2023, Marrakesh, Morocco, August 14-16, 2023}, pages = {328--335}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/FiCloud58648.2023.00055}, doi = {10.1109/FICLOUD58648.2023.00055}, timestamp = {Tue, 07 May 2024 20:09:20 +0200}, biburl = {https://dblp.org/rec/conf/ficloud/GuidaNMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficta/GandhiBSV23, author = {K. Indra Gandhi and Sudharsan Balaji and S. Srikanth and V. Suba Varshini}, editor = {Vikrant Bhateja and Xin{-}She Yang and Marta Campos Ferreira and Sandeep Singh Sengar and Carlos M. Travieso{-}Gonz{\'{a}}lez}, title = {Ensemble Machine Learning-Based Network Intrusion Detection System}, booktitle = {Evolution in Computational Intelligence - Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April, 2023}, series = {Smart Innovation, Systems and Technologies}, volume = {370}, pages = {135--144}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-6702-5\_11}, doi = {10.1007/978-981-99-6702-5\_11}, timestamp = {Tue, 28 Nov 2023 13:56:20 +0100}, biburl = {https://dblp.org/rec/conf/ficta/GandhiBSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/SusskindABDMBLF23, author = {Zachary Susskind and Aman Arora and Alan T. L. Bacellar and Diego Leonel Cadette Dutra and Igor D. S. Miranda and Maur{\'{\i}}cio Breternitz and Priscila M. V. Lima and Felipe M. G. Fran{\c{c}}a and Lizy K. John}, editor = {Paolo Ienne and Zhiru Zhang}, title = {An FPGA-Based Weightless Neural Network for Edge Network Intrusion Detection}, booktitle = {Proceedings of the 2023 {ACM/SIGDA} International Symposium on Field Programmable Gate Arrays, {FPGA} 2023, Monterey, CA, USA, February 12-14, 2023}, pages = {232}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543622.3573140}, doi = {10.1145/3543622.3573140}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpga/SusskindABDMBLF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HoslerSZLG23, author = {Ryan Hosler and Agnideven Palanisamy Sundar and Xukai Zou and Feng Li and Tianchong Gao}, title = {Unsupervised Deep Learning for an Image Based Network Intrusion Detection System}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {6825--6831}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10437636}, doi = {10.1109/GLOBECOM54140.2023.10437636}, timestamp = {Sun, 10 Mar 2024 10:39:12 +0100}, biburl = {https://dblp.org/rec/conf/globecom/HoslerSZLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiuSNK23, author = {Jinxin Liu and Murat Simsek and Michele Nogueira and Burak Kantarci}, title = {Multidomain transformer-based deep learning for early detection of network intrusion}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {6056--6061}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10436976}, doi = {10.1109/GLOBECOM54140.2023.10436976}, timestamp = {Sun, 10 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiuSNK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/NguyenL23, author = {Thai Vu Nguyen and Long Bao Le}, title = {Attention-Based Interpretable Semi-Supervised Federated Learning for Intrusion Detection in IoT Wireless Networks}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {6832--6837}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10437120}, doi = {10.1109/GLOBECOM54140.2023.10437120}, timestamp = {Sun, 10 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/NguyenL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/IslamOUY23, author = {Md Rezanur Islam and Insu Oh and Muminov Ibrokhim Botir Ugli and Kangbin Yim}, title = {Enhancing In-Vehicle Network Security Through Bitstream Feature Extraction-Based Intrusion Detection}, booktitle = {Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, IC3-2023, Noida, India, August 3-5, 2023}, pages = {224--229}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607947.3607989}, doi = {10.1145/3607947.3607989}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic3/IslamOUY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3i/MishraMPMRK23, author = {Ishaan Mishra and Shalaka S. Mahadik and Pranav M. Pawar and Raja Muthalagu and Elakkiya R and Nandkumar Kulkarni}, title = {Learning-Tree Based Network Intrusion Detection for IoT}, booktitle = {6th International Conference on Contemporary Computing and Informatics, {IC3I} 2023, Gautam Buddha Nagar, India, September 14-16, 2023}, pages = {756--761}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IC3I59117.2023.10398156}, doi = {10.1109/IC3I59117.2023.10398156}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic3i/MishraMPMRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/DuanCJL23, author = {Yali Duan and Jianming Cui and Yungang Jia and Ming Liu}, editor = {Zahir Tari and Keqiu Li and Hongyi Wu}, title = {Intrusion Detection Method for Networked Vehicles Based on Data-Enhanced {DBN}}, booktitle = {Algorithms and Architectures for Parallel Processing - 23rd International Conference, {ICA3PP} 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14488}, pages = {40--52}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0801-7\_3}, doi = {10.1007/978-981-97-0801-7\_3}, timestamp = {Mon, 11 Mar 2024 15:20:45 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/DuanCJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaart/TalpiniSS23, author = {Jacopo Talpini and Fabio Sartori and Marco Savi}, editor = {Ana Paula Rocha and Luc Steels and H. Jaap van den Herik}, title = {A Clustering Strategy for Enhanced FL-Based Intrusion Detection in IoT Networks}, booktitle = {Proceedings of the 15th International Conference on Agents and Artificial Intelligence, {ICAART} 2023, Volume 3, Lisbon, Portugal, February 22-24, 2023}, pages = {152--160}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0011627500003393}, doi = {10.5220/0011627500003393}, timestamp = {Tue, 09 May 2023 16:57:00 +0200}, biburl = {https://dblp.org/rec/conf/icaart/TalpiniSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbase/WangSJZ23, author = {Mengshu Wang and Kai Shi and Anxing Jiang and Zeri Zhang}, title = {Constructing Weighted Host Communication Networks for Intrusion Detection based on Complex Network Theory}, booktitle = {4th International Conference on Big Data {\&} Artificial Intelligence {\&} Software Engineering, {ICBASE} 2023, Nanjing, China, August 25-27, 2023}, pages = {424--428}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICBASE59196.2023.10303106}, doi = {10.1109/ICBASE59196.2023.10303106}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbase/WangSJZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KamaliCK23, author = {Anas El Kamali and Khalid Chougdali and Abdellatif Kobbane}, title = {A New Intrusion Detection System Based on Convolutional Neural Network}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {2994--2999}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10279012}, doi = {10.1109/ICC45041.2023.10279012}, timestamp = {Thu, 02 Nov 2023 17:09:41 +0100}, biburl = {https://dblp.org/rec/conf/icc/KamaliCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/YangZXW23, author = {Shuo Yang and Xinran Zheng and Zhengzhuo Xu and Xingjun Wang}, title = {A Lightweight Approach for Network Intrusion Detection Based on Self-Knowledge Distillation}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {3000--3005}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10279691}, doi = {10.1109/ICC45041.2023.10279691}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/YangZXW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccais/TranNN23, author = {Quoc Trung Tran and Van Quan Nguyen and Thanh Long Ngo}, title = {Particle Swarm Optimization of Deep Auto-Encoder Network Architectures for Anomaly-based Intrusion Detection Systems}, booktitle = {12th International Conference on Control, Automation and Information Sciences, {ICCAIS} 2023, Hanoi, Vietnam, November 27-29, 2023}, pages = {553--559}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCAIS59597.2023.10382282}, doi = {10.1109/ICCAIS59597.2023.10382282}, timestamp = {Fri, 09 Feb 2024 20:38:50 +0100}, biburl = {https://dblp.org/rec/conf/iccais/TranNN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/KarthikeyanBKK23, author = {N. Karthikeyan and Jajjara Bhargav and Muthu Subash Kavitha and S. Karthik}, title = {QoS Based Hybrid Swarm Intelligent Intrusion Detection System for Network Security}, booktitle = {14th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCNT56998.2023.10307865}, doi = {10.1109/ICCCNT56998.2023.10307865}, timestamp = {Thu, 30 Nov 2023 16:40:53 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/KarthikeyanBKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/TelidevaraK23, author = {Madhuri Telidevara and D. Kothandaraman}, title = {Improving Intrusion Detection in Internet of Things Networks with Feed-Forward Neural Networks Based on the {UNSW-NB15} Dataset}, booktitle = {14th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCNT56998.2023.10307804}, doi = {10.1109/ICCCNT56998.2023.10307804}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/TelidevaraK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/VMRS23, author = {Harshini Sivakami V and Nivedhidha M and M. P. Ramkumar and G. S. R. Emil Selvan}, title = {CopulaGAN Boosted Random Forest based Network Intrusion Detection System for Hospital Network Infrastructure}, booktitle = {14th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCNT56998.2023.10306951}, doi = {10.1109/ICCCNT56998.2023.10306951}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/VMRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/VenkatesanJB23, author = {C. Venkatesan and S. Jeevanantham and Rebekka B.}, title = {Incentive-based Energy-efficient Federated Learning Aggregation for Intrusion Detection in IoT Sensor Network}, booktitle = {14th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCNT56998.2023.10306340}, doi = {10.1109/ICCCNT56998.2023.10306340}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/VenkatesanJB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsp/SubramaniSKTAK23, author = {Shalini Subramani and Munuswamy Selvi and S. V. N. Santhosh Kumar and K. Thangaramya and M. Anand and Arputharaj Kannan}, editor = {Eunika Mercier{-}Laurent and Xavier Fernando and Aravindan Chandrabose}, title = {An Intrusion Detection System for Securing IoT Based Sensor Networks from Routing Attacks}, booktitle = {Computer, Communication, and Signal Processing. AI, Knowledge Engineering and IoT for Smart Systems - 7th {IFIP} {TC} 12 International Conference, {ICCCSP} 2023, Chennai, India, January 4-6, 2023, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {670}, pages = {321--334}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-39811-7\_26}, doi = {10.1007/978-3-031-39811-7\_26}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsp/SubramaniSKTAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icce-tw/WuWCLHT23, author = {Ming{-}Yen Wu and Sz{-}Hsien Wu and Yu{-}En Chang and Yu{-}Hsiang Lin and Sin{-}Jie Huang and Hsiao{-}Ting Tseng}, title = {Intrusion Detection with Radio Frequency Sensing based on Wi-Fi Mesh Network for Home Security}, booktitle = {International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2023, PingTung, Taiwan, July 17-19, 2023}, pages = {329--330}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCE-Taiwan58799.2023.10226838}, doi = {10.1109/ICCE-TAIWAN58799.2023.10226838}, timestamp = {Fri, 08 Sep 2023 15:28:17 +0200}, biburl = {https://dblp.org/rec/conf/icce-tw/WuWCLHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccse2/Lan23, author = {Hai Lan}, editor = {Wenxing Hong and Geetha Kanaparan}, title = {Research of Network Intrusion Detection Based on Improved Seagull Optimization Algorithm with Deep Learning}, booktitle = {Computer Science and Education. Computer Science and Technology - 18th International Conference, {ICCSE} 2023, Sepang, Malaysia, December 1-7, 2023, Proceedings, Part {I}}, series = {Communications in Computer and Information Science}, volume = {2023}, pages = {100--112}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0730-0\_10}, doi = {10.1007/978-981-97-0730-0\_10}, timestamp = {Thu, 25 Apr 2024 17:26:40 +0200}, biburl = {https://dblp.org/rec/conf/iccse2/Lan23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccse2/YuHZ23, author = {Jun Yu and Jiwei Hu and Yong Zeng}, editor = {Wenxing Hong and Geetha Kanaparan}, title = {Deep Learning Based Network Intrusion Detection}, booktitle = {Computer Science and Education. Computer Science and Technology - 18th International Conference, {ICCSE} 2023, Sepang, Malaysia, December 1-7, 2023, Proceedings, Part {I}}, series = {Communications in Computer and Information Science}, volume = {2023}, pages = {125--136}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0730-0\_12}, doi = {10.1007/978-981-97-0730-0\_12}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccse2/YuHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsie/LiuC23, author = {Xiaomei Liu and Yujing Cao}, title = {Research on Network Intrusion Detection Techniques Based on Feature Selection Model and Recurrent Neural Network}, booktitle = {Proceedings of the 8th International Conference on Cyber Security and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September 22-24, 2023}, pages = {45--51}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617184.3617780}, doi = {10.1145/3617184.3617780}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsie/LiuC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsie/ZhaoHS23, author = {Xing Zhao and Jie Heng and Qian Sun}, title = {Research on Network Intrusion Simulation and Adversarial Strategies Based on Generate Adversarial Networks}, booktitle = {Proceedings of the 8th International Conference on Cyber Security and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September 22-24, 2023}, pages = {356--360}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617184.3630162}, doi = {10.1145/3617184.3630162}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsie/ZhaoHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/KhareB23, author = {Nishad Khare and Sonali Bhutad}, title = {Intrusion Detection System for Live Anomaly-Based Network Packets}, booktitle = {{IEEE} International Carnahan Conference on Security Technology, {ICCST} 2023, Pune, India, October 11-15, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCST59048.2023.10474242}, doi = {10.1109/ICCST59048.2023.10474242}, timestamp = {Tue, 16 Apr 2024 14:15:02 +0200}, biburl = {https://dblp.org/rec/conf/iccst/KhareB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/PawlickaPKC23, author = {Aleksandra Pawlicka and Marek Pawlicki and Rafal Kozik and Michal Choras}, editor = {Jihe Wang and Yi He and Thang N. Dinh and Christan Grant and Meikang Qiu and Witold Pedrycz}, title = {The Need for Practical Legal and Ethical Guidelines for Explainable AI-based Network Intrusion Detection Systems}, booktitle = {{IEEE} International Conference on Data Mining, {ICDM} 2023 - Workshops, Shanghai, China, December 4, 2023}, pages = {253--261}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICDMW60847.2023.00038}, doi = {10.1109/ICDMW60847.2023.00038}, timestamp = {Tue, 13 Feb 2024 13:22:54 +0100}, biburl = {https://dblp.org/rec/conf/icdm/PawlickaPKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icise/Chen23, author = {Yao Chen}, title = {Design and implementation of a computer network intrusion detection system based on convolutional neural network}, booktitle = {8th International Conference on Information Systems Engineering, {ICISE} 2023, Dalian, China, June 23-25, 2023}, pages = {64--69}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICISE60366.2023.00021}, doi = {10.1109/ICISE60366.2023.00021}, timestamp = {Thu, 23 Nov 2023 21:16:33 +0100}, biburl = {https://dblp.org/rec/conf/icise/Chen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icise/Chen23a, author = {Yao Chen}, title = {Construction of a computer network fault analysis and intrusion detection system based on K-means clustering algorithm}, booktitle = {8th International Conference on Information Systems Engineering, {ICISE} 2023, Dalian, China, June 23-25, 2023}, pages = {70--75}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICISE60366.2023.00022}, doi = {10.1109/ICISE60366.2023.00022}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icise/Chen23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmtel/MaW23, author = {Xingfei Ma and Wuguang Wang}, editor = {Bing Wang and Zuojin Hu and Xianwei Jiang and Yu{-}Dong Zhang}, title = {Research on Random Intrusion Depth Detection of Internet of Things Based on 3D Convolutional Neural Network}, booktitle = {Multimedia Technology and Enhanced Learning - 5th {EAI} International Conference, {ICMTEL} 2023, Leicester, UK, April 28-29, 2023, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {532}, pages = {262--276}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50571-3\_19}, doi = {10.1007/978-3-031-50571-3\_19}, timestamp = {Tue, 30 Apr 2024 13:48:13 +0200}, biburl = {https://dblp.org/rec/conf/icmtel/MaW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-dm/KhanAAD23, author = {Inam Ullah Khan and Muhammad Yaseen Ayub and Asrin Abdollahi and Arijit Dutta}, title = {A Hybrid Deep Learning Model-Based Intrusion Detection System for Emergency Planning Using IoT-Network}, booktitle = {International Conference on Information and Communication Technologies for Disaster Management, {ICT-DM} 2023, Cosenza, Italy, September 13-15, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICT-DM58371.2023.10286954}, doi = {10.1109/ICT-DM58371.2023.10286954}, timestamp = {Wed, 08 Nov 2023 17:21:49 +0100}, biburl = {https://dblp.org/rec/conf/ict-dm/KhanAAD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/IzuazuKL23, author = {Urslla Uchechi Izuazu and Dong{-}Seong Kim and Jae Min Lee}, title = {Unravelling the Black Box: Enhancing Virtual Reality Network Security with Interpretable Deep Learning-Based Intrusion Detection System}, booktitle = {14th International Conference on Information and Communication Technology Convergence, {ICTC} 2023, Jeju Island, Korea, Republic of, October 11-13, 2023}, pages = {928--931}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICTC58733.2023.10392826}, doi = {10.1109/ICTC58733.2023.10392826}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/IzuazuKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifipiot/ZambareL23, author = {Pallavi Zambare and Ying Liu}, editor = {Deepak Puthal and Saraju P. Mohanty and Baek{-}Young Choi}, title = {An Optimized Graph Neural Network-Based Approach for Intrusion Detection in Smart Vehicles}, booktitle = {Internet of Things. Advances in Information and Communication Technology - 6th {IFIP} International Cross-Domain Conference, IFIPIoT 2023, Denton, TX, USA, November 2-3, 2023, Proceedings, Part {I}}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {683}, pages = {3--17}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45878-1\_1}, doi = {10.1007/978-3-031-45878-1\_1}, timestamp = {Tue, 30 Jan 2024 10:11:54 +0100}, biburl = {https://dblp.org/rec/conf/ifipiot/ZambareL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/ChenGFSMW23, author = {Junjun Chen and Qiang Guo and Zhongnan Fu and Qun Shang and Hao Ma and Nai Wang}, title = {Semi-supervised Campus Network Intrusion Detection Based on Knowledge Distillation}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2023, Gold Coast, Australia, June 18-23, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IJCNN54540.2023.10191988}, doi = {10.1109/IJCNN54540.2023.10191988}, timestamp = {Wed, 09 Aug 2023 16:25:09 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/ChenGFSMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/AhmadAKN23, author = {Rayed S. Ahmad and Asmer H. Ali and Syed M. Kazim and Quamar Niyaz}, title = {A {GAF} and {CNN} based Wi-Fi Network Intrusion Detection System}, booktitle = {{IEEE} {INFOCOM} 2023 - {IEEE} Conference on Computer Communications Workshop, Hoboken, NJ, USA, May 20, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10226036}, doi = {10.1109/INFOCOMWKSHPS57453.2023.10226036}, timestamp = {Tue, 05 Sep 2023 20:33:23 +0200}, biburl = {https://dblp.org/rec/conf/infocom/AhmadAKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotsms/BensaidLS23, author = {Radjaa Bensaid and Nabila Labraoui and Haythem Bany Salameh}, editor = {Muhannad Quwaider and Yaser Jararweh}, title = {Federated Deep Learning-based Intrusion Detection Approach for Enhancing Privacy in Fog-IoT Networks}, booktitle = {10th International Conference on Internet of Things: Systems, Management and Security, {IOTSMS} 2023, San Antonio, TX, USA, October 23-25, 2023}, pages = {156--160}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IOTSMS59855.2023.10325826}, doi = {10.1109/IOTSMS59855.2023.10325826}, timestamp = {Sat, 09 Dec 2023 09:49:48 +0100}, biburl = {https://dblp.org/rec/conf/iotsms/BensaidLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ises/PathakPS23, author = {Manan Pathak and Anuj Patel and Bela Shah}, title = {IoT Intrusion Detection: Evaluating ML-Based {IDS} on Image and Network Traffic Datasets}, booktitle = {{IEEE} International Symposium on Smart Electronic Systems, iSES 2023, Ahmedabad, India, December 18-20, 2023}, pages = {57--62}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/iSES58672.2023.00023}, doi = {10.1109/ISES58672.2023.00023}, timestamp = {Tue, 02 Apr 2024 12:53:25 +0200}, biburl = {https://dblp.org/rec/conf/ises/PathakPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LuongTDP23, author = {Tran Duc Luong and Vuong Minh Tien and Phan The Duy and Van{-}Hau Pham}, editor = {Weizhi Meng and Zheng Yan and Vincenzo Piuri}, title = {FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems Using Autoencoder-Based Latent Space Representations}, booktitle = {Information Security Practice and Experience - 18th International Conference, {ISPEC} 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14341}, pages = {17--35}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7032-2\_2}, doi = {10.1007/978-981-99-7032-2\_2}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/LuongTDP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/LiuZLLBZ23, author = {Yao Liu and Le Zhou and Qiao Liu and Tian Lan and Xiaoyu Bai and Tinghao Zhou}, title = {Semi-supervised Few-shot Network Intrusion Detection based on Meta-learning}, booktitle = {2023 {IEEE} International Conferences on Internet of Things (iThings) and {IEEE} Green Computing {\&} Communications (GreenCom) and {IEEE} Cyber, Physical {\&} Social Computing (CPSCom) and {IEEE} Smart Data (SmartData) and {IEEE} Congress on Cybermatics (Cybermatics), Danzhou, China, December 17-21, 2023}, pages = {495--502}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics60724.2023.00097}, doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA-CYBERMATICS60724.2023.00097}, timestamp = {Fri, 10 May 2024 11:45:44 +0200}, biburl = {https://dblp.org/rec/conf/ithings/LiuZLLBZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kmo/Sun0SS23, author = {Qilun Sun and Ran Tao and Youqun Shi and Xia Shang}, editor = {Lorna Uden and I{-}Hsien Ting}, title = {Add-BiGAN: An Add-Based Bidirectional Generative Adversarial Networks for Intrusion Detection}, booktitle = {Knowledge Management in Organisations - 17th International Conference, {KMO} 2023, Bangkok, Thailand, July 24-27, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1825}, pages = {360--374}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34045-1\_29}, doi = {10.1007/978-3-031-34045-1\_29}, timestamp = {Wed, 05 Jul 2023 11:47:13 +0200}, biburl = {https://dblp.org/rec/conf/kmo/Sun0SS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medi/OueslatiMJ23, author = {Nour Elhouda Oueslati and Hichem Mrabet and Abderrazak Jemai}, editor = {Mohamed Mosbah and M. Tahar Kechadi and Ladjel Bellatreche and Fa{\"{\i}}ez Gargouri and Chirine Ghedira Guegan and Hassan Badir and Amin Beheshti and Mohamed Mohsen Gammoudi}, title = {A Survey on Intrusion Detection Systems for IoT Networks Based on Long Short-Term Memory}, booktitle = {Advances in Model and Data Engineering in the Digitalization Era - {MEDI} 2023 Short and Workshop Papers, Sousse, Tunisia, November 2-4, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2071}, pages = {237--250}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-55729-3\_19}, doi = {10.1007/978-3-031-55729-3\_19}, timestamp = {Fri, 05 Apr 2024 11:00:52 +0200}, biburl = {https://dblp.org/rec/conf/medi/OueslatiMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/GyawaliSRHJ23, author = {Sohan Gyawali and Kamran Sartipi and Benjamin Van Ravesteyn and Jiaqi Huang and Yili Jiang}, title = {Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks}, booktitle = {{IEEE} Military Communications Conference, {MILCOM} 2023, Boston, MA, USA, October 30 - Nov. 3, 2023}, pages = {649--654}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MILCOM58377.2023.10356373}, doi = {10.1109/MILCOM58377.2023.10356373}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/GyawaliSRHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/ZachosMEPBR23, author = {Georgios Zachos and Georgios Mantas and Ismael Essop and Kyriakos Porfyrakis and Joaquim Manuel C. S. Bastos and Jonathan Rodriguez}, title = {An IoT/IoMT Security Testbed for Anomaly-based Intrusion Detection Systems}, booktitle = {{IFIP} Networking Conference, {IFIP} Networking 2023, Barcelona, Spain, June 12-15, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/IFIPNetworking57963.2023.10186428}, doi = {10.23919/IFIPNETWORKING57963.2023.10186428}, timestamp = {Mon, 31 Jul 2023 13:58:25 +0200}, biburl = {https://dblp.org/rec/conf/networking/ZachosMEPBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netys/MzibriBM23, author = {Adnane Mzibri and R{\'{e}}douane Benaini and Mouad Ben Mamoun}, editor = {David Mohaisen and Thomas Wies}, title = {Case Study on the Performance of ML-Based Network Intrusion Detection Systems in {SDN}}, booktitle = {Networked Systems - 11th International Conference, {NETYS} 2023, Benguerir, Morocco, May 22-24, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14067}, pages = {90--95}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37765-5\_7}, doi = {10.1007/978-3-031-37765-5\_7}, timestamp = {Thu, 13 Jul 2023 14:30:34 +0200}, biburl = {https://dblp.org/rec/conf/netys/MzibriBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/AmalapuramCT23, author = {Suresh Kumar Amalapuram and Sumohana S. Channappayya and Bheemarjuna Reddy Tamma}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {Augmented Memory Replay-based Continual Learning Approaches for Network Intrusion Detection}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/3755a02b1035fbadd5f93a022170e46f-Abstract-Conference.html}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/AmalapuramCT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/AlhussienA23, author = {Nour Alhussien and Ahmed Aleroud}, title = {A Novel Poisoning Attack on Few-Shot based Network Intrusion Detection}, booktitle = {{NOMS} 2023, {IEEE/IFIP} Network Operations and Management Symposium, Miami, FL, USA, May 8-12, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/NOMS56928.2023.10154453}, doi = {10.1109/NOMS56928.2023.10154453}, timestamp = {Mon, 26 Jun 2023 09:00:05 +0200}, biburl = {https://dblp.org/rec/conf/noms/AlhussienA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/BayeSBFBK23, author = {Gaspard Baye and Priscila Silva and Alexandre Broggi and Lance Fiondella and Nathaniel D. Bastian and G{\"{o}}khan Kul}, title = {Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems}, booktitle = {{NOMS} 2023, {IEEE/IFIP} Network Operations and Management Symposium, Miami, FL, USA, May 8-12, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/NOMS56928.2023.10154410}, doi = {10.1109/NOMS56928.2023.10154410}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/BayeSBFBK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/RashidTH23, author = {Syed Md. Mukit Rashid and Md. Toufikuzzaman and Md. Shohrab Hossain}, title = {A Deep Learning Based Semi-Supervised Network Intrusion Detection System Robust to Adversarial Attacks}, booktitle = {10th International Conference on Networking, Systems and Security, 10th NSysS 2023, Khulna, Bangladesh, December 21-23, 2023}, pages = {25--34}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3629188.3629189}, doi = {10.1145/3629188.3629189}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsyss/RashidTH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rivf/NguyenNL23, author = {Dat{-}Thinh Nguyen and Xuan{-}Ha Nguyen and Kim{-}Hung Le}, title = {The Impact of Rotational Invariance on Tree- and Deep Learning-Based Network Intrusion Detection System}, booktitle = {International Conference on Computing and Communication Technologies, {RIVF} 2023, Hanoi, Vietnam, December 23-25, 2023}, pages = {509--514}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/RIVF60135.2023.10471789}, doi = {10.1109/RIVF60135.2023.10471789}, timestamp = {Wed, 27 Mar 2024 21:31:51 +0100}, biburl = {https://dblp.org/rec/conf/rivf/NguyenNL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rivf/NguyenNNNS23, author = {Van Quan Nguyen and Thanh Long Ngo and Le Minh Nguyen and Viet Hung Nguyen and Nathan Shone}, title = {Deep Nested Clustering Auto-Encoder for Anomaly-Based Network Intrusion Detection}, booktitle = {International Conference on Computing and Communication Technologies, {RIVF} 2023, Hanoi, Vietnam, December 23-25, 2023}, pages = {289--294}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/RIVF60135.2023.10471853}, doi = {10.1109/RIVF60135.2023.10471853}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rivf/NguyenNNNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/VenturiFMC23, author = {Andrea Venturi and Matteo Ferrari and Mirco Marchetti and Michele Colajanni}, editor = {Jiman Hong and Maart Lanperne and Juw Won Park and Tom{\'{a}}s Cern{\'{y}} and Hossain Shahriar}, title = {{ARGANIDS:} a novel Network Intrusion Detection System based on adversarially Regularized Graph Autoencoder}, booktitle = {Proceedings of the 38th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2023, Tallinn, Estonia, March 27-31, 2023}, pages = {1540--1548}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3555776.3577651}, doi = {10.1145/3555776.3577651}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/VenturiFMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sbrc/LuzAC23, author = {Luigi F. Marques da Luz and Paulo Freitas de Araujo{-}Filho and Divanilson R. Campelo}, editor = {Carlos Kamienski and Eduardo Cerqueira}, title = {Multi-Criteria Optimized Deep Learning-based Intrusion Detection System for Detecting Cyberattacks in Automotive Ethernet Networks}, booktitle = {Proceedings of the 41st Brazilian Symposium on Computer Networks and Distributed Systems, {SBRC} 2023, Bras{\'{\i}}lia, DF, Brazil, May 22-26, 2023}, pages = {197--210}, year = {2023}, url = {https://sol.sbc.org.br/index.php/sbrc/article/view/24539}, timestamp = {Thu, 11 Apr 2024 13:34:47 +0200}, biburl = {https://dblp.org/rec/conf/sbrc/LuzAC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZaccagninoCGLMZ23, author = {Rocco Zaccagnino and Antonio Cirillo and Alfonso Guarino and Nicola Lettieri and Delfina Malandrino and Gianluca Zaccagnino}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards a Geometric Deep Learning-Based Cyber Security: Network System Intrusion Detection Using Graph Neural Networks}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {394--401}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012085700003555}, doi = {10.5220/0012085700003555}, timestamp = {Mon, 31 Jul 2023 15:34:21 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ZaccagninoCGLMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgiot/ChengCC23, author = {Sheng{-}Tzong Cheng and Yu{-}Ling Cheng and Ka{-}Chun Cheung}, editor = {Der{-}Jiunn Deng and Jyh{-}Cheng Chen}, title = {Rule Generation for Network Intrusion Detection Systems Based on Packets-To-Video Transformation}, booktitle = {Smart Grid and Internet of Things - 7th {EAI} International Conference, SGIoT 2023, TaiChung, Taiwan, November 18-19, 2023, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {557}, pages = {51--65}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-55976-1\_6}, doi = {10.1007/978-3-031-55976-1\_6}, timestamp = {Fri, 19 Apr 2024 15:50:27 +0200}, biburl = {https://dblp.org/rec/conf/sgiot/ChengCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skima/AriffinMDHBW23, author = {Sharifah Haizah Syed Ariffin and Nordurratul Hikmah Mustaffa and Favian Dewanta and Ida Wahidah Hamzah and Muhammad Ariff Baharudin and Nur Haliza Abdul Wahab}, title = {Hybrid Feature Selection Based Lightweight Network Intrusion Detection System for {MQTT} Protocol}, booktitle = {15th International Conference on Software, Knowledge, Information Management and Applications, {SKIMA} 2023, Kuala Lumpur, Malaysia, December 8-10, 2023}, pages = {226--230}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SKIMA59232.2023.10387337}, doi = {10.1109/SKIMA59232.2023.10387337}, timestamp = {Tue, 13 Feb 2024 21:33:06 +0100}, biburl = {https://dblp.org/rec/conf/skima/AriffinMDHBW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcomp/HoweP23, author = {Alex Howe and Mauricio Papa}, title = {Feature Engineering in Machine Learning-Based Intrusion Detection Systems for {OT} Networks}, booktitle = {2023 {IEEE} International Conference on Smart Computing, {SMARTCOMP} 2023, Nashville, TN, USA, June 26-30, 2023}, pages = {361--366}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SMARTCOMP58114.2023.00086}, doi = {10.1109/SMARTCOMP58114.2023.00086}, timestamp = {Tue, 15 Aug 2023 09:17:51 +0200}, biburl = {https://dblp.org/rec/conf/smartcomp/HoweP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/swarm/LiLP23, author = {Lixiang Li and Yuxuan Liu and Haipeng Peng}, editor = {Ying Tan and Yuhui Shi and Wenjian Luo}, title = {Intrusion Detection Method Based on Complementary Adversarial Generation Network}, booktitle = {Advances in Swarm Intelligence - 14th International Conference, {ICSI} 2023, Shenzhen, China, July 14-18, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13969}, pages = {260--271}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-36625-3\_21}, doi = {10.1007/978-3-031-36625-3\_21}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/swarm/LiLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/RizviSMS23, author = {Syed Rizvi and Mark Scanlon and Jimmy McGibney and John Sheppard}, editor = {Satyajit Chakrabarti and Rajashree Paul}, title = {An Evaluation of AI-Based Network Intrusion Detection in Resource-Constrained Environments}, booktitle = {14th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile Communication Conference, {UEMCON} 2023, New York, NY, USA, October 12-14, 2023}, pages = {275--282}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/UEMCON59035.2023.10315971}, doi = {10.1109/UEMCON59035.2023.10315971}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uemcom/RizviSMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Wei00H23, author = {Feng Wei and Hongda Li and Ziming Zhao and Hongxin Hu}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4337--4354}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/wei-feng}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Wei00H23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vsip/FengZZZ023, author = {Yanxiang Feng and Enyan Zhang and Yang Zhang and Zhen Zeng and Aili Wang}, title = {Network Intrusion Detection Based on Federated Learning with Inherited Private Models}, booktitle = {Proceedings of the 5th International Conference on Video, Signal and Image Processing, {VSIP} 2023, Harbin, China, November 24-26, 2023}, pages = {16--22}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638682.3638685}, doi = {10.1145/3638682.3638685}, timestamp = {Mon, 27 May 2024 15:50:40 +0200}, biburl = {https://dblp.org/rec/conf/vsip/FengZZZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/LiuBL23, author = {Qian Liu and Weijie Bao and Qilie Liu}, title = {Research on Vehicular External Network Intrusion Detection System Based on Ensemble Learning}, booktitle = {98th {IEEE} Vehicular Technology Conference, {VTC} Fall 2023, Hong Kong, SAR, China, October 10-13, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VTC2023-Fall60731.2023.10333498}, doi = {10.1109/VTC2023-FALL60731.2023.10333498}, timestamp = {Wed, 10 Jan 2024 16:12:42 +0100}, biburl = {https://dblp.org/rec/conf/vtc/LiuBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/UllahBKK023, author = {Safi Ullah and Wadii Boulila and Anis Koubaa and Zahid Khan and Jawad Ahmad}, title = {{ABDNN-IDS:} Attention-Based Deep Neural Networks for Intrusion Detection in Industrial IoT}, booktitle = {98th {IEEE} Vehicular Technology Conference, {VTC} Fall 2023, Hong Kong, SAR, China, October 10-13, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VTC2023-Fall60731.2023.10333818}, doi = {10.1109/VTC2023-FALL60731.2023.10333818}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vtc/UllahBKK023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/ElghalhoudNZS23, author = {Omar Elghalhoud and Kshirasagar Naik and Marzia Zaman and Ricardo Manzano S.}, title = {Data Balancing and {CNN} based Network Intrusion Detection System}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2023, Glasgow, UK, March 26-29, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/WCNC55385.2023.10118702}, doi = {10.1109/WCNC55385.2023.10118702}, timestamp = {Fri, 19 May 2023 11:20:49 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/ElghalhoudNZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/ShiXZW23, author = {Zhixin Shi and Mengyan Xing and Jing Zhang and B. Hao Wu}, title = {Few-Shot Network Intrusion Detection Based on Model-Agnostic Meta-Learning with {L2F} Method}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2023, Glasgow, UK, March 26-29, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/WCNC55385.2023.10118898}, doi = {10.1109/WCNC55385.2023.10118898}, timestamp = {Fri, 19 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/ShiXZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-09394, author = {Anabia Sohail and Bibi Ayisha and Irfan Hameed and Muhammad Mohsin Zafar and Asifullah Khan}, title = {Deep Neural Networks based Meta-Learning for Network Intrusion Detection}, journal = {CoRR}, volume = {abs/2302.09394}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.09394}, doi = {10.48550/ARXIV.2302.09394}, eprinttype = {arXiv}, eprint = {2302.09394}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-09394.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-08248, author = {Mohamad T. Sultan and Hesham El{-}Sayed and Manzoor Ahmed Khan}, title = {An Intrusion Detection Mechanism for MANETs Based on Deep Learning Artificial Neural Networks (ANNs)}, journal = {CoRR}, volume = {abs/2303.08248}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.08248}, doi = {10.48550/ARXIV.2303.08248}, eprinttype = {arXiv}, eprint = {2303.08248}, timestamp = {Mon, 20 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-08248.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-12278, author = {Seonghoon Jeong and Sangho Lee and Hwejae Lee and Huy Kang Kim}, title = {{X-CANIDS:} Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network}, journal = {CoRR}, volume = {abs/2303.12278}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.12278}, doi = {10.48550/ARXIV.2303.12278}, eprinttype = {arXiv}, eprint = {2303.12278}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-12278.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-07226, author = {Yalu Wang and Zhijie Han and Jie Li and Xin He}, title = {{BS-GAT} Behavior Similarity Based Graph Attention Network for Network Intrusion Detection}, journal = {CoRR}, volume = {abs/2304.07226}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.07226}, doi = {10.48550/ARXIV.2304.07226}, eprinttype = {arXiv}, eprint = {2304.07226}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-07226.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-14746, author = {Liam Daly Manocchio and Siamak Layeghy and Wai Weng Lo and Gayan K. Kulatilleke and Mohanad Sarhan and Marius Portmann}, title = {FlowTransformer: {A} Transformer Framework for Flow-based Network Intrusion Detection Systems}, journal = {CoRR}, volume = {abs/2304.14746}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.14746}, doi = {10.48550/ARXIV.2304.14746}, eprinttype = {arXiv}, eprint = {2304.14746}, timestamp = {Thu, 04 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-14746.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-04920, author = {Loc Gia Nguyen and Kohei Watabe}, title = {Flow-based Network Intrusion Detection Based on {BERT} Masked Language Model}, journal = {CoRR}, volume = {abs/2306.04920}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.04920}, doi = {10.48550/ARXIV.2306.04920}, eprinttype = {arXiv}, eprint = {2306.04920}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-04920.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-09451, author = {Zhiyan Chen and Murat Simsek and Burak Kantarci and Mehran Bagheri and Petar Djukic}, title = {Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier}, journal = {CoRR}, volume = {abs/2306.09451}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.09451}, doi = {10.48550/ARXIV.2306.09451}, eprinttype = {arXiv}, eprint = {2306.09451}, timestamp = {Thu, 22 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-09451.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-10191, author = {Shuo Yang and Xinran Zheng and Zhengzhuo Xu and Xingjun Wang}, title = {A Lightweight Approach for Network Intrusion Detection based on Self-Knowledge Distillation}, journal = {CoRR}, volume = {abs/2307.10191}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.10191}, doi = {10.48550/ARXIV.2307.10191}, eprinttype = {arXiv}, eprint = {2307.10191}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-10191.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-14268, author = {Jacopo Talpini and Fabio Sartori and Marco Savi}, title = {A Clustering Strategy for Enhanced FL-Based Intrusion Detection in IoT Networks}, journal = {CoRR}, volume = {abs/2307.14268}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.14268}, doi = {10.48550/ARXIV.2307.14268}, eprinttype = {arXiv}, eprint = {2307.14268}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-14268.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-00077, author = {Khushnaseeb Roshan and Aasim Zafar and Sheikh Burhan Ul Haque}, title = {A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks}, journal = {CoRR}, volume = {abs/2308.00077}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.00077}, doi = {10.48550/ARXIV.2308.00077}, eprinttype = {arXiv}, eprint = {2308.00077}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-00077.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-01070, author = {Jinxin Liu and Murat Simsek and Michele Nogueira and Burak Kantarci}, title = {Multidomain transformer-based deep learning for early detection of network intrusion}, journal = {CoRR}, volume = {abs/2309.01070}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.01070}, doi = {10.48550/ARXIV.2309.01070}, eprinttype = {arXiv}, eprint = {2309.01070}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-01070.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-10173, author = {Maloy Kumar Devnath}, title = {{GCNIDS:} Graph Convolutional Network-Based Intrusion Detection System for {CAN} Bus}, journal = {CoRR}, volume = {abs/2309.10173}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.10173}, doi = {10.48550/ARXIV.2309.10173}, eprinttype = {arXiv}, eprint = {2309.10173}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-10173.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-03334, author = {Khushnaseeb Roshan and Aasim Zafar and Sheikh Burhan Ul Haque}, title = {Untargeted White-box Adversarial Attack with Heuristic Defence Methods in Real-time Deep Learning based Network Intrusion Detection System}, journal = {CoRR}, volume = {abs/2310.03334}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.03334}, doi = {10.48550/ARXIV.2310.03334}, eprinttype = {arXiv}, eprint = {2310.03334}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-03334.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-05956, author = {Hamdi Friji and Alexis Olivereau and Mireille Sarkiss}, title = {Efficient Network Representation for GNN-based Intrusion Detection}, journal = {CoRR}, volume = {abs/2310.05956}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.05956}, doi = {10.48550/ARXIV.2310.05956}, eprinttype = {arXiv}, eprint = {2310.05956}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-05956.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-09298, author = {Irfan Khan and Yasir Ali Farrukh and Syed Wali}, title = {ByteStack-ID: Integrated Stacked Model Leveraging Payload Byte Frequency for Grayscale Image-based Network Intrusion Detection}, journal = {CoRR}, volume = {abs/2310.09298}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.09298}, doi = {10.48550/ARXIV.2310.09298}, eprinttype = {arXiv}, eprint = {2310.09298}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-09298.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-10655, author = {Jacopo Talpini and Fabio Sartori and Marco Savi}, title = {Enhancing Trustworthiness in ML-Based Network Intrusion Detection with Uncertainty Quantification}, journal = {CoRR}, volume = {abs/2310.10655}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.10655}, doi = {10.48550/ARXIV.2310.10655}, eprinttype = {arXiv}, eprint = {2310.10655}, timestamp = {Wed, 25 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-10655.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-04135, author = {Ozlem Ceviz and Pinar Sadioglu and Sevil Sen and Vassilios G. Vassilakis}, title = {A Novel Federated Learning-based Intrusion Detection System for Flying Ad Hoc Networks}, journal = {CoRR}, volume = {abs/2312.04135}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.04135}, doi = {10.48550/ARXIV.2312.04135}, eprinttype = {arXiv}, eprint = {2312.04135}, timestamp = {Mon, 01 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-04135.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jece/WangC23, title = {Intrusion Detection-Data Security Protection Scheme Based on Particle Swarm-BP Network Algorithm in Cloud Computing Environment}, journal = {J. Electr. Comput. Eng.}, volume = {2023}, pages = {1128545:1--1128545:10}, year = {2023}, note = {Withdrawn.}, url = {https://doi.org/10.1155/2023/1128545}, doi = {10.1155/2023/1128545}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jece/WangC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlikhanovJAMNN22, author = {Jumabek Alikhanov and Rhongho Jang and Mohammed Abuhamad and David Mohaisen and Daehun Nyang and Youngtae Noh}, title = {Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches}, journal = {{IEEE} Access}, volume = {10}, pages = {5801--5823}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2021.3137318}, doi = {10.1109/ACCESS.2021.3137318}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AlikhanovJAMNN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AliyuEMKL22, author = {Ibrahim Aliyu and S{\'{e}}linde van Engelenburg and Muhammed Bashir Mu'azu and Jinsul Kim and Chang Gyoon Lim}, title = {Statistical Detection of Adversarial Examples in Blockchain-Based Federated Forest In-Vehicle Network Intrusion Detection Systems}, journal = {{IEEE} Access}, volume = {10}, pages = {109366--109384}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3212412}, doi = {10.1109/ACCESS.2022.3212412}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AliyuEMKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FaustoGPM22, author = {Alessandro Fausto and Giovanni Battista Gaggero and Fabio Patrone and Mario Marchese}, title = {Reduction of the Delays Within an Intrusion Detection System {(IDS)} Based on Software Defined Networking {(SDN)}}, journal = {{IEEE} Access}, volume = {10}, pages = {109850--109862}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3214974}, doi = {10.1109/ACCESS.2022.3214974}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/FaustoGPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GhanemGJNSNAASO22, author = {Waheed Ali H. M. Ghanem and Sanaa Abduljabbar Ahmed Ghaleb and Aman Jantan and Abdullah B. Nasser and Sami Abdulla Mohsen Saleh and Amir Ngah and Arifah Che Alhadi and Humaira Arshad and Abdul{-}Malik H. Y. Saad and Abiodun Esther Omolara and Yousef A. Baker El{-}Ebiary and Oludare Isaac Abiodun}, title = {Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks}, journal = {{IEEE} Access}, volume = {10}, pages = {76318--76339}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3192472}, doi = {10.1109/ACCESS.2022.3192472}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GhanemGJNSNAASO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JanabiKJ22a, author = {Ahmed H. Janabi and Triantafyllos Kanakis and Mark Johnson}, title = {Overhead Reduction Technique for Software-Defined Network Based Intrusion Detection Systems}, journal = {{IEEE} Access}, volume = {10}, pages = {66481--66491}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3184722}, doi = {10.1109/ACCESS.2022.3184722}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JanabiKJ22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimP22, author = {Taehoon Kim and Wooguil Pak}, title = {Robust Network Intrusion Detection System Based on Machine-Learning With Early Classification}, journal = {{IEEE} Access}, volume = {10}, pages = {10754--10767}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3145002}, doi = {10.1109/ACCESS.2022.3145002}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KimP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimP22a, author = {Taehoon Kim and Wooguil Pak}, title = {Early Detection of Network Intrusions Using a GAN-Based One-Class Classifier}, journal = {{IEEE} Access}, volume = {10}, pages = {119357--119367}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3221400}, doi = {10.1109/ACCESS.2022.3221400}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KimP22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LeeJCLC22, author = {Seyoung Lee and Hyo Jin Jo and Aram Cho and Dong Hoon Lee and Wonsuk Choi}, title = {{TTIDS:} Transmission-Resuming Time-Based Intrusion Detection System for Controller Area Network {(CAN)}}, journal = {{IEEE} Access}, volume = {10}, pages = {52139--52153}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3174356}, doi = {10.1109/ACCESS.2022.3174356}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LeeJCLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SelvarajanKKAK22, author = {Shitharth Selvarajan and Pravin Kshirsagar and Balachandran Praveen Kumar and Khaled Hamed Alyoubi and Alaa O. Khadidos}, title = {An Innovative Perceptual Pigeon Galvanized Optimization {(PPGO)} Based Likelihood Na{\"{\i}}ve Bayes {(LNB)} Classification Approach for Network Intrusion Detection System}, journal = {{IEEE} Access}, volume = {10}, pages = {46424--46441}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3171660}, doi = {10.1109/ACCESS.2022.3171660}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SelvarajanKKAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SiddiqiP22, author = {Murtaza Ahmed Siddiqi and Wooguil Pak}, title = {Tier-Based Optimization for Synthesized Network Intrusion Detection System}, journal = {{IEEE} Access}, volume = {10}, pages = {108530--108544}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3213937}, doi = {10.1109/ACCESS.2022.3213937}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SiddiqiP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aes/KurniMYT22, author = {Muralidhar Kurni and S. Md. Mujeeb and Bharath Bhushan Yannam and Arun Singh T}, title = {MRPO-Deep maxout: Manta ray political optimization based Deep maxout network for big data intrusion detection using spark architecture}, journal = {Adv. Eng. Softw.}, volume = {174}, pages = {103324}, year = {2022}, url = {https://doi.org/10.1016/j.advengsoft.2022.103324}, doi = {10.1016/J.ADVENGSOFT.2022.103324}, timestamp = {Thu, 01 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aes/KurniMYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithms/MijalkovicS22, author = {Jovana Mijalkovic and Angelo Spognardi}, title = {Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems}, journal = {Algorithms}, volume = {15}, number = {8}, pages = {258}, year = {2022}, url = {https://doi.org/10.3390/a15080258}, doi = {10.3390/A15080258}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithms/MijalkovicS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithms/YangAZ22, author = {Bin Yang and Muhammad Haseeb Arshad and Qing Zhao}, title = {Packet-Level and Flow-Level Network Intrusion Detection Based on Reinforcement Learning and Adversarial Training}, journal = {Algorithms}, volume = {15}, number = {12}, pages = {453}, year = {2022}, url = {https://doi.org/10.3390/a15120453}, doi = {10.3390/A15120453}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithms/YangAZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amm/Yu22, author = {Ju{-}zhen Yu}, title = {Intrusion Detection Technology for Wireless Sensor Networks Based on Autoregressive Moving Average}, journal = {Adv. Multim.}, volume = {2022}, pages = {2155748:1--2155748:7}, year = {2022}, url = {https://doi.org/10.1155/2022/2155748}, doi = {10.1155/2022/2155748}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amm/Yu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/RashidKIWG22, author = {Md. Mamunur Rashid and Joarder Kamruzzaman and Tasadduq Imam and Santoso Wibowo and Steven Gordon}, title = {A tree-based stacking ensemble technique with feature selection for network intrusion detection}, journal = {Appl. Intell.}, volume = {52}, number = {9}, pages = {9768--9781}, year = {2022}, url = {https://doi.org/10.1007/s10489-021-02968-1}, doi = {10.1007/S10489-021-02968-1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apin/RashidKIWG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bdcc/YounisseAA22, author = {Remah Younisse and Ashraf Ahmad and Qasem Abu Al{-}Haija}, title = {Explaining Intrusion Detection-Based Convolutional Neural Networks Using Shapley Additive Explanations {(SHAP)}}, journal = {Big Data Cogn. Comput.}, volume = {6}, number = {4}, pages = {126}, year = {2022}, url = {https://doi.org/10.3390/bdcc6040126}, doi = {10.3390/BDCC6040126}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bdcc/YounisseAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bdr/SarhanLP22, author = {Mohanad Sarhan and Siamak Layeghy and Marius Portmann}, title = {Evaluating Standard Feature Sets Towards Increased Generalisability and Explainability of ML-Based Network Intrusion Detection}, journal = {Big Data Res.}, volume = {30}, pages = {100359}, year = {2022}, url = {https://doi.org/10.1016/j.bdr.2022.100359}, doi = {10.1016/J.BDR.2022.100359}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bdr/SarhanLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/AlQahtaniK22, author = {Hamed AlQahtani and Gulshan Kumar}, title = {A deep learning-based intrusion detection system for in-vehicle networks}, journal = {Comput. Electr. Eng.}, volume = {104}, number = {Part}, pages = {108447}, year = {2022}, url = {https://doi.org/10.1016/j.compeleceng.2022.108447}, doi = {10.1016/J.COMPELECENG.2022.108447}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/AlQahtaniK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/GuptaSGK22, author = {Karan Gupta and Deepak Kumar Sharma and Koyel Datta Gupta and Anil Kumar}, title = {A tree classifier based network intrusion detection model for Internet of Medical Things}, journal = {Comput. Electr. Eng.}, volume = {102}, pages = {108158}, year = {2022}, url = {https://doi.org/10.1016/j.compeleceng.2022.108158}, doi = {10.1016/J.COMPELECENG.2022.108158}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/GuptaSGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/RaviCA22, author = {Vinayakumar Ravi and Rajasekhar Chaganti and Mamoun Alazab}, title = {Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system}, journal = {Comput. Electr. Eng.}, volume = {102}, pages = {108156}, year = {2022}, url = {https://doi.org/10.1016/j.compeleceng.2022.108156}, doi = {10.1016/J.COMPELECENG.2022.108156}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/RaviCA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/SabaRSKB22, author = {Tanzila Saba and Amjad Rehman and Tariq Sadad and Hoshang Kolivand and Saeed Ali Bahaj}, title = {Anomaly-based intrusion detection system for IoT networks through deep learning model}, journal = {Comput. Electr. Eng.}, volume = {99}, pages = {107810}, year = {2022}, url = {https://doi.org/10.1016/j.compeleceng.2022.107810}, doi = {10.1016/J.COMPELECENG.2022.107810}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/SabaRSKB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/SinghSSAYT22, author = {Saurabh Singh and Sparsh Sharma and Surbhi Sharma and Osama Alfarraj and Byungun Yoon and Amr Tolba}, title = {Intrusion Detection System-Based Security Mechanism for Vehicular Ad-Hoc Networks for Industrial IoT}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {11}, number = {6}, pages = {83--92}, year = {2022}, url = {https://doi.org/10.1109/MCE.2021.3138703}, doi = {10.1109/MCE.2021.3138703}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cem/SinghSSAYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiuZLFY22, author = {Guangrui Liu and Weizhe Zhang and Xinjie Li and Kaisheng Fan and Shui Yu}, title = {VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {7}, pages = {1--19}, year = {2022}, url = {https://doi.org/10.1007/s11432-021-3455-1}, doi = {10.1007/S11432-021-3455-1}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LiuZLFY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/AjdaniG22, author = {Mahdi Ajdani and Hamid Reza Ghaffary}, title = {Improving network intrusion detection by identifying effective features based on probabilistic dependency trees and evolutionary algorithm}, journal = {Clust. Comput.}, volume = {25}, number = {5}, pages = {3299--3311}, year = {2022}, url = {https://doi.org/10.1007/s10586-022-03564-9}, doi = {10.1007/S10586-022-03564-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/AjdaniG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/NayerP22, author = {Md. Nayer and Subhash Chandra Pandey}, title = {Chromosomes identification based differential evolution {(CIDE):} a new bio-inspired variant for network intrusion detection}, journal = {Clust. Comput.}, volume = {25}, number = {5}, pages = {3459--3480}, year = {2022}, url = {https://doi.org/10.1007/s10586-022-03574-7}, doi = {10.1007/S10586-022-03574-7}, timestamp = {Tue, 20 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/NayerP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BaldiniA22, author = {Gianmarco Baldini and Irene Amerini}, title = {Online Distributed Denial of Service (DDoS) intrusion detection based on adaptive sliding window and morphological fractal dimension}, journal = {Comput. Networks}, volume = {210}, pages = {108923}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.108923}, doi = {10.1016/J.COMNET.2022.108923}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BaldiniA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FuZ22, author = {Juan{-}juan Fu and Xing{-}Lan Zhang}, title = {Gradient importance enhancement based feature fusion intrusion detection technique}, journal = {Comput. Networks}, volume = {214}, pages = {109180}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109180}, doi = {10.1016/J.COMNET.2022.109180}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/FuZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HorchulhackVS22, author = {Pedro Horchulhack and Eduardo K. Viegas and Altair O. Santin}, title = {Toward feasible machine learning model updates in network-based intrusion detection}, journal = {Comput. Networks}, volume = {202}, pages = {108618}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2021.108618}, doi = {10.1016/J.COMNET.2021.108618}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HorchulhackVS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HouXLSW22, author = {Tianhao Hou and Hongyan Xing and Xinyi Liang and Xin Su and Zenghui Wang}, title = {Network intrusion detection based on {DNA} spatial information}, journal = {Comput. Networks}, volume = {217}, pages = {109318}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109318}, doi = {10.1016/J.COMNET.2022.109318}, timestamp = {Sat, 01 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HouXLSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SouzaWMLWG22, author = {Cristiano Antonio de Souza and Carlos Becker Westphall and Renato Bobsin Machado and Leandro Loffi and Carla Merkle Westphall and Guilherme Arthur Geronimo}, title = {Intrusion detection and prevention in fog based IoT environments: {A} systematic literature review}, journal = {Comput. Networks}, volume = {214}, pages = {109154}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109154}, doi = {10.1016/J.COMNET.2022.109154}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SouzaWMLWG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/AhmedLS22, author = {Usman Ahmed and Jerry Chun{-}Wei Lin and Gautam Srivastava}, title = {A resource allocation deep active learning based on load balancer for network intrusion detection in {SDN} sensors}, journal = {Comput. Commun.}, volume = {184}, pages = {56--63}, year = {2022}, url = {https://doi.org/10.1016/j.comcom.2021.12.009}, doi = {10.1016/J.COMCOM.2021.12.009}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/AhmedLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AksuA22, author = {Dogukan Aksu and Muhammed Ali Aydin}, title = {{MGA-IDS:} Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach}, journal = {Comput. Secur.}, volume = {118}, pages = {102717}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102717}, doi = {10.1016/J.COSE.2022.102717}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AksuA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuptaJB22, author = {Neha Gupta and Vinita Jindal and Punam Bedi}, title = {{CSE-IDS:} Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems}, journal = {Comput. Secur.}, volume = {112}, pages = {102499}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102499}, doi = {10.1016/J.COSE.2021.102499}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuptaJB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeCCCHK22, author = {Jung{-}San Lee and Ying{-}Chin Chen and Chit{-}Jie Chew and Chih{-}Lung Chen and Thu{-}Nguyet Huynh and Chung{-}Wei Kuo}, title = {CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training}, journal = {Comput. Secur.}, volume = {122}, pages = {102908}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102908}, doi = {10.1016/J.COSE.2022.102908}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeCCCHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangJTWH22, author = {Wei Wang and Songlei Jian and Yusong Tan and Qingbo Wu and Chenlin Huang}, title = {Representation learning-based network intrusion detection system by capturing explicit and implicit feature interactions}, journal = {Comput. Secur.}, volume = {112}, pages = {102537}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102537}, doi = {10.1016/J.COSE.2021.102537}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangJTWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangLLWWZH22, author = {Zhen Yang and Xiaodong Liu and Tong Li and Di Wu and Jinjiang Wang and Yunwei Zhao and Han Han}, title = {A systematic literature review of methods and datasets for anomaly-based network intrusion detection}, journal = {Comput. Secur.}, volume = {116}, pages = {102675}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102675}, doi = {10.1016/J.COSE.2022.102675}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangLLWWZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangJWWLY22, author = {Chunying Zhang and Donghao Jia and Liya Wang and Wenjie Wang and Fengchun Liu and Aimin Yang}, title = {Comparative research on network intrusion detection methods based on machine learning}, journal = {Comput. Secur.}, volume = {121}, pages = {102861}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102861}, doi = {10.1016/J.COSE.2022.102861}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangJWWLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/AlavizadehAJ22, author = {Hooman Alavizadeh and Hootan Alavizadeh and Julian Jang{-}Jaccard}, title = {Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection}, journal = {Comput.}, volume = {11}, number = {3}, pages = {41}, year = {2022}, url = {https://doi.org/10.3390/computers11030041}, doi = {10.3390/COMPUTERS11030041}, timestamp = {Tue, 10 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/AlavizadehAJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/XuJLSK22, author = {Wen Xu and Julian Jang{-}Jaccard and Tong Liu and Fariza Sabrina and Jin Kwak}, title = {Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier}, journal = {Comput.}, volume = {11}, number = {6}, pages = {85}, year = {2022}, url = {https://doi.org/10.3390/computers11060085}, doi = {10.3390/COMPUTERS11060085}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/XuJLSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/GangulaVM22, author = {Rekha Gangula and Murali Mohan V. and Ranjeeth Kumar M}, title = {Network intrusion detection system for Internet of Things based on enhanced flower pollination algorithm and ensemble classifier}, journal = {Concurr. Comput. Pract. Exp.}, volume = {34}, number = {21}, year = {2022}, url = {https://doi.org/10.1002/cpe.7103}, doi = {10.1002/CPE.7103}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/GangulaVM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/KrishnaveniSSP22, author = {Sivamohan Krishnaveni and Sivanandam Sivamohan and Subramanian Sridhar and Subramani Prabhakaran}, title = {Network intrusion detection based on ensemble classification and feature selection method for cloud computing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {34}, number = {11}, year = {2022}, url = {https://doi.org/10.1002/cpe.6838}, doi = {10.1002/CPE.6838}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/KrishnaveniSSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/SugithaPK22, author = {George Sugitha and B. C. Preethi and G. Kavitha}, title = {Intrusion detection framework using stacked auto encoder based deep neural network in {IOT} network}, journal = {Concurr. Comput. Pract. Exp.}, volume = {34}, number = {28}, year = {2022}, url = {https://doi.org/10.1002/cpe.7401}, doi = {10.1002/CPE.7401}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/SugithaPK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/ArivazhagiK22, author = {A. Arivazhagi and S. Raja Kumar}, title = {An Efficient Stabbing Based Intrusion Detection Framework for Sensor Networks}, journal = {Comput. Syst. Sci. Eng.}, volume = {43}, number = {1}, pages = {141--157}, year = {2022}, url = {https://doi.org/10.32604/csse.2022.021851}, doi = {10.32604/CSSE.2022.021851}, timestamp = {Tue, 10 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/ArivazhagiK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/elektrik/CanerEE22, author = {Serhat Caner and Nesli Erdogmus and Yusuf Murat Erten}, title = {Performance analysis and feature selection for network-based intrusion detectionwith deep learning}, journal = {Turkish J. Electr. Eng. Comput. Sci.}, volume = {30}, number = {3}, pages = {629--643}, year = {2022}, url = {https://doi.org/10.55730/1300-0632.3802}, doi = {10.55730/1300-0632.3802}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/elektrik/CanerEE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/HabeebB22, author = {Mohammed Sayeeduddin Habeeb and Tummala Ranga Babu}, title = {Network intrusion detection system: {A} survey on artificial intelligence-based techniques}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {39}, number = {9}, year = {2022}, url = {https://doi.org/10.1111/exsy.13066}, doi = {10.1111/EXSY.13066}, timestamp = {Tue, 16 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/es/HabeebB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/AsadG22, author = {Hafizul Asad and Ilir Gashi}, title = {Dynamical analysis of diversity in rule-based open source network intrusion detection systems}, journal = {Empir. Softw. Eng.}, volume = {27}, number = {1}, pages = {4}, year = {2022}, url = {https://doi.org/10.1007/s10664-021-10046-w}, doi = {10.1007/S10664-021-10046-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ese/AsadG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/GavelRT22, author = {Shashank Gavel and Ajay Singh Raghuvanshi and Sudarshan Tiwari}, title = {Maximum correlation based mutual information scheme for intrusion detection in the data networks}, journal = {Expert Syst. Appl.}, volume = {189}, pages = {116089}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2021.116089}, doi = {10.1016/J.ESWA.2021.116089}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/GavelRT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/KannaS22, author = {P. Rajesh Kanna and P. Santhi}, title = {Hybrid Intrusion Detection using MapReduce based Black Widow Optimized Convolutional Long Short-Term Memory Neural Networks}, journal = {Expert Syst. Appl.}, volume = {194}, pages = {116545}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2022.116545}, doi = {10.1016/J.ESWA.2022.116545}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/KannaS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/PingaleS22, author = {Subhash V. Pingale and Sanjay R. Sutar}, title = {Remora whale optimization-based hybrid deep learning for network intrusion detection using {CNN} features}, journal = {Expert Syst. Appl.}, volume = {210}, pages = {118476}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2022.118476}, doi = {10.1016/J.ESWA.2022.118476}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/PingaleS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/WangLHC22, author = {Zhendong Wang and Zeyu Li and Daojing He and Sammy Chan}, title = {A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning}, journal = {Expert Syst. Appl.}, volume = {206}, pages = {117671}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2022.117671}, doi = {10.1016/J.ESWA.2022.117671}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/WangLHC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/ZhaoHJGL22, author = {Xu Zhao and Guangqiu Huang and Jin Jiang and Lin Gao and Maozhen Li}, title = {Task offloading of cooperative intrusion detection system based on Deep {Q} Network in mobile edge computing}, journal = {Expert Syst. Appl.}, volume = {206}, pages = {117860}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2022.117860}, doi = {10.1016/J.ESWA.2022.117860}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/ZhaoHJGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AnsariBL22, author = {Mohammad Samar Ansari and V{\'{a}}clav Bartos and Brian A. Lee}, title = {GRU-based deep learning approach for network intrusion alert prediction}, journal = {Future Gener. Comput. Syst.}, volume = {128}, pages = {235--247}, year = {2022}, url = {https://doi.org/10.1016/j.future.2021.09.040}, doi = {10.1016/J.FUTURE.2021.09.040}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/AnsariBL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/DingCDFC22, author = {Hongwei Ding and Leiyang Chen and Liang Dong and Zhongwang Fu and Xiaohui Cui}, title = {Imbalanced data classification: {A} {KNN} and generative adversarial networks-based hybrid approach for intrusion detection}, journal = {Future Gener. Comput. Syst.}, volume = {131}, pages = {240--254}, year = {2022}, url = {https://doi.org/10.1016/j.future.2022.01.026}, doi = {10.1016/J.FUTURE.2022.01.026}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/DingCDFC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiuMZAW22, author = {Zhiqiang Liu and Ghulam Mohiuddin and Jiangbin Zheng and Muhammad Asim and Sifei Wang}, title = {Intrusion detection in wireless sensor network using enhanced empirical based component analysis}, journal = {Future Gener. Comput. Syst.}, volume = {135}, pages = {181--193}, year = {2022}, url = {https://doi.org/10.1016/j.future.2022.04.024}, doi = {10.1016/J.FUTURE.2022.04.024}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiuMZAW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/YuYL22, author = {Jing Yu and Xiaojun Ye and Hongbo Li}, title = {A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network}, journal = {Future Gener. Comput. Syst.}, volume = {129}, pages = {399--406}, year = {2022}, url = {https://doi.org/10.1016/j.future.2021.10.018}, doi = {10.1016/J.FUTURE.2021.10.018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/YuYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhangZGYL22, author = {Zhao Zhang and Yong Zhang and Da Guo and Lei Yao and Zhao Li}, title = {SecFedNIDS: Robust defense for poisoning attack against federated learning-based network intrusion detection system}, journal = {Future Gener. Comput. Syst.}, volume = {134}, pages = {154--169}, year = {2022}, url = {https://doi.org/10.1016/j.future.2022.04.010}, doi = {10.1016/J.FUTURE.2022.04.010}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ZhangZGYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/grid/FotohiAG22, author = {Reza Fotohi and Masoud Abdan and Sanaz Ghasemi}, title = {A Self-Adaptive Intrusion Detection System for Securing UAV-to-UAV Communications Based on the Human Immune System in {UAV} Networks}, journal = {J. Grid Comput.}, volume = {20}, number = {3}, pages = {22}, year = {2022}, url = {https://doi.org/10.1007/s10723-022-09614-1}, doi = {10.1007/S10723-022-09614-1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/grid/FotohiAG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iajit/NtiNAS22, author = {Isaac Kofi Nti and Owusu Narko{-}Boateng and Adebayo Felix Adekoya and Arjun Remadevi Somanathan}, title = {Stacknet based decision fusion classifier for network intrusion detection}, journal = {Int. Arab J. Inf. Technol.}, volume = {19}, number = {3A}, pages = {478--490}, year = {2022}, url = {https://doi.org/10.34028/iajit/19/3A/8}, doi = {10.34028/IAJIT/19/3A/8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iajit/NtiNAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/WeiCLWZ22, author = {Jingwen Wei and Ye Chen and Yingxu Lai and Yuhang Wang and Zhaoyi Zhang}, title = {Domain Adversarial Neural Network-Based Intrusion Detection System for In-Vehicle Network Variant Attacks}, journal = {{IEEE} Commun. Lett.}, volume = {26}, number = {11}, pages = {2547--2551}, year = {2022}, url = {https://doi.org/10.1109/LCOMM.2022.3195486}, doi = {10.1109/LCOMM.2022.3195486}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/WeiCLWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/LiWMLS22, author = {Wenjuan Li and Yu Wang and Weizhi Meng and Jin Li and Chunhua Su}, title = {BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {105-D}, number = {2}, pages = {272--279}, year = {2022}, url = {https://doi.org/10.1587/transinf.2021bcp0013}, doi = {10.1587/TRANSINF.2021BCP0013}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/LiWMLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaacs/Li22, author = {Linlin Li}, title = {The intrusion data mining method for distributed network based on fuzzy kernel clustering algorithm}, journal = {Int. J. Auton. Adapt. Commun. Syst.}, volume = {15}, number = {1}, pages = {32--45}, year = {2022}, url = {https://doi.org/10.1504/IJAACS.2022.122942}, doi = {10.1504/IJAACS.2022.122942}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaacs/Li22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaci/ParganihaSS22, author = {Vivek Parganiha and Soorya Prakash Shukla and Lokesh Kumar Sharma}, title = {Cloud Intrusion Detection Model Based on Deep Belief Network and Grasshopper Optimization}, journal = {Int. J. Ambient Comput. Intell.}, volume = {13}, number = {1}, pages = {1--24}, year = {2022}, url = {https://doi.org/10.4018/ijaci.293123}, doi = {10.4018/IJACI.293123}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaci/ParganihaSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaec/ChaibiAM22, author = {Nassima Chaibi and Baghdad Atmani and Most{\'{e}}fa Mokaddem}, title = {A Convolutional Neural Network With Feature Selection-Based Network Intrusion Detection}, journal = {Int. J. Appl. Evol. Comput.}, volume = {13}, number = {1}, pages = {1--21}, year = {2022}, url = {https://doi.org/10.4018/ijaec.302014}, doi = {10.4018/IJAEC.302014}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaec/ChaibiAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaip/MakaniR22, author = {Ruchi Makani and B. V. R. Reddy}, title = {Trust-based-tuning of Bayesian-watchdog intrusion detection for fast and improved detection of black hole attacks in mobile ad hoc networks}, journal = {Int. J. Adv. Intell. Paradigms}, volume = {21}, number = {1/2}, pages = {53--71}, year = {2022}, url = {https://doi.org/10.1504/IJAIP.2022.121029}, doi = {10.1504/IJAIP.2022.121029}, timestamp = {Mon, 14 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijaip/MakaniR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChenniappanadarSSK22, author = {Santhosh Kumar Chenniappanadar and Gnanamurthy Sundharamurthy and Vinoth Kumar Sakthivelu and Vishnu Kumar Kaliappan}, title = {A Supervised Machine Learning Based Intrusion Detection Model for Detecting Cyber-Attacks Against Computer System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {3}, pages = {16--25}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i3.5567}, doi = {10.17762/IJCNIS.V14I3.5567}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/ChenniappanadarSSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/YuwonoU22, author = {Imam Yuwono and Eviani Damastuti Utomo}, title = {Neurological Disorders Detection Based on Computer Brain Interface Using Centralized Blockchain with Intrusion System}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {14}, number = {2}, pages = {168--178}, year = {2022}, url = {https://doi.org/10.17762/ijcnis.v14i2.5498}, doi = {10.17762/IJCNIS.V14I2.5498}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/YuwonoU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/JyothsnaPGD22, author = {V. Jyothsna and K. Munivara Prasad and GopiChand G and Durga Bhavani D}, title = {{DLMHS:} Flow-based intrusion detection system using deep learning neural network and meta-heuristic scale}, journal = {Int. J. Commun. Syst.}, volume = {35}, number = {10}, year = {2022}, url = {https://doi.org/10.1002/dac.5159}, doi = {10.1002/DAC.5159}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/JyothsnaPGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/WeiRLZ22, author = {Min Wei and Chunmeng Rong and Erxiong Liang and Yuan Zhuang}, title = {An intrusion detection mechanism for IPv6-based wireless sensor networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {18}, number = {3}, pages = {155013292210779}, year = {2022}, url = {https://doi.org/10.1177/15501329221077922}, doi = {10.1177/15501329221077922}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/WeiRLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdst/PawarJ22, author = {Mohandas V. Pawar and Anuradha Jagadeesan}, title = {Opposition-Based Deer Hunting Optimization-Based Hybrid Classifier for Intrusion Detection in Wireless Sensor Networks}, journal = {Int. J. Distributed Syst. Technol.}, volume = {13}, number = {5}, pages = {1--29}, year = {2022}, url = {https://doi.org/10.4018/IJDST.300356}, doi = {10.4018/IJDST.300356}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdst/PawarJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/CuiMLW22, author = {Ajun Cui and Yan{-}hong Ma and Chen Li and Xiao{-}ming Wang}, title = {Retrieval method for multi-level network malicious intrusion information based on sequential logic model}, journal = {Int. J. Inf. Commun. Technol.}, volume = {21}, number = {4}, pages = {386--397}, year = {2022}, url = {https://doi.org/10.1504/IJICT.2022.10051126}, doi = {10.1504/IJICT.2022.10051126}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijict/CuiMLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/MoZ22, author = {Lianguang Mo and Yucai Zhou}, title = {Small area purification and recognition of network intrusion signals based on the second-order matching filter detection}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {1}, pages = {1--7}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.122031}, doi = {10.1504/IJIPT.2022.122031}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/MoZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijira/Boopathi22, author = {Mythili Boopathi}, title = {Henry MaxNet: tversky index based feature selection and competitive swarm henry gas solubility optimization integrated Deep Maxout network for intrusion detection in IoT}, journal = {Int. J. Intell. Robotics Appl.}, volume = {6}, number = {2}, pages = {365--383}, year = {2022}, url = {https://doi.org/10.1007/s41315-022-00234-2}, doi = {10.1007/S41315-022-00234-2}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijira/Boopathi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GongDA22, author = {Qian Gong and Phil DeMar and Mine Altunay}, title = {ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {4}, pages = {799--812}, year = {2022}, url = {https://doi.org/10.1007/s10207-022-00584-9}, doi = {10.1007/S10207-022-00584-9}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/GongDA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/MathurLGL22, author = {Nitin O. Mathur and Chengcheng Li and Bilal Gonen and Kijung Lee}, title = {Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection}, journal = {Int. J. Inf. Secur. Priv.}, volume = {16}, number = {1}, pages = {1--32}, year = {2022}, url = {https://doi.org/10.4018/ijisp.291701}, doi = {10.4018/IJISP.291701}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/MathurLGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/WangZ22, author = {Xifeng Wang and Xiaoluan Zhang}, title = {Network intrusion detection method based on improved ant colony algorithm combined with cluster analysis in cloud computing environment}, journal = {Int. J. Inf. Technol. Manag.}, volume = {21}, number = {4}, pages = {345--358}, year = {2022}, url = {https://doi.org/10.1504/IJITM.2022.10051595}, doi = {10.1504/IJITM.2022.10051595}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijitm/WangZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/KagadeJ22, author = {Ranjeet B. Kagade and Santhosh Jayagopalan}, title = {Optimization assisted deep learning based intrusion detection system in wireless sensor network with two-tier trust evaluation}, journal = {Int. J. Netw. Manag.}, volume = {32}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/nem.2196}, doi = {10.1002/NEM.2196}, timestamp = {Wed, 14 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/KagadeJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpp/NaqashSN22, author = {Talha Naqash and Sajjad Hussain Shah and Muhammad Najam{-}ul{-}Islam}, title = {Statistical Analysis Based Intrusion Detection System for Ultra-High-Speed Software Defined Network}, journal = {Int. J. Parallel Program.}, volume = {50}, number = {1}, pages = {89--114}, year = {2022}, url = {https://doi.org/10.1007/s10766-021-00715-0}, doi = {10.1007/S10766-021-00715-0}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijpp/NaqashSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/WangZWRGZ22, author = {Qian Wang and Wenfang Zhao and Xiaoyu Wei and Jiadong Ren and Yuying Gao and Bing Zhang}, title = {Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {32}, number = {8}, pages = {1229--1245}, year = {2022}, url = {https://doi.org/10.1142/S0218194022500462}, doi = {10.1142/S0218194022500462}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/WangZWRGZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsir/DeelipK22, author = {Mali Shrikant Deelip and Govinda Kannayaram}, title = {ESREHO-MaxNet: Deep Maxout Network For Intrusion Detection And Attack Mitigation In Iot With Wrapper Based Feature Selection Approach}, journal = {Int. J. Swarm Intell. Res.}, volume = {13}, number = {1}, pages = {1--26}, year = {2022}, url = {https://doi.org/10.4018/ijsir.304901}, doi = {10.4018/IJSIR.304901}, timestamp = {Fri, 12 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsir/DeelipK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsir/KambleM22, author = {Arvind Kamble and Virendra S. Malemath}, title = {Adam Improved Rider Optimization-Based Deep Recurrent Neural Network for the Intrusion Detection in Cyber Physical Systems}, journal = {Int. J. Swarm Intell. Res.}, volume = {13}, number = {3}, pages = {1--22}, year = {2022}, url = {https://doi.org/10.4018/ijsir.304402}, doi = {10.4018/IJSIR.304402}, timestamp = {Fri, 09 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsir/KambleM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KherbacheAE22, author = {Meriem Kherbache and Kamal Amroun and David Espes}, title = {A new wrapper feature selection model for anomaly-based intrusion detection systems}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {2}, pages = {107--123}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.123298}, doi = {10.1504/IJSN.2022.123298}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KherbacheAE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/NishaP22, author = {T. N. Nisha and Dhanya Pramod}, title = {Network event-based model using finite state machine to detect and predict insider intrusion on enterprise networks}, journal = {Int. J. Secur. Networks}, volume = {17}, number = {4}, pages = {269--283}, year = {2022}, url = {https://doi.org/10.1504/IJSN.2022.10051286}, doi = {10.1504/IJSN.2022.10051286}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/NishaP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informatics/AntunesOSVSM22, author = {M{\'{a}}rio J. Antunes and Lu{\'{\i}}s M. L. Oliveira and Afonso Seguro and Jo{\~{a}}o Ver{\'{\i}}ssimo and Ruben Salgado and Tiago Murteira}, title = {Benchmarking Deep Learning Methods for Behaviour-Based Network Intrusion Detection}, journal = {Informatics}, volume = {9}, number = {1}, pages = {29}, year = {2022}, url = {https://doi.org/10.3390/informatics9010029}, doi = {10.3390/INFORMATICS9010029}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/informatics/AntunesOSVSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/AnwarHZ22, author = {Anika Anwar and Talal Halabi and Mohammad Zulkernine}, title = {Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: {A} hierarchical framework based on game theory}, journal = {Internet Things}, volume = {20}, pages = {100631}, year = {2022}, url = {https://doi.org/10.1016/j.iot.2022.100631}, doi = {10.1016/J.IOT.2022.100631}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iot/AnwarHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DaoL22, author = {Thi{-}Nga Dao and HyungJune Lee}, title = {Stacked Autoencoder-Based Probabilistic Feature Extraction for On-Device Network Intrusion Detection}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {16}, pages = {14438--14451}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3078292}, doi = {10.1109/JIOT.2021.3078292}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/DaoL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhaoGXYOAG22, author = {Ruijie Zhao and Guan Gui and Zhi Xue and Jie Yin and Tomoaki Ohtsuki and Bamidele Adebisi and Haris Gacanin}, title = {A Novel Intrusion Detection Method Based on Lightweight Neural Network for Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {12}, pages = {9960--9972}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3119055}, doi = {10.1109/JIOT.2021.3119055}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ZhaoGXYOAG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhouLLYSW22, author = {Xiaokang Zhou and Wei Liang and Weimin Li and Ke Yan and Shohei Shimizu and Kevin I{-}Kai Wang}, title = {Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {12}, pages = {9310--9319}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3130434}, doi = {10.1109/JIOT.2021.3130434}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhouLLYSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/RaviCA22, author = {Vinayakumar Ravi and Rajasekhar Chaganti and Mamoun Alazab}, title = {Deep Learning Feature Fusion Approach for an Intrusion Detection System in SDN-Based IoT Networks}, journal = {{IEEE} Internet Things Mag.}, volume = {5}, number = {2}, pages = {24--29}, year = {2022}, url = {https://doi.org/10.1109/IOTM.003.2200001}, doi = {10.1109/IOTM.003.2200001}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotm/RaviCA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SommestadHS22, author = {Teodor Sommestad and Hannes Holm and Daniel Steinvall}, title = {Variables influencing the effectiveness of signature-based network intrusion detection systems}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {6}, pages = {711--728}, year = {2022}, url = {https://doi.org/10.1080/19393555.2021.1975853}, doi = {10.1080/19393555.2021.1975853}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SommestadHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IborOOA22, author = {Ayei E. Ibor and Olusoji B. Okunoye and Florence A. Oladeji and Khadeejah A. Abdulsalam}, title = {Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems' Communication Networks based on Bio-inspired Deep Neural Network Structure}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103107}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103107}, doi = {10.1016/J.JISA.2021.103107}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/IborOOA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iswa/HassanAMAA22, author = {Ibrahim Hayatu Hassan and Mohammed Abdullahi and Mansur Aliyu Masama and Yusuf Sahabi Ali and Abdulrazaq Abdulrahim}, title = {An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection}, journal = {Intell. Syst. Appl.}, volume = {16}, pages = {200114}, year = {2022}, url = {https://doi.org/10.1016/j.iswa.2022.200114}, doi = {10.1016/J.ISWA.2022.200114}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iswa/HassanAMAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/0001LWZZH22, author = {Jia Zhao and Song Li and Runxiu Wu and Yiying Zhang and Bo Zhang and Longzhe Han}, title = {Tri-training algorithm based on cross entropy and K-nearest neighbors for network intrusion detection}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {16}, number = {12}, pages = {3889--3903}, year = {2022}, url = {https://doi.org/10.3837/tiis.2022.12.006}, doi = {10.3837/TIIS.2022.12.006}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/0001LWZZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaciii/XuSMZWL22, author = {Yuzhao Xu and Yanjing Sun and Zhanguo Ma and Hongjie Zhao and Yanfen Wang and Nannan Lu}, title = {Attribute Selection Based Genetic Network Programming for Intrusion Detection System}, journal = {J. Adv. Comput. Intell. Intell. Informatics}, volume = {26}, number = {5}, pages = {671--683}, year = {2022}, url = {https://doi.org/10.20965/jaciii.2022.p0671}, doi = {10.20965/JACIII.2022.P0671}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaciii/XuSMZWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/OnyemaDRSYW22, author = {Edeh Michael Onyema and Surjeet Dalal and Carlos Andr{\'{e}}s Tavera Romero and Bijeta Seth and Praise Young and Mohd Anas Wajid}, title = {Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities}, journal = {J. Cloud Comput.}, volume = {11}, pages = {26}, year = {2022}, url = {https://doi.org/10.1186/s13677-022-00305-6}, doi = {10.1186/S13677-022-00305-6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcloudc/OnyemaDRSYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/ZhangZXZ22, author = {Ling Zhang and Jian{-}Wei Zhang and Xiang{-}Jun Xin and Kai{-}Lai Zhou}, title = {Intrusion detection model based on coordinative immune and random antibody forest}, journal = {J. High Speed Networks}, volume = {28}, number = {3}, pages = {205--220}, year = {2022}, url = {https://doi.org/10.3233/JHS-220691}, doi = {10.3233/JHS-220691}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/ZhangZXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/SinghGR22, author = {Ghanshyam Singh and Shashank Gavel and Ajay Singh Raghuvanshi}, title = {A cross-layer based optimized feature selection scheme for intrusion detection in wireless sensor network}, journal = {J. Intell. Fuzzy Syst.}, volume = {42}, number = {6}, pages = {4949--4958}, year = {2022}, url = {https://doi.org/10.3233/JIFS-210700}, doi = {10.3233/JIFS-210700}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/SinghGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jikm/AbdussamiF22, author = {Aftab Alam Abdussami and Mohammed Faizan Farooqui}, title = {Optimal Feature Selection with Weight Optimised Deep Neural Network for Incremental Learning-Based Intrusion Detection in Fog Environment}, journal = {J. Inf. Knowl. Manag.}, volume = {21}, number = {3}, pages = {2250042:1--2250042:33}, year = {2022}, url = {https://doi.org/10.1142/S0219649222500423}, doi = {10.1142/S0219649222500423}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jikm/AbdussamiF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/UdasKR22, author = {Pritom Biswas Udas and Md. Ebtidaul Karim and Kowshik Sankar Roy}, title = {{SPIDER:} {A} shallow {PCA} based network intrusion detection system with enhanced recurrent neural networks}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {34}, number = {10 Part {B}}, pages = {10246--10272}, year = {2022}, url = {https://doi.org/10.1016/j.jksuci.2022.10.019}, doi = {10.1016/J.JKSUCI.2022.10.019}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/UdasKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/IoulianouVS22, author = {Philokypros P. Ioulianou and Vassilios G. Vassilakis and Siamak F. Shahandashti}, title = {A Trust-Based Intrusion Detection System for {RPL} Networks: Detecting a Combination of Rank and Blackhole Attacks}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {1}, pages = {124--152}, year = {2022}, url = {https://doi.org/10.3390/jcp2010009}, doi = {10.3390/JCP2010009}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/IoulianouVS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/LiWL22, author = {Wenjuan Li and Yu Wang and Jin Li}, title = {Enhancing blockchain-based filtration mechanism via {IPFS} for collaborative intrusion detection in IoT networks}, journal = {J. Syst. Archit.}, volume = {127}, pages = {102510}, year = {2022}, url = {https://doi.org/10.1016/j.sysarc.2022.102510}, doi = {10.1016/J.SYSARC.2022.102510}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/LiWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/AlimiOARA22, author = {Kuburat Oyeranti Adefemi Alimi and Khmaies Ouahada and Adnan M. Abu{-}Mahfouz and Suvendi Rimer and Oyeniyi Akeem Alimi}, title = {Refined {LSTM} Based Intrusion Detection for Denial-of-Service Attack in Internet of Things}, journal = {J. Sens. Actuator Networks}, volume = {11}, number = {3}, pages = {32}, year = {2022}, url = {https://doi.org/10.3390/jsan11030032}, doi = {10.3390/JSAN11030032}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsan/AlimiOARA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/RatheeKF22, author = {Geetanjali Rathee and Chaker Abdelaziz Kerrache and Mohamed Amine Ferrag}, title = {A Blockchain-Based Intrusion Detection System Using Viterbi Algorithm and Indirect Trust for IIoT Systems}, journal = {J. Sens. Actuator Networks}, volume = {11}, number = {4}, pages = {71}, year = {2022}, url = {https://doi.org/10.3390/jsan11040071}, doi = {10.3390/JSAN11040071}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsan/RatheeKF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/CavilleLLP22, author = {Evan Caville and Wai Weng Lo and Siamak Layeghy and Marius Portmann}, title = {Anomal-E: {A} self-supervised network intrusion detection system based on graph neural networks}, journal = {Knowl. Based Syst.}, volume = {258}, pages = {110030}, year = {2022}, url = {https://doi.org/10.1016/j.knosys.2022.110030}, doi = {10.1016/J.KNOSYS.2022.110030}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/CavilleLLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/ChenLWJWC22, author = {Yi Chen and Qiuzhen Lin and Wenhong Wei and Junkai Ji and Ka{-}Chun Wong and Carlos A. Coello Coello}, title = {Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in Fog computing}, journal = {Knowl. Based Syst.}, volume = {244}, pages = {108505}, year = {2022}, url = {https://doi.org/10.1016/j.knosys.2022.108505}, doi = {10.1016/J.KNOSYS.2022.108505}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/ChenLWJWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/KumarMR22, author = {Ravinder Kumar and Amita Malik and Virender Ranga}, title = {An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks}, journal = {Knowl. Based Syst.}, volume = {256}, pages = {109762}, year = {2022}, url = {https://doi.org/10.1016/j.knosys.2022.109762}, doi = {10.1016/J.KNOSYS.2022.109762}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/KumarMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/MoizuddinJ22, author = {M. D. Moizuddin and M. Victor Jose}, title = {A bio-inspired hybrid deep learning model for network intrusion detection}, journal = {Knowl. Based Syst.}, volume = {238}, pages = {107894}, year = {2022}, url = {https://doi.org/10.1016/j.knosys.2021.107894}, doi = {10.1016/J.KNOSYS.2021.107894}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/MoizuddinJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/DingKW22, author = {Shanshuo Ding and Liang Kou and Ting Wu}, title = {A GAN-Based Intrusion Detection Model for 5G Enabled Future Metaverse}, journal = {Mob. Networks Appl.}, volume = {27}, number = {6}, pages = {2596--2610}, year = {2022}, url = {https://doi.org/10.1007/s11036-022-02075-6}, doi = {10.1007/S11036-022-02075-6}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/DingKW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/DuLLT22, author = {Ruizhong Du and Yun Li and Xiaoyan Liang and Junfeng Tian}, title = {Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration}, journal = {Mob. Networks Appl.}, volume = {27}, number = {1}, pages = {431--440}, year = {2022}, url = {https://doi.org/10.1007/s11036-021-01838-x}, doi = {10.1007/S11036-021-01838-X}, timestamp = {Thu, 31 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/DuLLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChowdhurySRS22, author = {Ratul Chowdhury and Shibaprasad Sen and Arindam Roy and Banani Saha}, title = {An optimal feature based network intrusion detection system using bagging ensemble method for real-time traffic analysis}, journal = {Multim. Tools Appl.}, volume = {81}, number = {28}, pages = {41225--41247}, year = {2022}, url = {https://doi.org/10.1007/s11042-022-12330-3}, doi = {10.1007/S11042-022-12330-3}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/ChowdhurySRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/PustokhinaPLGKS22, author = {Irina Valeryevna Pustokhina and Denis Alexandrovich Pustokhin and E. Laxmi Lydia and Puneet Garg and Amarender Kadian and K. Shankar}, title = {Hyperparameter search based convolution neural network with Bi-LSTM model for intrusion detection system in multimedia big data environment}, journal = {Multim. Tools Appl.}, volume = {81}, number = {24}, pages = {34951--34968}, year = {2022}, url = {https://doi.org/10.1007/s11042-021-11271-7}, doi = {10.1007/S11042-021-11271-7}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/PustokhinaPLGKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ChenYZJ22, author = {Haoyu Chen and Bin Yuan and Deqing Zou and Hai Jin}, title = {A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G Networks}, journal = {{IEEE} Netw.}, volume = {36}, number = {4}, pages = {150--158}, year = {2022}, url = {https://doi.org/10.1109/MNET.002.2100655}, doi = {10.1109/MNET.002.2100655}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/ChenYZJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/WangLWWF22, author = {Tingting Wang and Jianqing Li and Wei Wei and Wei Wang and Kai Fang}, title = {Deep-Learning-Based Weak Electromagnetic Intrusion Detection Method for Zero Touch Networks on Industrial IoT}, journal = {{IEEE} Netw.}, volume = {36}, number = {6}, pages = {236--242}, year = {2022}, url = {https://doi.org/10.1109/MNET.001.2100754}, doi = {10.1109/MNET.001.2100754}, timestamp = {Wed, 08 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/WangLWWF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/BalamuruganMKYK22, author = {E. Balamurugan and Abolfazl Mehbodniya and Elham Kariri and Kusum Yadav and Anil Kumar and Mohd Anul Haq}, title = {Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network {(IDSGT-DNN)}}, journal = {Pattern Recognit. Lett.}, volume = {156}, pages = {142--151}, year = {2022}, url = {https://doi.org/10.1016/j.patrec.2022.02.013}, doi = {10.1016/J.PATREC.2022.02.013}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/prl/BalamuruganMKYK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/WangGYZDCK22, author = {Jian Wang and Shibin Gao and Long Yu and Dongkai Zhang and Chugang Ding and Ke Chen and Lei Kou}, title = {Predicting wind-caused floater intrusion risk for overhead contact lines based on Bayesian neural network with spatiotemporal correlation analysis}, journal = {Reliab. Eng. Syst. Saf.}, volume = {225}, pages = {108603}, year = {2022}, url = {https://doi.org/10.1016/j.ress.2022.108603}, doi = {10.1016/J.RESS.2022.108603}, timestamp = {Sat, 13 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ress/WangGYZDCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KimLLKCW22, author = {Wansoo Kim and Jungho Lee and Yousik Lee and Yeon{-}Jin Kim and Jingyun Chung and Samuel Woo}, title = {Vehicular Multilevel Data Arrangement-Based Intrusion Detection System for In-Vehicle {CAN}}, journal = {Secur. Commun. Networks}, volume = {2022}, pages = {4322148:1--4322148:11}, year = {2022}, url = {https://doi.org/10.1155/2022/4322148}, doi = {10.1155/2022/4322148}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KimLLKCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AlbasheerSMTSHK22, author = {Hashim Albasheer and Maheyzah Md Siraj and Azath Mubarakali and Omer Elsier Tayfour and Sayeed Haider Salih and Mosab Hamdan and Suleman Khan and Anazida Zainal and Sameer Kamarudeen}, title = {Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: {A} Survey}, journal = {Sensors}, volume = {22}, number = {4}, pages = {1494}, year = {2022}, url = {https://doi.org/10.3390/s22041494}, doi = {10.3390/S22041494}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AlbasheerSMTSHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Baz22, author = {Mohammed Baz}, title = {{SEHIDS:} Self Evolving Host-Based Intrusion Detection System for IoT Networks}, journal = {Sensors}, volume = {22}, number = {17}, pages = {6505}, year = {2022}, url = {https://doi.org/10.3390/s22176505}, doi = {10.3390/S22176505}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/Baz22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/RodriguezVOCVPC22, author = {Eva Rodr{\'{\i}}guez and Pol Valls and Beatriz Otero and Juan Jos{\'{e}} Costa and Javier Verd{\'{u}} and Manuel Alejandro Pajuelo and Ramon Canal}, title = {Transfer-Learning-Based Intrusion Detection Framework in IoT Networks}, journal = {Sensors}, volume = {22}, number = {15}, pages = {5621}, year = {2022}, url = {https://doi.org/10.3390/s22155621}, doi = {10.3390/S22155621}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/RodriguezVOCVPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SheikhiK22, author = {Saeid Sheikhi and Panos Kostakos}, title = {A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized {BP} Neural Network and GA-Based Feature Selection}, journal = {Sensors}, volume = {22}, number = {23}, pages = {9318}, year = {2022}, url = {https://doi.org/10.3390/s22239318}, doi = {10.3390/S22239318}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/SheikhiK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SinghANSL22, author = {Abhilash Singh and J. Amutha and Jaiprakash Nagar and Sandeep Sharma and Cheng{-}Chi Lee}, title = {{LT-FS-ID:} Log-Transformed Feature Learning and Feature-Scaling-Based Machine Learning Algorithms to Predict the k-Barriers for Intrusion Detection Using Wireless Sensor Network}, journal = {Sensors}, volume = {22}, number = {3}, pages = {1070}, year = {2022}, url = {https://doi.org/10.3390/s22031070}, doi = {10.3390/S22031070}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/SinghANSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sis/PatilP22, author = {Dharmaraj R. Patil and Tareek M. Pattewar}, title = {Majority Voting and Feature Selection Based Network Intrusion Detection System}, journal = {{EAI} Endorsed Trans. Scalable Inf. Syst.}, volume = {9}, number = {6}, pages = {e6}, year = {2022}, url = {https://doi.org/10.4108/eai.4-4-2022.173780}, doi = {10.4108/EAI.4-4-2022.173780}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sis/PatilP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/SinghK22, author = {Krishan Pal Singh and Nishtha Kesswani}, title = {An Anomaly-Based Intrusion Detection System for IoT Networks Using Trust Factor}, journal = {{SN} Comput. Sci.}, volume = {3}, number = {2}, pages = {168}, year = {2022}, url = {https://doi.org/10.1007/s42979-022-01053-9}, doi = {10.1007/S42979-022-01053-9}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/SinghK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/ThirimanneJYLH22, author = {Sharuka Promodya Thirimanne and Lasitha Jayawardana and Lasith Yasakethu and Pushpika Liyanaarachchi and Chaminda Hewage}, title = {Deep Neural Network Based Real-Time Intrusion Detection System}, journal = {{SN} Comput. Sci.}, volume = {3}, number = {2}, pages = {145}, year = {2022}, url = {https://doi.org/10.1007/s42979-022-01031-1}, doi = {10.1007/S42979-022-01031-1}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/ThirimanneJYLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/suscom/SamriyaTCSSK22, author = {Jitendra Kumar Samriya and Rajeev Tiwari and Xiaochun Cheng and Rahul Kumar Singh and Achyut Shankar and Manoj Kumar}, title = {Network intrusion detection using {ACO-DNN} model with {DVFS} based energy optimization in cloud framework}, journal = {Sustain. Comput. Informatics Syst.}, volume = {35}, pages = {100746}, year = {2022}, url = {https://doi.org/10.1016/j.suscom.2022.100746}, doi = {10.1016/J.SUSCOM.2022.100746}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/suscom/SamriyaTCSSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/swevo/CaoLFWJT22, author = {Zijian Cao and Jian Li and Yanfang Fu and Zhenyu Wang and Haowen Jia and Feng Tian}, title = {An adaptive biogeography-based optimization with cumulative covariance matrix for rule-based network intrusion detection}, journal = {Swarm Evol. Comput.}, volume = {75}, pages = {101199}, year = {2022}, url = {https://doi.org/10.1016/j.swevo.2022.101199}, doi = {10.1016/J.SWEVO.2022.101199}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/swevo/CaoLFWJT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/HanKK22, author = {Hyojoon Han and Hyukho Kim and Yangwoo Kim}, title = {An Efficient Hyperparameter Control Method for a Network Intrusion Detection System Based on Proximal Policy Optimization}, journal = {Symmetry}, volume = {14}, number = {1}, pages = {161}, year = {2022}, url = {https://doi.org/10.3390/sym14010161}, doi = {10.3390/SYM14010161}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/HanKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/MhawiAH22, author = {Doaa N. Mhawi and Ammar Aldallal and Soukeana Hassan}, title = {Advanced Feature-Selection-Based Hybrid Ensemble Learning Algorithms for Network Intrusion Detection Systems}, journal = {Symmetry}, volume = {14}, number = {7}, pages = {1461}, year = {2022}, url = {https://doi.org/10.3390/sym14071461}, doi = {10.3390/SYM14071461}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/MhawiAH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/NieWWGWGL22, author = {Laisen Nie and Yixuan Wu and Xiaojie Wang and Lei Guo and Guoyin Wang and Xinbo Gao and Shengtao Li}, title = {Intrusion Detection for Secure Social Internet of Things Based on Collaborative Edge Computing: {A} Generative Adversarial Network-Based Approach}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {9}, number = {1}, pages = {134--145}, year = {2022}, url = {https://doi.org/10.1109/TCSS.2021.3063538}, doi = {10.1109/TCSS.2021.3063538}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/NieWWGWGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/XieWGW22, author = {Jialiang Xie and Honghui Wang and Jonathan M. Garibaldi and Dongrui Wu}, title = {Network Intrusion Detection Based on Dynamic Intuitionistic Fuzzy Sets}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {30}, number = {9}, pages = {3460--3472}, year = {2022}, url = {https://doi.org/10.1109/TFUZZ.2021.3117441}, doi = {10.1109/TFUZZ.2021.3117441}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tfs/XieWGW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/NandyAKMV22, author = {Sudarshan Nandy and Mainak Adhikari and Mohammad Ayoub Khan and Varun G. Menon and Sandeep Verma}, title = {An Intrusion Detection Mechanism for Secured IoMT Framework Based on Swarm-Neural Network}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {26}, number = {5}, pages = {1969--1976}, year = {2022}, url = {https://doi.org/10.1109/JBHI.2021.3101686}, doi = {10.1109/JBHI.2021.3101686}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/NandyAKMV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/DerhabBMKK22, author = {Abdelouahid Derhab and Mohamed Belaoued and Irfan Mohiuddin and Fajri Kurniawan and Muhammad Khurram Khan}, title = {Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {3}, pages = {2366--2379}, year = {2022}, url = {https://doi.org/10.1109/TITS.2021.3088998}, doi = {10.1109/TITS.2021.3088998}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/DerhabBMKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/IslamRYM22, author = {Riadul Islam and Rafi Ud Daula Refat and Sai Manikanta Yerram and Hafiz Malik}, title = {Graph-Based Intrusion Detection System for Controller Area Networks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {3}, pages = {1727--1736}, year = {2022}, url = {https://doi.org/10.1109/TITS.2020.3025685}, doi = {10.1109/TITS.2020.3025685}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/IslamRYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/GanCDGW22, author = {Baiqiang Gan and Yuqiang Chen and Qiuping Dong and Jianlan Guo and Rongxia Wang}, title = {A convolutional neural network intrusion detection method based on data imbalance}, journal = {J. Supercomput.}, volume = {78}, number = {18}, pages = {19401--19434}, year = {2022}, url = {https://doi.org/10.1007/s11227-022-04633-x}, doi = {10.1007/S11227-022-04633-X}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/GanCDGW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/ApruzzesePC22, author = {Giovanni Apruzzese and Luca Pajola and Mauro Conti}, title = {The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {19}, number = {4}, pages = {5152--5169}, year = {2022}, url = {https://doi.org/10.1109/TNSM.2022.3157344}, doi = {10.1109/TNSM.2022.3157344}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/ApruzzesePC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ZhangCP22, author = {Chaoyun Zhang and Xavier Costa{-}P{\'{e}}rez and Paul Patras}, title = {Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {30}, number = {3}, pages = {1294--1311}, year = {2022}, url = {https://doi.org/10.1109/TNET.2021.3137084}, doi = {10.1109/TNET.2021.3137084}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/ZhangCP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/LoATACK22, author = {Wei Lo and Hamed AlQahtani and Kutub Thakur and Ahmad S. Almadhor and Subhash Chander and Gulshan Kumar}, title = {A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic}, journal = {Veh. Commun.}, volume = {35}, pages = {100471}, year = {2022}, url = {https://doi.org/10.1016/j.vehcom.2022.100471}, doi = {10.1016/J.VEHCOM.2022.100471}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/LoATACK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/GavelRT22, author = {Shashank Gavel and Ajay Singh Raghuvanshi and Sudarshan Tiwari}, title = {An optimized maximum correlation based feature reduction scheme for intrusion detection in data networks}, journal = {Wirel. Networks}, volume = {28}, number = {6}, pages = {2609--2624}, year = {2022}, url = {https://doi.org/10.1007/s11276-022-02988-w}, doi = {10.1007/S11276-022-02988-W}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/GavelRT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/OtairIAAS22, author = {Mohammed Otair and Osama Talab Ibrahim and Laith Abualigah and Maryam Altalhi and Putra Sumari}, title = {An enhanced Grey Wolf Optimizer based Particle Swarm Optimizer for intrusion detection system in wireless sensor networks}, journal = {Wirel. Networks}, volume = {28}, number = {2}, pages = {721--744}, year = {2022}, url = {https://doi.org/10.1007/s11276-021-02866-x}, doi = {10.1007/S11276-021-02866-X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/winet/OtairIAAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/KhannaRGSK22, author = {Ashish Khanna and Poonam Rani and Puneet Garg and Prakash Kumar Singh and Aditya Khamparia}, title = {An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System}, journal = {Wirel. Pers. Commun.}, volume = {127}, number = {3}, pages = {2021--2038}, year = {2022}, url = {https://doi.org/10.1007/s11277-021-08766-9}, doi = {10.1007/S11277-021-08766-9}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/KhannaRGSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/KhannaRGSK22a, author = {Ashish Khanna and Poonam Rani and Puneet Garg and Prakash Kumar Singh and Aditya Khamparia}, title = {Correction to: An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System}, journal = {Wirel. Pers. Commun.}, volume = {127}, number = {3}, pages = {2039}, year = {2022}, url = {https://doi.org/10.1007/s11277-021-09144-1}, doi = {10.1007/S11277-021-09144-1}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/KhannaRGSK22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/KrishnanKRJLSSK22, author = {Rajkumar Krishnan and R. Santhana Krishnan and Y. Harold Robinson and Eanoch Golden Julie and Hoang Viet Long and A. Sangeetha and M. Subramanian and Raghvendra Kumar}, title = {An Intrusion Detection and Prevention Protocol for Internet of Things Based Wireless Sensor Networks}, journal = {Wirel. Pers. Commun.}, volume = {124}, number = {4}, pages = {3461--3483}, year = {2022}, url = {https://doi.org/10.1007/s11277-022-09521-4}, doi = {10.1007/S11277-022-09521-4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/KrishnanKRJLSSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LabiodKG22, author = {Yasmine Labiod and Abdelaziz Amara Korba and Nassira Ghoualmi}, title = {Fog Computing-Based Intrusion Detection Architecture to Protect IoT Networks}, journal = {Wirel. Pers. Commun.}, volume = {125}, number = {1}, pages = {231--259}, year = {2022}, url = {https://doi.org/10.1007/s11277-022-09548-7}, doi = {10.1007/S11277-022-09548-7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/LabiodKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/PrakashL22a, author = {P. Jaya Prakash and B. Lalitha}, title = {Optimized Ensemble Classifier Based Network Intrusion Detection System for {RPL} Based Internet of Things}, journal = {Wirel. Pers. Commun.}, volume = {125}, number = {4}, pages = {3603--3626}, year = {2022}, url = {https://doi.org/10.1007/s11277-022-09726-7}, doi = {10.1007/S11277-022-09726-7}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/PrakashL22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ZhangHMWL22, author = {Ting Zhang and Dezhi Han and Mario Donato Marino and Lin Wang and Kuan{-}Ching Li}, title = {An Evolutionary-Based Approach for Low-Complexity Intrusion Detection in Wireless Sensor Networks}, journal = {Wirel. Pers. Commun.}, volume = {126}, number = {3}, pages = {2019--2042}, year = {2022}, url = {https://doi.org/10.1007/s11277-021-08757-w}, doi = {10.1007/S11277-021-08757-W}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ZhangHMWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ZhangSH22a, author = {Jie Zhang and Jinguang Sun and Hua He}, title = {Clustering Detection Method of Network Intrusion Feature Based on Support Vector Machine and {LCA} Block Algorithm}, journal = {Wirel. Pers. Commun.}, volume = {127}, number = {1}, pages = {599--613}, year = {2022}, url = {https://doi.org/10.1007/s11277-021-08353-y}, doi = {10.1007/S11277-021-08353-Y}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/ZhangSH22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MerzoukDNCBY22, author = {Mohamed Amine Merzouk and Jos{\'{e}}phine Delas and Christopher Neal and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Reda Yaich}, title = {Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {31:1--31:6}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3539006}, doi = {10.1145/3538969.3539006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MerzoukDNCBY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acit3/AhmedHA22, author = {Lubna Ali Hassan Ahmed and Yahia Abdalla Mohamed Hamad and Ahmed Abdallah Mohamed Ali Abdalla}, title = {Network-based Intrusion Detection Datasets: {A} Survey}, booktitle = {International Arab Conference on Information Technology, {ACIT} 2022, Abu Dhabi, United Arab Emirates, November 22-24, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ACIT57182.2022.9994201}, doi = {10.1109/ACIT57182.2022.9994201}, timestamp = {Wed, 11 Jan 2023 17:54:00 +0100}, biburl = {https://dblp.org/rec/conf/acit3/AhmedHA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiam/Ren22, author = {Yifan Ren}, title = {Analysis of network intrusion detection based on machine learning}, booktitle = {4th International Conference on Artificial Intelligence and Advanced Manufacturing, {AIAM} 2022, Hamburg, Germany, October 7-9, 2022}, pages = {699--702}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AIAM57466.2022.00142}, doi = {10.1109/AIAM57466.2022.00142}, timestamp = {Tue, 11 Apr 2023 21:46:10 +0200}, biburl = {https://dblp.org/rec/conf/aiam/Ren22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/AlkhatibMGD22, author = {Natasha Alkhatib and Maria Mushtaq and Hadi Ghauch and Jean{-}Luc Danger}, title = {{CAN-BERT} do it? Controller Area Network Intrusion Detection System based on {BERT} Language Model}, booktitle = {19th {IEEE/ACS} International Conference on Computer Systems and Applications, {AICCSA} 2022, Abu Dhabi, United Arab Emirates, December 5-8, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AICCSA56895.2022.10017800}, doi = {10.1109/AICCSA56895.2022.10017800}, timestamp = {Thu, 26 Jan 2023 11:35:09 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/AlkhatibMGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiiot/SaurabhSKSV0K22, author = {Kumar Saurabh and Saksham Sood and P. Aditya Kumar and Uphar Singh and Ranjana Vyas and O. P. Vyas and Rahamatullah Khondoker}, title = {{LBDMIDS:} {LSTM} Based Deep Learning Model for Intrusion Detection Systems for IoT Networks}, booktitle = {2022 {IEEE} World {AI} IoT Congress (AIIoT), Seattle, WA, USA, June 6-9, 2022}, pages = {753--759}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AIIoT54504.2022.9817245}, doi = {10.1109/AIIOT54504.2022.9817245}, timestamp = {Wed, 19 Jul 2023 12:22:41 +0200}, biburl = {https://dblp.org/rec/conf/aiiot/SaurabhSKSV0K22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiipcc/DingJ22, author = {Yuhang Ding and Wenrong Jiang}, title = {Intrusion Detection Method Based On Improved Conditional Generative Adversarial Network}, booktitle = {International Conference on Artificial Intelligence, Information Processing and Cloud Computing, {AIIPCC} 2022, Kunming, China, August 19-21, 2022}, pages = {37--40}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AIIPCC57291.2022.00016}, doi = {10.1109/AIIPCC57291.2022.00016}, timestamp = {Tue, 11 Apr 2023 21:46:11 +0200}, biburl = {https://dblp.org/rec/conf/aiipcc/DingJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiipcc/YeSC22, author = {Chengqiong Ye and Mali Sun and Yang Chen}, title = {Research on Key Technologies of Network Intrusion Detection Based on Machine Learning}, booktitle = {International Conference on Artificial Intelligence, Information Processing and Cloud Computing, {AIIPCC} 2022, Kunming, China, August 19-21, 2022}, pages = {342--349}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AIIPCC57291.2022.00079}, doi = {10.1109/AIIPCC57291.2022.00079}, timestamp = {Tue, 11 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aiipcc/YeSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/AlatwiM22, author = {Huda Ali Alatwi and Charles Morisset}, editor = {Shusaku Tsumoto and Yukio Ohsawa and Lei Chen and Dirk Van den Poel and Xiaohua Hu and Yoichi Motomura and Takuya Takagi and Lingfei Wu and Ying Xie and Akihiro Abe and Vijay Raghavan}, title = {Threat Modeling for Machine Learning-Based Network Intrusion Detection Systems}, booktitle = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022}, pages = {4226--4235}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigData55660.2022.10020368}, doi = {10.1109/BIGDATA55660.2022.10020368}, timestamp = {Fri, 18 Aug 2023 17:39:03 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/AlatwiM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/camad/ZachosMEPRR22, author = {Georgios Zachos and Georgios Mantas and Ismael Essop and Kyriakos Porfyrakis and Jos{\'{e}} Carlos Ribeiro and Jonathan Rodriguez}, title = {Prototyping an Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks}, booktitle = {27th {IEEE} International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, {CAMAD} 2022, Paris, France, November 2-3, 2022}, pages = {179--183}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CAMAD55695.2022.9966912}, doi = {10.1109/CAMAD55695.2022.9966912}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/camad/ZachosMEPRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/TarekMSISA22, author = {Md. Hasan Tarek and Md. Mumtahin Habib Ullah Mazumder and Sadia Sharmin and Md. Shariful Islam and Mohammad Shoyaib and Muhammad Mahbub Alam}, title = {{RHC:} Cluster based Feature Reduction for Network Intrusion Detections}, booktitle = {19th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2022, Las Vegas, NV, USA, January 8-11, 2022}, pages = {378--384}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CCNC49033.2022.9700680}, doi = {10.1109/CCNC49033.2022.9700680}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/TarekMSISA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccwc/SGZJN22, author = {Ricardo Manzano S. and Nishith Goel and Marzia Zaman and Rohit Joshi and Kshirasagar Naik}, title = {Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT Networks}, booktitle = {12th {IEEE} Annual Computing and Communication Workshop and Conference, {CCWC} 2022, Las Vegas, NV, USA, January 26-29, 2022}, pages = {191--198}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CCWC54503.2022.9720857}, doi = {10.1109/CCWC54503.2022.9720857}, timestamp = {Sat, 19 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccwc/SGZJN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/LiYL22, author = {Yangmin Li and Xinhang Yuan and Wengen Li}, editor = {Mohammad Al Hasan and Li Xiong}, title = {An Extreme Semi-supervised Framework Based on Transformer for Network Intrusion Detection}, booktitle = {Proceedings of the 31st {ACM} International Conference on Information {\&} Knowledge Management, Atlanta, GA, USA, October 17-21, 2022}, pages = {4204--4208}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3511808.3557549}, doi = {10.1145/3511808.3557549}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/LiYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/SinglaB22, author = {Ankush Singla and Elisa Bertino}, title = {{DP-ADA:} Differentially Private Adversarial Domain Adaptation for Training Deep Learning based Network Intrusion Detection Systems}, booktitle = {8th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2022, Atlanta, GA, USA, December 14-16, 2022}, pages = {89--98}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CIC56439.2022.00023}, doi = {10.1109/CIC56439.2022.00023}, timestamp = {Fri, 24 Mar 2023 09:22:05 +0100}, biburl = {https://dblp.org/rec/conf/coinco/SinglaB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/DestaOAF22, author = {Araya Kibrom Desta and Shuji Ohira and Ismail Arai and Kazutoshi Fujikawa}, editor = {Hong Va Leong and Sahra Sedigh Sarvestani and Yuuichi Teranishi and Alfredo Cuzzocrea and Hiroki Kashiwazaki and Dave Towey and Ji{-}Jiang Yang and Hossain Shahriar}, title = {{U-CAN:} {A} Convolutional Neural Network Based Intrusion Detection for Controller Area Networks}, booktitle = {46th {IEEE} Annual Computers, Software, and Applications Conferenc, {COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022}, pages = {1481--1488}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/COMPSAC54236.2022.00235}, doi = {10.1109/COMPSAC54236.2022.00235}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/DestaOAF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/AmalapuramTVCT22, author = {Suresh Kumar Amalapuram and Akash Tadwai and Reethu Vinta and Sumohana S. Channappayya and Bheemarjuna Reddy Tamma}, title = {Continual Learning for Anomaly based Network Intrusion Detection}, booktitle = {14th International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2022, Bangalore, India, January 4-8, 2022}, pages = {497--505}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/COMSNETS53615.2022.9668482}, doi = {10.1109/COMSNETS53615.2022.9668482}, timestamp = {Tue, 25 Jan 2022 16:35:12 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/AmalapuramTVCT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/NguyenW22, author = {Loc Gia Nguyen and Kohei Watabe}, editor = {Narseo Vallina{-}Rodriguez and Jon Crowcroft}, title = {Flow-based network intrusion detection based on {BERT} masked language model}, booktitle = {Proceedings of the 3rd International CoNEXT Student Workshop, CoNEXT-SW 2022, Rome, Italy, 9 December 2022}, pages = {7--8}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3565477.3569152}, doi = {10.1145/3565477.3569152}, timestamp = {Mon, 05 Dec 2022 10:35:38 +0100}, biburl = {https://dblp.org/rec/conf/conext/NguyenW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csci/EfiongAOA22, author = {John E. Efiong and Bodunde O. Akinyemi and Emmanuel Ajayi Olajubu and Ganiyu Adesola Aderounmu}, title = {GRASSMARLIN-based Metadata Extraction of Cyber-Physical Systems Intrusion Detection in CyberSCADA Networks}, booktitle = {International Conference on Computational Science and Computational Intelligence, {CSCI} 2022, Las Vegas, NV, USA, December 14-16, 2022}, pages = {1122--1128}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSCI58124.2022.00201}, doi = {10.1109/CSCI58124.2022.00201}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csci/EfiongAOA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/HughesMS22, author = {Kieran Hughes and Kieran McLaughlin and Sakir Sezer}, title = {Policy-Based Profiles for Network Intrusion Response Systems}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2022, Rhodes, Greece, July 27-29, 2022}, pages = {279--286}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSR54599.2022.9850304}, doi = {10.1109/CSR54599.2022.9850304}, timestamp = {Fri, 19 Aug 2022 14:18:24 +0200}, biburl = {https://dblp.org/rec/conf/csr2/HughesMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HalisdemirKPLC22, author = {Emre Halisdemir and Hacer Karacan and Mauno Pihelgas and Toomas Lepik and Sungbaek Cho}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution Proposal}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {367--383}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811014}, doi = {10.23919/CYCON55549.2022.9811014}, timestamp = {Fri, 15 Jul 2022 10:39:16 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HalisdemirKPLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/FanLS22, author = {Chun{-}I Fan and Yen{-}Lin Lai and Cheng{-}Han Shie}, title = {Clustering-Based Network Intrusion Detection System}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888886}, doi = {10.1109/DSC54232.2022.9888886}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/FanLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsa/LiuLM22, author = {Zhiyu Liu and Meishu Luo and Baoying Ma}, title = {Network Intrusion Detection based on {RBF} Neural Networks and Fuzzy Cluster}, booktitle = {9th International Conference on Dependable Systems and Their Applications, {DSA} 2022, Wulumuqi, China, August 4-5, 2022}, pages = {236--240}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSA56465.2022.00040}, doi = {10.1109/DSA56465.2022.00040}, timestamp = {Tue, 08 Nov 2022 21:42:41 +0100}, biburl = {https://dblp.org/rec/conf/dsa/LiuLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/OzdelAAKA22, author = {S{\"{u}}leyman {\"{O}}zdel and {\c{C}}agatay Ates and Pelin Damla Ates and Mutlu Koca and Emin Anarim}, title = {Payload-Based Network Traffic Analysis for Application Classification and Intrusion Detection}, booktitle = {30th European Signal Processing Conference, {EUSIPCO} 2022, Belgrade, Serbia, August 29 - Sept. 2, 2022}, pages = {638--642}, publisher = {{IEEE}}, year = {2022}, url = {https://ieeexplore.ieee.org/document/9909683}, timestamp = {Tue, 25 Oct 2022 21:20:45 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/OzdelAAKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/Calugar0022, author = {Andrei Nicolae Calugar and Weizhi Meng and Haijun Zhang}, title = {Towards Artificial Neural Network Based Intrusion Detection with Enhanced Hyperparameter Tuning}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro, Brazil, December 4-8, 2022}, pages = {2627--2632}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/GLOBECOM48099.2022.10000809}, doi = {10.1109/GLOBECOM48099.2022.10000809}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/Calugar0022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhaoXLM22, author = {Yilin Zhao and Yijie Xun and Jiajia Liu and Siyu Ma}, title = {{GVIDS:} {A} Reliable Vehicle Intrusion Detection System Based on Generative Adversarial Network}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro, Brazil, December 4-8, 2022}, pages = {4310--4315}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/GLOBECOM48099.2022.10001410}, doi = {10.1109/GLOBECOM48099.2022.10001410}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/ZhaoXLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/ZhangCLZSLG22, author = {Hangsheng Zhang and Yu Chen and Weiyu Liu and Shangyuan Zhuang and Jiyan Sun and Yinlong Liu and Liru Geng}, title = {A Shapley-based Lightweight Global Explainer for Network Intrusion Detection System}, booktitle = {24th {IEEE} Int Conf on High Performance Computing {\&} Communications; 8th Int Conf on Data Science {\&} Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud {\&} Big Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2022, Hainan, China, December 18-20, 2022}, pages = {554--561}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00101}, doi = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00101}, timestamp = {Thu, 06 Apr 2023 11:34:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/ZhangCLZSLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/ZhangZZBZS22, author = {Yuemeng Zhang and Yong Zhang and Zhao Zhang and Haonan Bai and Tianyi Zhong and Mei Song}, title = {Evaluation of data poisoning attacks on federated learning-based network intrusion detection system}, booktitle = {24th {IEEE} Int Conf on High Performance Computing {\&} Communications; 8th Int Conf on Data Science {\&} Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud {\&} Big Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2022, Hainan, China, December 18-20, 2022}, pages = {2235--2242}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00330}, doi = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00330}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/ZhangZZBZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/MowlaRV22, author = {Nishat I. Mowla and Joakim Rosell and Arash Vahidi}, title = {Dynamic Voting based Explainable Intrusion Detection System for In-vehicle Network}, booktitle = {24th International Conference on Advanced Communication Technology, {ICACT} 2022, Pyeongchang, Korea, February 13-16, 2022}, pages = {406--411}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/ICACT53585.2022.9728968}, doi = {10.23919/ICACT53585.2022.9728968}, timestamp = {Fri, 15 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icact/MowlaRV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/YuHWYH22, author = {Tianqi Yu and Guodong Hua and Huaisheng Wang and Jianfeng Yang and Jianling Hu}, title = {Federated-LSTM based Network Intrusion Detection Method for Intelligent Connected Vehicles}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul, Korea, May 16-20, 2022}, pages = {4324--4329}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICC45855.2022.9838655}, doi = {10.1109/ICC45855.2022.9838655}, timestamp = {Fri, 19 Aug 2022 10:24:08 +0200}, biburl = {https://dblp.org/rec/conf/icc/YuHWYH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangZLHDZHFY22, author = {Hanyang Wang and Sirui Zhou and Honglei Li and Juan Hu and Xinran Du and Jinghui Zhou and Yunlong He and Fa Fu and Houqun Yang}, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Deep Learning Network Intrusion Detection Based on Network Traffic}, booktitle = {Artificial Intelligence and Security - 8th International Conference, {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13340}, pages = {194--207}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06791-4\_16}, doi = {10.1007/978-3-031-06791-4\_16}, timestamp = {Tue, 02 Aug 2022 22:23:49 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangZLHDZHFY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsip/SuoWCCS22, author = {Yuhan Suo and Rui Wang and Senchun Chai and Runqi Chai and Mengwei Su}, editor = {Fuchun Sun and Angelo Cangelosi and Jianwei Zhang and Yuanlong Yu and Huaping Liu and Bin Fang}, title = {{NKB-S:} Network Intrusion Detection Based on {SMOTE} Sample Generation}, booktitle = {Cognitive Systems and Information Processing - 7th International Conference, {ICCSIP} 2022, Fuzhou, China, December 17-18, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1787}, pages = {130--147}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-0617-8\_10}, doi = {10.1007/978-981-99-0617-8\_10}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsip/SuoWCCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccspa/AlbaseerA22, author = {Abdullatif Albaseer and Mohamed M. Abdallah}, title = {Fine-tuned LSTM-Based Model for Efficient Honeypot-Based Network Intrusion Detection System in Smart Grid Networks}, booktitle = {5th International Conference on Communications, Signal Processing, and their Applications, {ICCSPA} 2022, Cairo, Egypt, December 27-29, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICCSPA55860.2022.10019245}, doi = {10.1109/ICCSPA55860.2022.10019245}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccspa/AlbaseerA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/RizviSM022, author = {Syed Rizvi and Mark Scanlon and Jimmy McGibney and John Sheppard}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {355--367}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_21}, doi = {10.1007/978-3-031-36574-4\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/RizviSM022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BorcherdingFKMB22, author = {Anne Borcherding and Lukas Feldmann and Markus Karch and Ankush Meshram and J{\"{u}}rgen Beyerer}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {314--325}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010795900003120}, doi = {10.5220/0010795900003120}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BorcherdingFKMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/NwaforO22, author = {Ebelechukwu Nwafor and Habeeb Olufowobi}, editor = {M. Arif Wani and Mehmed M. Kantardzic and Vasile Palade and Daniel Neagu and Longzhi Yang and Kit Yan Chan}, title = {{CANBERT:} {A} Language-based Intrusion Detection Model for In-vehicle Networks}, booktitle = {21st {IEEE} International Conference on Machine Learning and Applications, {ICMLA} 2022, Nassau, Bahamas, December 12-14, 2022}, pages = {294--299}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICMLA55696.2022.00048}, doi = {10.1109/ICMLA55696.2022.00048}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmla/NwaforO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/CyriacHK22, author = {Sibu Cyriac and B. M. Harsha and Yong Woon Kim}, title = {Seismic Activity-based Human Intrusion Detection using Deep Neural Networks}, booktitle = {13th International Conference on Information and Communication Technology Convergence, {ICTC} 2022, Jeju Island, Korea, Republic of, October 19-21, 2022}, pages = {130--135}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICTC55196.2022.9952913}, doi = {10.1109/ICTC55196.2022.9952913}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/CyriacHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/DaoNV22, author = {Thi{-}Nga Dao and Huu{-}Noi Nguyen and Van Son Vu}, title = {A Network Intrusion Detection Architecture Based on Class Parallelism on Distributed Switches}, booktitle = {13th International Conference on Information and Communication Technology Convergence, {ICTC} 2022, Jeju Island, Korea, Republic of, October 19-21, 2022}, pages = {1284--1289}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICTC55196.2022.9952903}, doi = {10.1109/ICTC55196.2022.9952903}, timestamp = {Wed, 30 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ictc/DaoNV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/IhekoronyeA0L22, author = {Vivian Ukamaka Ihekoronye and Simeon Okechukwu Ajakwe and Dong{-}Seong Kim and Jae{-}Min Lee}, title = {Cyber Edge Intelligent Intrusion Detection Framework For {UAV} Network Based on Random Forest Algorithm}, booktitle = {13th International Conference on Information and Communication Technology Convergence, {ICTC} 2022, Jeju Island, Korea, Republic of, October 19-21, 2022}, pages = {1242--1247}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICTC55196.2022.9952400}, doi = {10.1109/ICTC55196.2022.9952400}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/IhekoronyeA0L22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/GolubevN22, author = {Sergey Golubev and Evgenia Novikova}, editor = {Lars Braubach and Kai Jander and Costin Badica}, title = {Image-Based Intrusion Detection in Network Traffic}, booktitle = {Intelligent Distributed Computing XV, 15th International Symposium on Intelligent Distributed Computing, {IDC} 2022, Virtual Event / Bremen, Germany, 14-15 September 2022}, series = {Studies in Computational Intelligence}, volume = {1089}, pages = {51--60}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29104-3\_6}, doi = {10.1007/978-3-031-29104-3\_6}, timestamp = {Mon, 15 Apr 2024 16:13:56 +0200}, biburl = {https://dblp.org/rec/conf/idc/GolubevN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idsta/Al-ZoubiA22, author = {Hussein Al{-}Zoubi and Samah Altaamneh}, editor = {Mohammad A. Alsmirat and Yaser Jararweh and Moayad Aloqaily and Izzat Alsmadi}, title = {A Feature Selection Technique for Network Intrusion Detection based on the Chaotic Crow Search Algorithm}, booktitle = {3rd International Conference on Intelligent Data Science Technologies and Applications, {IDSTA} 2022, San Antonio, TX, USA, September 5-7, 2022}, pages = {54--60}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IDSTA55301.2022.9923108}, doi = {10.1109/IDSTA55301.2022.9923108}, timestamp = {Thu, 10 Nov 2022 11:54:13 +0100}, biburl = {https://dblp.org/rec/conf/idsta/Al-ZoubiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/BennaceurSA22, author = {K. Bennaceur and Zakaria Sahraoui and Mohamed Ahmed{-}Nacer}, editor = {Ilias Maglogiannis and Lazaros Iliadis and John MacIntyre and Paulo Cortez}, title = {Enhanced Dependency-Based Feature Selection to Improve Anomaly Network Intrusion Detection}, booktitle = {Artificial Intelligence Applications and Innovations - 18th {IFIP} {WG} 12.5 International Conference, {AIAI} 2022, Hersonissos, Crete, Greece, June 17-20, 2022, Proceedings, Part {I}}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {646}, pages = {108--115}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-08333-4\_9}, doi = {10.1007/978-3-031-08333-4\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip12/BennaceurSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/ChenGFSMW22, author = {Junjun Chen and Qiang Guo and Zhongnan Fu and Qun Shang and Hao Ma and Di Wu}, title = {Campus Network Intrusion Detection based on Federated Learning}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2022, Padua, Italy, July 18-23, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IJCNN55064.2022.9892843}, doi = {10.1109/IJCNN55064.2022.9892843}, timestamp = {Mon, 10 Oct 2022 17:40:09 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/ChenGFSMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangJLS22, author = {Zhihao Wang and Dingde Jiang and Zhihan Lv and Houbing Song}, title = {A Deep Reinforcement Learning based Intrusion Detection Strategy for Smart Vehicular Networks}, booktitle = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications Workshops, {INFOCOM} 2022 - Workshops, New York, NY, USA, May 2-5, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/INFOCOMWKSHPS54753.2022.9798344}, doi = {10.1109/INFOCOMWKSHPS54753.2022.9798344}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WangJLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscsic/Tian22, author = {Qiuting Tian}, title = {An Intrusion Detection Approach Based on Improved Deep Belief Network and LightGBM}, booktitle = {6th International Symposium on Computer Science and Intelligent Control, {ISCSIC} 2022, Beijing, China, November 11-13, 2022}, pages = {40--44}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISCSIC57216.2022.00020}, doi = {10.1109/ISCSIC57216.2022.00020}, timestamp = {Sat, 25 Mar 2023 16:11:40 +0100}, biburl = {https://dblp.org/rec/conf/iscsic/Tian22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/SuTCYX22, author = {Xin Su and Tian Tian and Lei Cai and Baoliu Ye and Hongyan Xing}, title = {A CVAE-GAN-based Approach to Process Imbalanced Datasets for Intrusion Detection in Marine Meteorological Sensor Networks}, booktitle = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom 2022, Melbourne, Australia, December 17-19, 2022}, pages = {197--203}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom57177.2022.00032}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM57177.2022.00032}, timestamp = {Sat, 01 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/SuTCYX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsda/LiWMZ22, author = {Hongyi Li and Zicheng Wang and Hua Meng and Zhengchun Zhou}, title = {Solving the data imbalance problem in network intrusion detection : {A} {MP-CVAE} based method}, booktitle = {10th International Workshop on Signal Design and Its Applications in Communications, {IWSDA} 2022, Colchester, UK, August 1-5, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IWSDA50346.2022.9870444}, doi = {10.1109/IWSDA50346.2022.9870444}, timestamp = {Sat, 17 Sep 2022 23:41:13 +0200}, biburl = {https://dblp.org/rec/conf/iwsda/LiWMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/ToliupaPZVRW22, author = {Serhii Toliupa and Ivan Parkhomenko and Ruslana Ziubina and Olga Veselska and Stanislaw Andrzej Rajba and Kornel Warwas}, editor = {Matteo Cristani and Carlos Toro and Cecilia Zanni{-}Merk and Robert J. Howlett and Lakhmi C. Jain}, title = {Detection of abnormal traffic and network intrusions based on multiple fuzzy rules}, booktitle = {Knowledge-Based and Intelligent Information {\&} Engineering Systems: Proceedings of the 26th International Conference KES-2022, Verona, Italy and Virtual Event, 7-9 September 2022}, series = {Procedia Computer Science}, volume = {207}, pages = {44--53}, publisher = {Elsevier}, year = {2022}, url = {https://doi.org/10.1016/j.procs.2022.09.036}, doi = {10.1016/J.PROCS.2022.09.036}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kes/ToliupaPZVRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kse/NguyenNHS22, author = {Van Quan Nguyen and Viet Hung Nguyen and Tuan Hao Hoang and Nathan Shone}, editor = {Nguyen Ba Hung and Le Sy Vinh and Nguyen Le Minh and Ha Minh Hoang and Bui Thu Lam and Phan Xuan Hieu and Nguyen Trung Lap and Vo Dinh Hieu and Van Huu Quang Nhat}, title = {A Novel Deep Clustering Variational Auto-Encoder for Anomaly-based Network Intrusion Detection}, booktitle = {14th International Conference on Knowledge and Systems Engineering, {KSE} 2022, Nha Trang, Vietnam, October 19-21, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/KSE56063.2022.9953763}, doi = {10.1109/KSE56063.2022.9953763}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kse/NguyenNHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lwa/SchoenbornA22, author = {Jakob Michael Schoenborn and Klaus{-}Dieter Althoff}, editor = {Pascal Reuss and Viktor Eisenstadt and Jakob Michael Sch{\"{o}}nborn and Jero Sch{\"{a}}fer}, title = {Multi-Agent Case-Based Reasoning: a Network Intrusion Detection System}, booktitle = {Proceedings of the {LWDA} 2022 Workshops: FGWM, FGKD, and FGDB, Hildesheim (Germany), Oktober 5-7th, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3341}, pages = {258--269}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3341/WM-LWDA\_2022\_CRC\_9388.pdf}, timestamp = {Wed, 22 Mar 2023 07:29:50 +0100}, biburl = {https://dblp.org/rec/conf/lwa/SchoenbornA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/HongZA22, author = {Mei Hong and Yingyong Zou and Chun Ai}, editor = {Yuan Xu and Hongyang Yan and Huang Teng and Jun Cai and Jin Li}, title = {Large Scale Network Intrusion Detection Model Based on {FS} Feature Selection}, booktitle = {Machine Learning for Cyber Security - 4th International Conference, {ML4CS} 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13655}, pages = {380--393}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20096-0\_29}, doi = {10.1007/978-3-031-20096-0\_29}, timestamp = {Mon, 30 Jan 2023 08:02:23 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/HongZA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/HuLGXZ22a, author = {Gebiao Hu and Zhichi Lin and Zheng Guo and Ruiqing Xu and Xiao Zhang}, editor = {Yuan Xu and Hongyang Yan and Huang Teng and Jun Cai and Jin Li}, title = {Research on Intrusion Prevention Optimization Algorithm of Power {UAV} Network Communication Based on Artificial Intelligence}, booktitle = {Machine Learning for Cyber Security - 4th International Conference, {ML4CS} 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13657}, pages = {265--278}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20102-8\_21}, doi = {10.1007/978-3-031-20102-8\_21}, timestamp = {Mon, 30 Jan 2023 08:02:06 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/HuLGXZ22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/Xu22a, author = {Jiaoxing Xu}, editor = {Yuan Xu and Hongyang Yan and Huang Teng and Jun Cai and Jin Li}, title = {Vehicle {CAN} Network Intrusion Detection Model Based on Extreme Learning Machine and Feature Analysis}, booktitle = {Machine Learning for Cyber Security - 4th International Conference, {ML4CS} 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13656}, pages = {550--564}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20099-1\_46}, doi = {10.1007/978-3-031-20099-1\_46}, timestamp = {Mon, 30 Jan 2023 08:02:13 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/Xu22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/KyeK22, author = {Hyoseon Kye and Minhae Kwon}, title = {Partial federated learning based network intrusion system for mobile devices: poster}, booktitle = {MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17 - 20, 2022}, pages = {283--284}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3492866.3561257}, doi = {10.1145/3492866.3561257}, timestamp = {Tue, 27 Sep 2022 16:36:53 +0200}, biburl = {https://dblp.org/rec/conf/mobihoc/KyeK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/VenturiZMC22, author = {Andrea Venturi and Claudio Zanasi and Mirco Marchetti and Michele Colajanni}, editor = {Michele Colajanni and Luca Ferretti and Miguel L. Pardal and Dimiter R. Avresky}, title = {Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning}, booktitle = {21st {IEEE} International Symposium on Network Computing and Applications, {NCA} 2022, Boston, MA, USA, December 14-16, 2022}, pages = {235--242}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NCA57778.2022.10013643}, doi = {10.1109/NCA57778.2022.10013643}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nca/VenturiZMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/ArregocesVGB22, author = {Paulina Arregoces and Jaime Vergara and Sergio Armando Gutierrez and Juan Felipe Botero}, title = {Network-based Intrusion Detection: {A} One-class Classification Approach}, booktitle = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2022, Budapest, Hungary, April 25-29, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NOMS54207.2022.9789927}, doi = {10.1109/NOMS54207.2022.9789927}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/ArregocesVGB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/LoLSGP22, author = {Wai Weng Lo and Siamak Layeghy and Mohanad Sarhan and Marcus Gallagher and Marius Portmann}, title = {E-GraphSAGE: {A} Graph Neural Network based Intrusion Detection System for IoT}, booktitle = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2022, Budapest, Hungary, April 25-29, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NOMS54207.2022.9789878}, doi = {10.1109/NOMS54207.2022.9789878}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/noms/LoLSGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LiMLWHHY22, author = {Yunhao Li and Weichuan Mo and Cong Li and Haiyang Wang and Jianwei He and Shanshan Hao and Hongyang Yan}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {Network Intrusion Detection Adversarial Attacks for {LEO} Constellation Networks Based on Deep Learning}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {51--65}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_3}, doi = {10.1007/978-3-031-23020-2\_3}, timestamp = {Thu, 08 Dec 2022 15:13:16 +0100}, biburl = {https://dblp.org/rec/conf/nss/LiMLWHHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/AlSarrayZ22, author = {Fatin Neamah Ridha Al{-}Sarray and Maslina Zolkepli}, editor = {Hiroyuki Takizawa and Hong Shen and Toshihiro Hanawa and Jong Hyuk Park and Hui Tian and Ryusuke Egawa}, title = {Detecting Network Intrusions with Resilient Approaches Based on Convolutional Neural Networks}, booktitle = {Parallel and Distributed Computing, Applications and Technologies - 23rd International Conference, {PDCAT} 2022, Sendai, Japan, December 7-9, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13798}, pages = {238--248}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29927-8\_19}, doi = {10.1007/978-3-031-29927-8\_19}, timestamp = {Tue, 02 May 2023 15:08:25 +0200}, biburl = {https://dblp.org/rec/conf/pdcat/AlSarrayZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/BelarbiKCS22, author = {Othmane Belarbi and Aftab Khan and Pietro Edoardo Carnelli and Theodoros Spyridopoulos}, editor = {Chunhua Su and Kouichi Sakurai and Feng Liu}, title = {An Intrusion Detection System Based on Deep Belief Networks}, booktitle = {Science of Cyber Security - 4th International Conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13580}, pages = {377--392}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17551-0\_25}, doi = {10.1007/978-3-031-17551-0\_25}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scisec/BelarbiKCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/BiGY22, author = {Jing Bi and Ziyue Guan and Haitao Yuan}, title = {Hybrid Network Intrusion Detection with Stacked Sparse Contractive Autoencoders and Attention-based Bidirectional {LSTM}}, booktitle = {{IEEE} International Conference on Systems, Man, and Cybernetics, {SMC} 2022, Prague, Czech Republic, October 9-12, 2022}, pages = {6--11}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SMC53654.2022.9945600}, doi = {10.1109/SMC53654.2022.9945600}, timestamp = {Thu, 01 Dec 2022 15:59:35 +0100}, biburl = {https://dblp.org/rec/conf/smc/BiGY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/LinWJL22, author = {Jiaying Lin and Yehua Wei and Haoran Jiang and Jing Long}, title = {Intrusion Detection System for In-vehicle Networks with Incremental Learning Based on Cloud-Edge Collaborative Architecture}, booktitle = {{IEEE} Smartworld, Ubiquitous Intelligence {\&} Computing, Scalable Computing {\&} Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous {\&} Trusted Vehicles, SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022, Haikou, China, December 15-18, 2022}, pages = {2026--2031}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00293}, doi = {10.1109/SMARTWORLD-UIC-ATC-SCALCOM-DIGITALTWIN-PRICOMP-METAVERSE56740.2022.00293}, timestamp = {Fri, 04 Aug 2023 17:34:39 +0200}, biburl = {https://dblp.org/rec/conf/uic/LinWJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/HeLYX22, author = {Guofeng He and Qing Lu and Guangqiang Yin and Hu Xiong}, editor = {Lei Wang and Michael Segal and Jenhui Chen and Tie Qiu}, title = {Network Intrusion Detection Based on Hybrid Neural Network}, booktitle = {Wireless Algorithms, Systems, and Applications - 17th International Conference, {WASA} 2022, Dalian, China, November 24-26, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13472}, pages = {644--655}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-19214-2\_54}, doi = {10.1007/978-3-031-19214-2\_54}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wasa/HeLYX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wincom/ChoukhairiFA22, author = {Mouad Choukhairi and Youssef Fakhri and Mohamed Amnai}, editor = {Ahmed Drissi El Malian and Mohamed El{-}Kamili and Luca Foschini and Abdellatif Kobbane and Shuai Han}, title = {{TTIDS} : {A} Time-Driven Trust Based Intrusion Detection System for IoT Networks}, booktitle = {9th International Conference on Wireless Networks and Mobile Communications, {WINCOM} 2022, Rabat, Morocco, October 26-29, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WINCOM55661.2022.9966466}, doi = {10.1109/WINCOM55661.2022.9966466}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wincom/ChoukhairiFA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/LiuSKBD22, author = {Jinxin Liu and Murat Simsek and Burak Kantarci and Mehran Bagheri and Petar Djukic}, title = {{SCVIC-CIDS-2022:} Bridging Networks and Hosts via Machine Learning-Based Intrusion Detection}, publisher = {{IEEE} DataPort}, year = {2022}, month = sep, howpublished = {\url{https://doi.org/10.21227/dn9v-3278}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/dn9v-3278}, doi = {10.21227/DN9V-3278}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/LiuSKBD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-03134, author = {Tian Dong and Song Li and Han Qiu and Jialiang Lu}, title = {An Interpretable Federated Learning-based Network Intrusion Detection Framework}, journal = {CoRR}, volume = {abs/2201.03134}, year = {2022}, url = {https://arxiv.org/abs/2201.03134}, eprinttype = {arXiv}, eprint = {2201.03134}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-03134.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-01332, author = {Wen Xu and Julian Jang{-}Jaccard and Tong Liu and Fariza Sabrina}, title = {Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection}, journal = {CoRR}, volume = {abs/2202.01332}, year = {2022}, url = {https://arxiv.org/abs/2202.01332}, eprinttype = {arXiv}, eprint = {2202.01332}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-01332.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-04686, author = {Giovanni Apruzzese and Luca Pajola and Mauro Conti}, title = {The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems}, journal = {CoRR}, volume = {abs/2203.04686}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.04686}, doi = {10.48550/ARXIV.2203.04686}, eprinttype = {arXiv}, eprint = {2203.04686}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-04686.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-05232, author = {Tuan{-}Hong Chua and Iftekhar Salam}, title = {Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System}, journal = {CoRR}, volume = {abs/2203.05232}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.05232}, doi = {10.48550/ARXIV.2203.05232}, eprinttype = {arXiv}, eprint = {2203.05232}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-05232.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-16365, author = {Yuhua Yin and Julian Jang{-}Jaccard and Wen Xu and Amardeep Singh and Jinting Zhu and Fariza Sabrina and Jin Kwak}, title = {{IGRF-RFE:} {A} Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on {UNSW-NB15} Dataset}, journal = {CoRR}, volume = {abs/2203.16365}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.16365}, doi = {10.48550/ARXIV.2203.16365}, eprinttype = {arXiv}, eprint = {2203.16365}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-16365.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-03779, author = {Amardeep Singh and Julian Jang{-}Jaccard}, title = {Autoencoder-based Unsupervised Intrusion Detection using Multi-Scale Convolutional Recurrent Networks}, journal = {CoRR}, volume = {abs/2204.03779}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.03779}, doi = {10.48550/ARXIV.2204.03779}, eprinttype = {arXiv}, eprint = {2204.03779}, timestamp = {Wed, 13 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-03779.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-01306, author = {Md Hasan Shahriar and Yang Xiao and Pablo Moriano and Wenjing Lou and Y. Thomas Hou}, title = {CANShield: Signal-based Intrusion Detection for Controller Area Networks}, journal = {CoRR}, volume = {abs/2205.01306}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.01306}, doi = {10.48550/ARXIV.2205.01306}, eprinttype = {arXiv}, eprint = {2205.01306}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-01306.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-04112, author = {Siamak Layeghy and Marius Portmann}, title = {On Generalisability of Machine Learning-based Network Intrusion Detection Systems}, journal = {CoRR}, volume = {abs/2205.04112}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.04112}, doi = {10.48550/ARXIV.2205.04112}, eprinttype = {arXiv}, eprint = {2205.04112}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-04112.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-00424, author = {Kumar Saurabh and Saksham Sood and P. Aditya Kumar and Uphar Singh and Ranjana Vyas and O. P. Vyas and Rahamatullah Khondoker}, title = {{LBDMIDS:} {LSTM} Based Deep Learning Model for Intrusion Detection Systems for IoT Networks}, journal = {CoRR}, volume = {abs/2207.00424}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.00424}, doi = {10.48550/ARXIV.2207.00424}, eprinttype = {arXiv}, eprint = {2207.00424}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-00424.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-02117, author = {Othmane Belarbi and Aftab Khan and Pietro Edoardo Carnelli and Theodoros Spyridopoulos}, title = {An Intrusion Detection System based on Deep Belief Networks}, journal = {CoRR}, volume = {abs/2207.02117}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.02117}, doi = {10.48550/ARXIV.2207.02117}, eprinttype = {arXiv}, eprint = {2207.02117}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-02117.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-04843, author = {Ibrahim Aliyu and S{\'{e}}linde van Engelenburg and Muhammed Bashir Mu'azu and Jinsul Kim and Chang Gyoon Lim}, title = {Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems}, journal = {CoRR}, volume = {abs/2207.04843}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.04843}, doi = {10.48550/ARXIV.2207.04843}, eprinttype = {arXiv}, eprint = {2207.04843}, timestamp = {Wed, 13 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-04843.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-06819, author = {Evan Caville and Wai Weng Lo and Siamak Layeghy and Marius Portmann}, title = {Anomal-E: {A} Self-Supervised Network Intrusion Detection System based on Graph Neural Networks}, journal = {CoRR}, volume = {abs/2207.06819}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.06819}, doi = {10.48550/ARXIV.2207.06819}, eprinttype = {arXiv}, eprint = {2207.06819}, timestamp = {Tue, 19 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-06819.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-09902, author = {Mohammad Masum and Hossain Shahriar and Hisham Haddad and Md. Jobair Hossain Faruk and Maria Valero and Md Abdullah Khan and Mohammad Ashiqur Rahman and Muhaiminul I. Adnan and Alfredo Cuzzocrea}, title = {Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection}, journal = {CoRR}, volume = {abs/2207.09902}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.09902}, doi = {10.48550/ARXIV.2207.09902}, eprinttype = {arXiv}, eprint = {2207.09902}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-09902.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-04052, author = {Jiahui Chen and Yi Zhao and Qi Li and Ke Xu}, title = {FedDef: Robust Federated Learning-based Network Intrusion Detection Systems Against Gradient Leakage}, journal = {CoRR}, volume = {abs/2210.04052}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.04052}, doi = {10.48550/ARXIV.2210.04052}, eprinttype = {arXiv}, eprint = {2210.04052}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-04052.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-09439, author = {Natasha Alkhatib and Maria Mushtaq and Hadi Ghauch and Jean{-}Luc Danger}, title = {{CAN-BERT} do it? Controller Area Network Intrusion Detection System based on {BERT} Language Model}, journal = {CoRR}, volume = {abs/2210.09439}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.09439}, doi = {10.48550/ARXIV.2210.09439}, eprinttype = {arXiv}, eprint = {2210.09439}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-09439.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-15700, author = {Islam Debicha and Richard Bauwens and Thibault Debatty and Jean{-}Michel Dricot and Tayeb Kenaza and Wim Mees}, title = {{TAD:} Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems}, journal = {CoRR}, volume = {abs/2210.15700}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.15700}, doi = {10.48550/ARXIV.2210.15700}, eprinttype = {arXiv}, eprint = {2210.15700}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-15700.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-03933, author = {Zong{-}Zhi Lin and Thomas D. Pike and Mark M. Bailey and Nathaniel D. Bastian}, title = {A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System}, journal = {CoRR}, volume = {abs/2211.03933}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.03933}, doi = {10.48550/ARXIV.2211.03933}, eprinttype = {arXiv}, eprint = {2211.03933}, timestamp = {Wed, 09 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-03933.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChuaS22, author = {Tuan{-}Hong Chua and Iftekhar Salam}, title = {Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2022}, url = {https://eprint.iacr.org/2022/335}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChuaS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/Alqahtani22, title = {{FSO-LSTM} {IDS:} hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks}, journal = {J. Supercomput.}, volume = {78}, number = {7}, pages = {9438--9455}, year = {2022}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s11227-021-04285-3}, doi = {10.1007/S11227-021-04285-3}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/Alqahtani22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/tr/Einy21, author = {Sajad Einy}, title = {Makina {\"{o}}{\u{g}}renmesile biyometrik sahtekarl{\i}{\u{g}}a ve a{\u{g}} anormallik tespitine dayal{\i} sald{\i}r{\i} tespiti (Intrusion detection based on biometric spoofing and network anomaly detection with machine learning algorithms)}, school = {Sakarya University, Turkey}, year = {2021}, url = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=PED5aMAd9AKhCxMg60s4lw\&no=R5-dBfNGrYTyTI7DJB6ixg}, timestamp = {Sun, 19 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/tr/Einy21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AliyuFEKL21, author = {Ibrahim Aliyu and Marco Carlo Feliciano and S{\'{e}}linde van Engelenburg and Dong Ok Kim and Chang Gyoon Lim}, title = {A Blockchain-Based Federated Forest for SDN-Enabled In-Vehicle Network Intrusion Detection System}, journal = {{IEEE} Access}, volume = {9}, pages = {102593--102608}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3094365}, doi = {10.1109/ACCESS.2021.3094365}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AliyuFEKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlsalehB21, author = {Alanoud Alsaleh and Wojdan Binsaeedan}, title = {The Influence of Salp Swarm Algorithm-Based Feature Selection on Network Anomaly Intrusion Detection}, journal = {{IEEE} Access}, volume = {9}, pages = {112466--112477}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3102095}, doi = {10.1109/ACCESS.2021.3102095}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AlsalehB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BertoliJSSVMBRO21, author = {Gustavo de Carvalho Bertoli and Louren{\c{c}}o Alves Pereira J{\'{u}}nior and Osamu Saotome and Aldri L. dos Santos and Filipe Alves Neto Verri and Cesar Augusto Cavalheiro Marcondes and Sidnei Barbieri and Moises S. Rodrigues and Jos{\'{e}} M. Parente de Oliveira}, title = {An End-to-End Framework for Machine Learning-Based Network Intrusion Detection System}, journal = {{IEEE} Access}, volume = {9}, pages = {106790--106805}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3101188}, doi = {10.1109/ACCESS.2021.3101188}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/BertoliJSSVMBRO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BozdalSJ21, author = {Mehmet Bozdal and Mohammad Samie and Ian K. Jennions}, title = {{WINDS:} {A} Wavelet-Based Intrusion Detection System for Controller Area Network {(CAN)}}, journal = {{IEEE} Access}, volume = {9}, pages = {58621--58633}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3073057}, doi = {10.1109/ACCESS.2021.3073057}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BozdalSJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FanC21, author = {Zhijie Fan and Zhiwei Cao}, title = {Method of Network Intrusion Discovery Based on Convolutional Long-Short Term Memory Network and Implementation in {VSS}}, journal = {{IEEE} Access}, volume = {9}, pages = {122744--122753}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3104718}, doi = {10.1109/ACCESS.2021.3104718}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/FanC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GadNB21, author = {Abdallah R. Gad and Ahmed A. Nashat and Tamer M. Barkat}, title = {Intrusion Detection System Using Machine Learning for Vehicular Ad Hoc Networks Based on ToN-IoT Dataset}, journal = {{IEEE} Access}, volume = {9}, pages = {142206--142217}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3120626}, doi = {10.1109/ACCESS.2021.3120626}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GadNB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JeuneGM21, author = {Laurens Le Jeune and Toon Goedem{\'{e}} and Nele Mentens}, title = {Machine Learning for Misuse-Based Network Intrusion Detection: Overview, Unified Evaluation and Feature Choice Comparison Framework}, journal = {{IEEE} Access}, volume = {9}, pages = {63995--64015}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3075066}, doi = {10.1109/ACCESS.2021.3075066}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JeuneGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KumarGA21, author = {Satish Kumar and Sunanda Gupta and Sakshi Arora}, title = {Research Trends in Network-Based Intrusion Detection Systems: {A} Review}, journal = {{IEEE} Access}, volume = {9}, pages = {157761--157779}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3129775}, doi = {10.1109/ACCESS.2021.3129775}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KumarGA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuWLL21, author = {Lan Liu and Pengcheng Wang and Jun Lin and Langzhou Liu}, title = {Intrusion Detection of Imbalanced Network Traffic Based on Machine Learning and Deep Learning}, journal = {{IEEE} Access}, volume = {9}, pages = {7550--7563}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2020.3048198}, doi = {10.1109/ACCESS.2020.3048198}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuWLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MartinSAC21, author = {Manuel L{\'{o}}pez Mart{\'{\i}}n and Antonio S{\'{a}}nchez{-}Esguevillas and Juan Ignacio Arribas and Bel{\'{e}}n Carro}, title = {Network Intrusion Detection Based on Extended {RBF} Neural Network With Offline Reinforcement Learning}, journal = {{IEEE} Access}, volume = {9}, pages = {153153--153170}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3127689}, doi = {10.1109/ACCESS.2021.3127689}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MartinSAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MendoncaTRSMNR21, author = {Robson V. Mendon{\c{c}}a and Arthur A. M. Teodoro and Renata Lopes Rosa and Muhammad Saadi and Dick Carrillo Melgarejo and Pedro H. J. Nardelli and Dem{\'{o}}stenes Z. Rodr{\'{\i}}guez}, title = {Intrusion Detection System Based on Fast Hierarchical Deep Convolutional Neural Network}, journal = {{IEEE} Access}, volume = {9}, pages = {61024--61034}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3074664}, doi = {10.1109/ACCESS.2021.3074664}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MendoncaTRSMNR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Mora-GimenoMVA21, author = {Francisco Jos{\'{e}} Mora{-}Gimeno and Higinio Mora Mora and Bruno Volckaert and Ankita Atrey}, title = {Intrusion Detection System Based on Integrated System Calls Graph and Neural Networks}, journal = {{IEEE} Access}, volume = {9}, pages = {9822--9833}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3049249}, doi = {10.1109/ACCESS.2021.3049249}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Mora-GimenoMVA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MoulahiZAA21, author = {Tarek Moulahi and Salah Zidi and Abdulatif Alabdulatif and Mohammed Atiquzzaman}, title = {Comparative Performance Evaluation of Intrusion Detection Based on Machine Learning in In-Vehicle Controller Area Network Bus}, journal = {{IEEE} Access}, volume = {9}, pages = {99595--99605}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3095962}, doi = {10.1109/ACCESS.2021.3095962}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MoulahiZAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ParkKKSS21, author = {Daekyeong Park and Sangsoo Kim and Hyukjin Kwon and Dongil Shin and Dongkyoo Shin}, title = {Host-Based Intrusion Detection Model Using Siamese Network}, journal = {{IEEE} Access}, volume = {9}, pages = {76614--76623}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3082160}, doi = {10.1109/ACCESS.2021.3082160}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ParkKKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SeoP21, author = {Wooseok Seo and Wooguil Pak}, title = {Real-Time Network Intrusion Prevention System Based on Hybrid Machine Learning}, journal = {{IEEE} Access}, volume = {9}, pages = {46386--46397}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3066620}, doi = {10.1109/ACCESS.2021.3066620}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SeoP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SiddiqiP21, author = {Murtaza Ahmed Siddiqi and Wooguil Pak}, title = {An Agile Approach to Identify Single and Hybrid Normalization for Enhancing Machine Learning-Based Network Intrusion Detection}, journal = {{IEEE} Access}, volume = {9}, pages = {137494--137513}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3118361}, doi = {10.1109/ACCESS.2021.3118361}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SiddiqiP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TangL21, author = {Yanqiang Tang and Chenghai Li}, title = {An Online Network Intrusion Detection Model Based on Improved Regularized Extreme Learning Machine}, journal = {{IEEE} Access}, volume = {9}, pages = {94826--94844}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3093313}, doi = {10.1109/ACCESS.2021.3093313}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/TangL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TufanTA21, author = {Emrah Tufan and Cihangir Tezcan and Cengiz Acart{\"{u}}rk}, title = {Anomaly-Based Intrusion Detection by Machine Learning: {A} Case Study on Probing Attacks to an Institutional Network}, journal = {{IEEE} Access}, volume = {9}, pages = {50078--50092}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3068961}, doi = {10.1109/ACCESS.2021.3068961}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TufanTA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/UhmP21, author = {Yeongje Uhm and Wooguil Pak}, title = {Service-Aware Two-Level Partitioning for Machine Learning-Based Network Intrusion Detection With High Performance and High Scalability}, journal = {{IEEE} Access}, volume = {9}, pages = {6608--6622}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2020.3048900}, doi = {10.1109/ACCESS.2020.3048900}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/UhmP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangZLL21, author = {Zhendong Wang and Yong Zeng and Yaodi Liu and Dahai Li}, title = {Deep Belief Network Integrating Improved Kernel-Based Extreme Learning Machine for Network Intrusion Detection}, journal = {{IEEE} Access}, volume = {9}, pages = {16062--16091}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3051074}, doi = {10.1109/ACCESS.2021.3051074}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangZLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YueWWDN21, author = {Chuan Yue and Lide Wang and Dengrui Wang and Ruifeng Duo and Xiaobo Nie}, title = {An Ensemble Intrusion Detection Method for Train Ethernet Consist Network Based on {CNN} and {RNN}}, journal = {{IEEE} Access}, volume = {9}, pages = {59527--59539}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3073413}, doi = {10.1109/ACCESS.2021.3073413}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YueWWDN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/accs/KumarGT21, author = {Prabhat Kumar and Govind P. Gupta and Rakesh Tripathi}, title = {Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network}, journal = {Autom. Control. Comput. Sci.}, volume = {55}, number = {2}, pages = {137--147}, year = {2021}, url = {https://doi.org/10.3103/S0146411621020085}, doi = {10.3103/S0146411621020085}, timestamp = {Mon, 17 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/accs/KumarGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/VargheseJ21, author = {Meble Varghese and M. Victor Jose}, title = {Securing Cloud from Attacks: Machine Learning Based Intrusion Detection in Cloud Sensor Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {50}, number = {1-4}, pages = {143--171}, year = {2021}, url = {https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-50-number-1-4-2021/20233-2/}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ahswn/VargheseJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/BediGJ21, author = {Punam Bedi and Neha Gupta and Vinita Jindal}, title = {I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems}, journal = {Appl. Intell.}, volume = {51}, number = {2}, pages = {1133--1151}, year = {2021}, url = {https://doi.org/10.1007/s10489-020-01886-y}, doi = {10.1007/S10489-020-01886-Y}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apin/BediGJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/KhanPKKHNA21, author = {Izhar Ahmed Khan and Dechang Pi and Nasrullah Khan and Zaheer Ullah Khan and Yasir Hussain and Asif Nawaz and Farman Ali}, title = {A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks}, journal = {Appl. Intell.}, volume = {51}, number = {10}, pages = {7306--7321}, year = {2021}, url = {https://doi.org/10.1007/s10489-021-02222-8}, doi = {10.1007/S10489-021-02222-8}, timestamp = {Sun, 30 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/KhanPKKHNA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bdcc/LoukT21, author = {Maya Hilda Lestari Louk and Bayu Adhi Tama}, title = {Exploring Ensemble-Based Class Imbalance Learners for Intrusion Detection in Industrial Control Networks}, journal = {Big Data Cogn. Comput.}, volume = {5}, number = {4}, pages = {72}, year = {2021}, url = {https://doi.org/10.3390/bdcc5040072}, doi = {10.3390/BDCC5040072}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bdcc/LoukT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bigdata/Al-TuraikiA21, author = {Isra Al{-}Turaiki and Najwa Altwaijry}, title = {A Convolutional Neural Network for Improved Anomaly-Based Network Intrusion Detection}, journal = {Big Data}, volume = {9}, number = {3}, pages = {233--252}, year = {2021}, url = {https://doi.org/10.1089/big.2020.0263}, doi = {10.1089/BIG.2020.0263}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bigdata/Al-TuraikiA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/candie/MashuriALPW21, author = {Muhammad Mashuri and Muhammad Ahsan and Muhammad Hisyam Lee and Dedy Dwi Prastyo and Wibawati}, title = {PCA-based Hotelling's \emph{T}\({}^{\mbox{2}}\) chart with fast minimum covariance determinant {(FMCD)} estimator and kernel density estimation {(KDE)} for network intrusion detection}, journal = {Comput. Ind. Eng.}, volume = {158}, pages = {107447}, year = {2021}, url = {https://doi.org/10.1016/j.cie.2021.107447}, doi = {10.1016/J.CIE.2021.107447}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/candie/MashuriALPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cin/MouallaKJ21, author = {Soulaiman Moualla and Khaldoun Khorzom and Assef Jafar}, title = {Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the {UNSW-NB15} Dataset}, journal = {Comput. Intell. Neurosci.}, volume = {2021}, pages = {5557577:1--5557577:13}, year = {2021}, url = {https://doi.org/10.1155/2021/5557577}, doi = {10.1155/2021/5557577}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cin/MouallaKJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cin/WangTQ0021, author = {Zu{-}Min Wang and Jiyu Tian and Jing Qin and Hui Fang and Li{-}Ming Chen}, title = {A Few-Shot Learning-Based Siamese Capsule Network for Intrusion Detection with Imbalanced Training Data}, journal = {Comput. Intell. Neurosci.}, volume = {2021}, pages = {7126913:1--7126913:17}, year = {2021}, url = {https://doi.org/10.1155/2021/7126913}, doi = {10.1155/2021/7126913}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cin/WangTQ0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/DengLYW21, title = {Retraction Note to: Mobile network intrusion detection for IoT system based on transfer learning algorithm}, journal = {Clust. Comput.}, volume = {24}, number = {1}, pages = {589}, year = {2021}, url = {https://doi.org/10.1007/s10586-021-03251-1}, doi = {10.1007/S10586-021-03251-1}, timestamp = {Wed, 31 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/DengLYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/SrilathaS21, author = {Doddi Srilatha and Gopal Krishna Shyam}, title = {Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network}, journal = {Clust. Comput.}, volume = {24}, number = {3}, pages = {2657--2672}, year = {2021}, url = {https://doi.org/10.1007/s10586-021-03281-9}, doi = {10.1007/S10586-021-03281-9}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/SrilathaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AlvaresDAGHR21, author = {Christabelle Alvares and Dristi Dinesh and Syed Alvi and Tannish Gautam and Maheen Hasib and Ali Raza}, title = {Dataset of attacks on a live enterprise VoIP network for machine learning based intrusion detection and prevention systems}, journal = {Comput. Networks}, volume = {197}, pages = {108283}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108283}, doi = {10.1016/J.COMNET.2021.108283}, timestamp = {Fri, 24 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AlvaresDAGHR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HademSM21, author = {Pynbianglut Hadem and Dilip Kumar Saikia and Soumen Moulik}, title = {An SDN-based Intrusion Detection System using {SVM} with Selective Logging for {IP} Traceback}, journal = {Comput. Networks}, volume = {191}, pages = {108015}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108015}, doi = {10.1016/J.COMNET.2021.108015}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HademSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KhanKKAA21, author = {Ammar Ahmed Khan and Muhammad Mubashir Khan and Kashif Mehboob Khan and Junaid Arshad and Farhan Ahmad}, title = {A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs}, journal = {Comput. Networks}, volume = {196}, pages = {108217}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108217}, doi = {10.1016/J.COMNET.2021.108217}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KhanKKAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YazdinejadPDK21, author = {Abbas Yazdinejad and Reza M. Parizi and Ali Dehghantanha and Mohammad S. Khan}, title = {A kangaroo-based intrusion detection system on software-defined networks}, journal = {Comput. Networks}, volume = {184}, pages = {107688}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2020.107688}, doi = {10.1016/J.COMNET.2020.107688}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/YazdinejadPDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YinZL21, author = {Sheng{-}lin Yin and Xing{-}Lan Zhang and Shuo Liu}, title = {Intrusion detection for capsule networks based on dual routing mechanism}, journal = {Comput. Networks}, volume = {197}, pages = {108328}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108328}, doi = {10.1016/J.COMNET.2021.108328}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/YinZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YuDCLXLQLZZ21, author = {Lian Yu and Jingtao Dong and Lihao Chen and Mengyuan Li and Bingfeng Xu and Zhao Li and Lin Qiao and Lijun Liu and Bei Zhao and Chen Zhang}, title = {{PBCNN:} Packet Bytes-based Convolutional Neural Network for Network Intrusion Detection}, journal = {Comput. Networks}, volume = {194}, pages = {108117}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108117}, doi = {10.1016/J.COMNET.2021.108117}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/YuDCLXLQLZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/JiaLZHS21, author = {Huaping Jia and Jun Liu and Min Zhang and Xiaohu He and Weixi Sun}, title = {Network intrusion detection based on {IE-DBN} model}, journal = {Comput. Commun.}, volume = {178}, pages = {131--140}, year = {2021}, url = {https://doi.org/10.1016/j.comcom.2021.07.016}, doi = {10.1016/J.COMCOM.2021.07.016}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/JiaLZHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/RaoRR21, author = {K. Narayana Rao and K. Venkata Rao and P. V. G. D. Prasad Reddy}, title = {A hybrid Intrusion Detection System based on Sparse autoencoder and Deep Neural Network}, journal = {Comput. Commun.}, volume = {180}, pages = {77--88}, year = {2021}, url = {https://doi.org/10.1016/j.comcom.2021.08.026}, doi = {10.1016/J.COMCOM.2021.08.026}, timestamp = {Tue, 23 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/RaoRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NazirK21, author = {Anjum Nazir and Rizwan Ahmed Khan}, title = {A novel combinatorial optimization based feature selection method for network intrusion detection}, journal = {Comput. Secur.}, volume = {102}, pages = {102164}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102164}, doi = {10.1016/J.COSE.2020.102164}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NazirK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/00010JY0021, author = {Wenjuan Li and Yu Wang and Zhiping Jin and Keping Yu and Jin Li and Yang Xiang}, title = {Challenge-based collaborative intrusion detection in software-defined networking: an evaluation}, journal = {Digit. Commun. Networks}, volume = {7}, number = {2}, pages = {257--263}, year = {2021}, url = {https://doi.org/10.1016/j.dcan.2020.09.003}, doi = {10.1016/J.DCAN.2020.09.003}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcan/00010JY0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/Sohn21, author = {Insoo Sohn}, title = {Deep belief network based intrusion detection techniques: {A} survey}, journal = {Expert Syst. Appl.}, volume = {167}, pages = {114170}, year = {2021}, url = {https://doi.org/10.1016/j.eswa.2020.114170}, doi = {10.1016/J.ESWA.2020.114170}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/Sohn21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/GavelSSRT21, author = {Shashank Gavel and Jyotsana Singh and Namrata Shukla and Ajay Singh Raghuvanshi and Sudarshan Tiwari}, title = {Feature reduction scheme for anomaly-based intrusion detection in wireless networks: Building of hybrid model}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {12}, year = {2021}, url = {https://doi.org/10.1002/ett.4367}, doi = {10.1002/ETT.4367}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/GavelSSRT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/ThaseenBLGA21, author = {I. Sumaiya Thaseen and J. Saira Banu and K. Lavanya and Muhammad Rukunuddin Ghalib and Kumar Abhishek}, title = {An integrated intrusion detection system using correlation-based attribute selection and artificial neural network}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/ett.4014}, doi = {10.1002/ETT.4014}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/ThaseenBLGA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ViolettasSPM21, author = {George E. Violettas and George Simoglou and Sophia G. Petridou and Lefteris Mamatas}, title = {A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks}, journal = {Future Gener. Comput. Syst.}, volume = {125}, pages = {698--714}, year = {2021}, url = {https://doi.org/10.1016/j.future.2021.07.013}, doi = {10.1016/J.FUTURE.2021.07.013}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ViolettasSPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/AlzahraniA21, author = {Abdulsalam O. Alzahrani and Mohammed J. F. Alenazi}, title = {Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks}, journal = {Future Internet}, volume = {13}, number = {5}, pages = {111}, year = {2021}, url = {https://doi.org/10.3390/fi13050111}, doi = {10.3390/FI13050111}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/AlzahraniA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ict-express/ThilagamA21, author = {T. Thilagam and R. Aruna}, title = {Intrusion detection for network based cloud computing by custom {RC-NN} and optimization}, journal = {{ICT} Express}, volume = {7}, number = {4}, pages = {512--520}, year = {2021}, url = {https://doi.org/10.1016/j.icte.2021.04.006}, doi = {10.1016/J.ICTE.2021.04.006}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ict-express/ThilagamA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccc/LiuLWYSCQ21, author = {Xue{-}jun Liu and Kai{-}li Li and Wenhui Wang and Yong Yan and Yun Sha and Jianping Chen and Jiaojiao Qin}, title = {Improved {RBF} Network Intrusion Detection Model Based on Edge Computing with Multi-algorithm Fusion}, journal = {Int. J. Comput. Commun. Control}, volume = {16}, number = {4}, year = {2021}, url = {https://doi.org/10.15837/ijccc.2021.4.4232}, doi = {10.15837/IJCCC.2021.4.4232}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijccc/LiuLWYSCQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/DaweriAA21, author = {Muataz Salam Al Daweri and Salwani Abdullah and Khairul Akram Zainol Ariffin}, title = {A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100449}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100449}, doi = {10.1016/J.IJCIP.2021.100449}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/DaweriAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/BelavagiM21, author = {Manjula C. Belavagi and Balachandra Muniyal}, title = {Improved Intrusion Detection System using Quantal Response Equilibrium-based Game Model and Rule-based Classification}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {1}, year = {2021}, url = {https://www.ijcnis.org/index.php/ijcnis/article/view/4875}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/BelavagiM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SahaKRK21, author = {Rahul Saha and Gulshan Kumar and Mritunjay Kumar Rai and Hye{-}Jin Kim}, title = {Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {226--238}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118950}, doi = {10.1504/IJICS.2021.118950}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SahaKRK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/He21, author = {Xiaohong He}, title = {Intrusion detection of hierarchical distribution network system based on machine computation}, journal = {Int. J. Inf. Commun. Technol.}, volume = {18}, number = {4}, pages = {371--385}, year = {2021}, url = {https://doi.org/10.1504/IJICT.2021.115589}, doi = {10.1504/IJICT.2021.115589}, timestamp = {Mon, 12 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/He21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/ChenZPZZ21, author = {Guanlin Chen and Kunlong Zhou and Yubo Peng and Liang Zhou and Yong Zhang}, title = {A novel network intrusion prevention system based on Android platform}, journal = {Int. J. Internet Protoc. Technol.}, volume = {14}, number = {2}, pages = {67--76}, year = {2021}, url = {https://doi.org/10.1504/IJIPT.2021.116254}, doi = {10.1504/IJIPT.2021.116254}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/ChenZPZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmssc/SoniyaV21, author = {S. Sobin Soniya and S. Maria Celestin Vigila}, title = {Feedback deer hunting optimization algorithm for intrusion detection in cloud based deep residual network}, journal = {Int. J. Model. Simul. Sci. Comput.}, volume = {12}, number = {6}, pages = {2150047:1--2150047:23}, year = {2021}, url = {https://doi.org/10.1142/S1793962321500471}, doi = {10.1142/S1793962321500471}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmssc/SoniyaV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ChorasP21, author = {Michal Choras and Marek Pawlicki}, title = {Intrusion detection approach based on optimised artificial neural network}, journal = {Neurocomputing}, volume = {452}, pages = {705--715}, year = {2021}, url = {https://doi.org/10.1016/j.neucom.2020.07.138}, doi = {10.1016/J.NEUCOM.2020.07.138}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/ChorasP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/HeCJ21, author = {Sudao He and Fuyang Chen and Bin Jiang}, title = {Physical intrusion monitoring via local-global network and deep isolation forest based on heterogeneous signals}, journal = {Neurocomputing}, volume = {441}, pages = {25--35}, year = {2021}, url = {https://doi.org/10.1016/j.neucom.2021.01.104}, doi = {10.1016/J.NEUCOM.2021.01.104}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/HeCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpe/TranCJBD21, author = {Ngan Tran and Haihua Chen and Jiang Janet and Jay Bhuyan and Junhua Ding}, title = {Effect of Class Imbalance on the Performance of Machine Learning-based Network Intrusion Detection}, journal = {Int. J. Perform. Eng.}, volume = {17}, number = {9}, pages = {741}, year = {2021}, url = {https://doi.org/10.23940/ijpe.21.09.p1.741755}, doi = {10.23940/IJPE.21.09.P1.741755}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpe/TranCJBD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsssp/ValivetiMD21, author = {Sharada Ramakrishna Valiveti and Anush Manglani and Tadrush Desai}, title = {Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc Networks: {A} Practical Comprehension}, journal = {Int. J. Syst. Softw. Secur. Prot.}, volume = {12}, number = {2}, pages = {11--32}, year = {2021}, url = {https://doi.org/10.4018/ijsssp.2021070102}, doi = {10.4018/IJSSSP.2021070102}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsssp/ValivetiMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwin/WuLWWX21, author = {Fei Wu and Ting Li and Zhen Wu and ShuLin Wu and ChuanQi Xiao}, title = {Research on Network Intrusion Detection Technology Based on Machine Learning}, journal = {Int. J. Wirel. Inf. Networks}, volume = {28}, number = {3}, pages = {262--275}, year = {2021}, url = {https://doi.org/10.1007/s10776-021-00520-z}, doi = {10.1007/S10776-021-00520-Z}, timestamp = {Sat, 04 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwin/WuLWWX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/DinaM21, author = {Ayesha S. Dina and D. Manivannan}, title = {Intrusion detection based on Machine Learning techniques in computer networks}, journal = {Internet Things}, volume = {16}, pages = {100462}, year = {2021}, url = {https://doi.org/10.1016/j.iot.2021.100462}, doi = {10.1016/J.IOT.2021.100462}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iot/DinaM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangSSX21, author = {Bizhu Wang and Yan Sun and Mengying Sun and Xiaodong Xu}, title = {Game-Theoretic Actor-Critic-Based Intrusion Response Scheme {(GTAC-IRS)} for Wireless SDN-Based IoT Networks}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {3}, pages = {1830--1845}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3015042}, doi = {10.1109/JIOT.2020.3015042}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WangSSX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/AndresiniAM21, author = {Giuseppina Andresini and Annalisa Appice and Donato Malerba}, title = {Autoencoder-based deep metric learning for network intrusion detection}, journal = {Inf. Sci.}, volume = {569}, pages = {706--727}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2021.05.016}, doi = {10.1016/J.INS.2021.05.016}, timestamp = {Mon, 14 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/AndresiniAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/KanFFCXYL21, author = {Xiu Kan and Yixuan Fan and Zhijun Fang and Le Cao and Neal N. Xiong and Dan Yang and Xuan Li}, title = {A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network}, journal = {Inf. Sci.}, volume = {568}, pages = {147--162}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2021.03.060}, doi = {10.1016/J.INS.2021.03.060}, timestamp = {Mon, 14 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/KanFFCXYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/DasariECS21, author = {Durga Bhavani Dasari and Gayathri Edamadaka and Ch. Smitha Chowdary and M. Sobhana}, title = {Anomaly-based network intrusion detection with ensemble classifiers and meta-heuristic scale {(ECMHS)} in traffic flow streams}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {12}, number = {10}, pages = {9241--9268}, year = {2021}, url = {https://doi.org/10.1007/s12652-020-02628-1}, doi = {10.1007/S12652-020-02628-1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/DasariECS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/GuptaA21, author = {Akshay Rameshbhai Gupta and Jitendra Agrawal}, title = {The multi-demeanor fusion based robust intrusion detection system for anomaly and misuse detection in computer networks}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {12}, number = {1}, pages = {303--319}, year = {2021}, url = {https://doi.org/10.1007/s12652-020-01974-4}, doi = {10.1007/S12652-020-01974-4}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/GuptaA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/KumarGT21, author = {Prabhat Kumar and Govind P. Gupta and Rakesh Tripathi}, title = {A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {12}, number = {10}, pages = {9555--9572}, year = {2021}, url = {https://doi.org/10.1007/s12652-020-02696-3}, doi = {10.1007/S12652-020-02696-3}, timestamp = {Mon, 17 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/KumarGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/AltahaLAH21, author = {Mustafa Altaha and Jae{-}Myeong Lee and Muhammad Aslam and Sugwon Hong}, title = {An Autoencoder-Based Network Intrusion Detection System for the {SCADA} System}, journal = {J. Commun.}, volume = {16}, number = {6}, pages = {210--216}, year = {2021}, url = {https://doi.org/10.12720/jcm.16.6.210-216}, doi = {10.12720/JCM.16.6.210-216}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/AltahaLAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/0009ZR21, author = {Qian Wang and Wenfang Zhao and Jiadong Ren}, title = {Intrusion detection algorithm based on image enhanced convolutional neural network}, journal = {J. Intell. Fuzzy Syst.}, volume = {41}, number = {1}, pages = {2183--2194}, year = {2021}, url = {https://doi.org/10.3233/JIFS-210863}, doi = {10.3233/JIFS-210863}, timestamp = {Fri, 10 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/0009ZR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrie/KeserwaniGPG21, author = {Pankaj Kumar Keserwani and Mahesh Chandra Govil and Emmanuel S. Pilli and Prajjval Govil}, title = {A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using {GWO-PSO-RF} model}, journal = {J. Reliab. Intell. Environ.}, volume = {7}, number = {1}, pages = {3--21}, year = {2021}, url = {https://doi.org/10.1007/s40860-020-00126-x}, doi = {10.1007/S40860-020-00126-X}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrie/KeserwaniGPG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/HanWZCYLSY21, author = {Dongqi Han and Zhiliang Wang and Ying Zhong and Wenqi Chen and Jiahai Yang and Shuqiang Lu and Xingang Shi and Xia Yin}, title = {Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {39}, number = {8}, pages = {2632--2647}, year = {2021}, url = {https://doi.org/10.1109/JSAC.2021.3087242}, doi = {10.1109/JSAC.2021.3087242}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/HanWZCYLSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jwe/WangJL21, author = {Yue Wang and Yiming Jiang and Julong Lan}, title = {Intrusion Detection Using Few-shot Learning Based on Triplet Graph Convolutional Network}, journal = {J. Web Eng.}, volume = {20}, number = {5}, year = {2021}, url = {https://doi.org/10.13052/jwe1540-9589.2059}, doi = {10.13052/JWE1540-9589.2059}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jwe/WangJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/AndresiniAM21, author = {Giuseppina Andresini and Annalisa Appice and Donato Malerba}, title = {Nearest cluster-based intrusion detection through convolutional neural networks}, journal = {Knowl. Based Syst.}, volume = {216}, pages = {106798}, year = {2021}, url = {https://doi.org/10.1016/j.knosys.2021.106798}, doi = {10.1016/J.KNOSYS.2021.106798}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/AndresiniAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/MartinCAS21, author = {Manuel L{\'{o}}pez Mart{\'{\i}}n and Bel{\'{e}}n Carro and Juan Ignacio Arribas and Antonio S{\'{a}}nchez{-}Esguevillas}, title = {Network intrusion detection with a novel hierarchy of distances between embeddings of hash {IP} addresses}, journal = {Knowl. Based Syst.}, volume = {219}, pages = {106887}, year = {2021}, url = {https://doi.org/10.1016/j.knosys.2021.106887}, doi = {10.1016/J.KNOSYS.2021.106887}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/MartinCAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/ShiXWK21, author = {Dongxian Shi and Ming Xu and Ting Wu and Liang Kou}, title = {Intrusion Detecting System Based on Temporal Convolutional Network for In-Vehicle {CAN} Networks}, journal = {Mob. Inf. Syst.}, volume = {2021}, pages = {1440259:1--1440259:13}, year = {2021}, url = {https://doi.org/10.1155/2021/1440259}, doi = {10.1155/2021/1440259}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/ShiXWK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mlc/HuTLDG21, author = {Ning Hu and Zhihong Tian and Hui Lu and Xiaojiang Du and Mohsen Guizani}, title = {A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks}, journal = {Int. J. Mach. Learn. Cybern.}, volume = {12}, number = {11}, pages = {3129--3144}, year = {2021}, url = {https://doi.org/10.1007/s13042-020-01253-w}, doi = {10.1007/S13042-020-01253-W}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mlc/HuTLDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/HsuAHPL21, author = {Chia{-}Ming Hsu and Muhammad Zulfan Azhari and He{-}Yen Hsieh and Setya Widyawan Prakosa and Jenq{-}Shiou Leu}, title = {Robust Network Intrusion Detection Scheme Using Long-Short Term Memory Based Convolutional Neural Networks}, journal = {Mob. Networks Appl.}, volume = {26}, number = {3}, pages = {1137--1144}, year = {2021}, url = {https://doi.org/10.1007/s11036-020-01623-2}, doi = {10.1007/S11036-020-01623-2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/HsuAHPL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KalaC21, author = {T. Sree Kala and A. Christy}, title = {{HFFPNN} classifier: a hybrid approach for intrusion detection based {OPSO} and hybridization of feed forward neural network {(FFNN)} and probabilistic neural network {(PNN)}}, journal = {Multim. Tools Appl.}, volume = {80}, number = {4}, pages = {6457--6478}, year = {2021}, url = {https://doi.org/10.1007/s11042-020-09804-7}, doi = {10.1007/S11042-020-09804-7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/KalaC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/ShamsRU21, author = {Erfan A. Shams and Ahmet Rizaner and Ali Hakan Ulusoy}, title = {A novel context-aware feature extraction method for convolutional neural network-based intrusion detection systems}, journal = {Neural Comput. Appl.}, volume = {33}, number = {20}, pages = {13647--13665}, year = {2021}, url = {https://doi.org/10.1007/s00521-021-05994-9}, doi = {10.1007/S00521-021-05994-9}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nca/ShamsRU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/TaoHL21, author = {Jing Tao and Ting Han and Ruidong Li}, title = {Deep-Reinforcement-Learning-Based Intrusion Detection in Aerial Computing Networks}, journal = {{IEEE} Netw.}, volume = {35}, number = {4}, pages = {66--72}, year = {2021}, url = {https://doi.org/10.1109/MNET.011.2100068}, doi = {10.1109/MNET.011.2100068}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/TaoHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/Aljumah21, author = {Abdullah Aljumah}, title = {IoT-based intrusion detection system using convolution neural networks}, journal = {PeerJ Comput. Sci.}, volume = {7}, pages = {e721}, year = {2021}, url = {https://doi.org/10.7717/peerj-cs.721}, doi = {10.7717/PEERJ-CS.721}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/peerj-cs/Aljumah21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/HalderCD21, author = {Subir Halder and Mauro Conti and Sajal K. Das}, title = {A holistic approach to power efficiency in a clock offset based Intrusion Detection Systems for Controller Area Networks}, journal = {Pervasive Mob. Comput.}, volume = {73}, pages = {101385}, year = {2021}, url = {https://doi.org/10.1016/j.pmcj.2021.101385}, doi = {10.1016/J.PMCJ.2021.101385}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/HalderCD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/DevanK21, author = {Preethi Devan and Neelu Khare}, title = {Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions}, journal = {Peer-to-Peer Netw. Appl.}, volume = {14}, number = {4}, pages = {2419--2429}, year = {2021}, url = {https://doi.org/10.1007/s12083-020-00986-3}, doi = {10.1007/S12083-020-00986-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/DevanK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuLZWLY21, author = {Xiaodong Liu and Tong Li and Runzi Zhang and Di Wu and Yongheng Liu and Zhen Yang}, title = {A {GAN} and Feature Selection-Based Oversampling Technique for Intrusion Detection}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {9947059:1--9947059:15}, year = {2021}, url = {https://doi.org/10.1155/2021/9947059}, doi = {10.1155/2021/9947059}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LiuLZWLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ManS21, author = {Jiarui Man and Guozi Sun}, title = {A Residual Learning-Based Network Intrusion Detection System}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5593435:1--5593435:9}, year = {2021}, url = {https://doi.org/10.1155/2021/5593435}, doi = {10.1155/2021/5593435}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ManS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ManZYYLW21, author = {Dapeng Man and Fanyi Zeng and Wu Yang and Miao Yu and Jiguang Lv and Yijing Wang}, title = {Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {9361348:1--9361348:11}, year = {2021}, url = {https://doi.org/10.1155/2021/9361348}, doi = {10.1155/2021/9361348}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ManZYYLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangJL21, author = {Yue Wang and Yiming Jiang and Julong Lan}, title = {{FCNN:} An Efficient Intrusion Detection Method Based on Raw Network Traffic}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5533269:1--5533269:13}, year = {2021}, url = {https://doi.org/10.1155/2021/5533269}, doi = {10.1155/2021/5533269}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangCMRCLY21, author = {Chongzhen Zhang and Yanli Chen and Yang Meng and Fangming Ruan and Runze Chen and Yidan Li and Yaru Yang}, title = {A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6610675:1--6610675:15}, year = {2021}, url = {https://doi.org/10.1155/2021/6610675}, doi = {10.1155/2021/6610675}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangCMRCLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoXZN21, author = {Fei Zhao and Yang Xin and Kai Zhang and Xinxin Niu}, title = {Representativeness-Based Instance Selection for Intrusion Detection}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6638134:1--6638134:13}, year = {2021}, url = {https://doi.org/10.1155/2021/6638134}, doi = {10.1155/2021/6638134}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZhaoXZN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/EssopRPZMR21, author = {Ismael Essop and Jos{\'{e}} Carlos Ribeiro and Maria Papaioannou and Georgios Zachos and Georgios Mantas and Jonathan Rodriguez}, title = {Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks}, journal = {Sensors}, volume = {21}, number = {4}, pages = {1528}, year = {2021}, url = {https://doi.org/10.3390/s21041528}, doi = {10.3390/S21041528}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/EssopRPZMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/MehediARA21, author = {Sk. Tanzir Mehedi and Adnan Anwar and Ziaur Rahman and Kawsar Ahmed}, title = {Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks}, journal = {Sensors}, volume = {21}, number = {14}, pages = {4736}, year = {2021}, url = {https://doi.org/10.3390/s21144736}, doi = {10.3390/S21144736}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/MehediARA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/QaddouraAFA21, author = {Raneem Qaddoura and Ala' M. Al{-}Zoubi and Hossam Faris and Iman M. Almomani}, title = {A Multi-Layer Classification Approach for Intrusion Detection in IoT Networks Based on Deep Learning}, journal = {Sensors}, volume = {21}, number = {9}, pages = {2987}, year = {2021}, url = {https://doi.org/10.3390/s21092987}, doi = {10.3390/S21092987}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/QaddouraAFA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MlikiKC21, author = {Hela Mliki and Abir Hadj Kaceam and Lamia Chaari}, title = {A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {29}, pages = {e3}, year = {2021}, url = {https://doi.org/10.4108/eai.6-10-2021.171246}, doi = {10.4108/EAI.6-10-2021.171246}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MlikiKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sis/YinLLKJ21, author = {Shoulin Yin and Hang Li and Asif Ali Laghari and Shahid Karim and Awais Khan Jumani}, title = {A Bagging Strategy-Based Kernel Extreme Learning Machine for Complex Network Intrusion Detection}, journal = {{EAI} Endorsed Trans. Scalable Inf. Syst.}, volume = {8}, number = {33}, pages = {e8}, year = {2021}, url = {https://doi.org/10.4108/eai.6-10-2021.171247}, doi = {10.4108/EAI.6-10-2021.171247}, timestamp = {Wed, 18 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sis/YinLLKJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/ChoudharyDK21, author = {Sarika Choudhary and Apurba Dey and Nishtha Kesswani}, title = {{CRIDS:} Correlation and Regression-Based Network Intrusion Detection System for IoT}, journal = {{SN} Comput. Sci.}, volume = {2}, number = {3}, pages = {168}, year = {2021}, url = {https://doi.org/10.1007/s42979-021-00555-2}, doi = {10.1007/S42979-021-00555-2}, timestamp = {Wed, 21 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/ChoudharyDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/KoryshevHS21, author = {Nikolay Koryshev and Ilya A. Hodashinsky and Alexander A. Shelupanov}, title = {Building a Fuzzy Classifier Based on Whale Optimization Algorithm to Detect Network Intrusions}, journal = {Symmetry}, volume = {13}, number = {7}, pages = {1211}, year = {2021}, url = {https://doi.org/10.3390/sym13071211}, doi = {10.3390/SYM13071211}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/KoryshevHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/LyuHZJW21, author = {Renjian Lyu and Mingshu He and Yu Zhang and Lei Jin and Xinlei Wang}, title = {Network Intrusion Detection Based on an Efficient Neural Architecture Search}, journal = {Symmetry}, volume = {13}, number = {8}, pages = {1453}, year = {2021}, url = {https://doi.org/10.3390/sym13081453}, doi = {10.3390/SYM13081453}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/LyuHZJW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/XieYYLLA21, author = {Guoqi Xie and Laurence T. Yang and Yuanda Yang and Haibo Luo and Renfa Li and Mamoun Alazab}, title = {Threat Analysis for Automotive {CAN} Networks: {A} {GAN} Model-Based Intrusion Detection Technique}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {7}, pages = {4467--4477}, year = {2021}, url = {https://doi.org/10.1109/TITS.2021.3055351}, doi = {10.1109/TITS.2021.3055351}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/XieYYLLA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/JavedRKAG21, author = {Abdul Rehman Javed and Saif ur Rehman and Mohib Ullah Khan and Mamoun Alazab and Thippa Reddy Gadekallu}, title = {CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using {CNN} and Attention-Based {GRU}}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {8}, number = {2}, pages = {1456--1466}, year = {2021}, url = {https://doi.org/10.1109/TNSE.2021.3059881}, doi = {10.1109/TNSE.2021.3059881}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/JavedRKAG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/PontesSGBM21, author = {Camila F. T. Pontes and Manuela M. C. de Souza and Jo{\~{a}}o J. C. Gondim and Matt Bishop and Marcelo Antonio Marotta}, title = {A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {18}, number = {2}, pages = {1125--1136}, year = {2021}, url = {https://doi.org/10.1109/TNSM.2021.3075503}, doi = {10.1109/TNSM.2021.3075503}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/PontesSGBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ZhangCCZC21, author = {Zhixia Zhang and Yang Cao and Zhihua Cui and Wensheng Zhang and Jinjun Chen}, title = {A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {6}, pages = {5234--5243}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3057074}, doi = {10.1109/TVT.2021.3057074}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/ZhangCCZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/HanCM21, author = {Mu Han and Pengzhou Cheng and Shidian Ma}, title = {PPM-InVIDS: Privacy protection model for in-vehicle intrusion detection system based complex-valued neural network}, journal = {Veh. Commun.}, volume = {31}, pages = {100374}, year = {2021}, url = {https://doi.org/10.1016/j.vehcom.2021.100374}, doi = {10.1016/J.VEHCOM.2021.100374}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/HanCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/JeongJCK21, author = {Seonghoon Jeong and Boosun Jeon and Boheung Chung and Huy Kang Kim}, title = {Convolutional neural network-based intrusion detection system for {AVTP} streams in automotive Ethernet-based networks}, journal = {Veh. Commun.}, volume = {29}, pages = {100338}, year = {2021}, url = {https://doi.org/10.1016/j.vehcom.2021.100338}, doi = {10.1016/J.VEHCOM.2021.100338}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vcomm/JeongJCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/AwotundeCA21, author = {Joseph Bamidele Awotunde and Chinmay Chakraborty and Emmanuel Abidemi Adeniyi}, title = {Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {7154587:1--7154587:17}, year = {2021}, url = {https://doi.org/10.1155/2021/7154587}, doi = {10.1155/2021/7154587}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/AwotundeCA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/DengY21, author = {Hongli Deng and Tao Yang}, title = {Network Intrusion Detection Based on Sparse Autoencoder and {IGA-BP} Network}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {9510858:1--9510858:11}, year = {2021}, url = {https://doi.org/10.1155/2021/9510858}, doi = {10.1155/2021/9510858}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/DengY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/EinyON21, author = {Sajad Einy and Cemil {\"{O}}z and Yahya Dorostkar Navaei}, title = {Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm-Based Feature Selection and Fast-Learning Network}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {6648351:1--6648351:12}, year = {2021}, url = {https://doi.org/10.1155/2021/6648351}, doi = {10.1155/2021/6648351}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/EinyON21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/Huang21, author = {Xiaolong Huang}, title = {Network Intrusion Detection Based on an Improved Long-Short-Term Memory Model in Combination with Multiple Spatiotemporal Structures}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {6623554:1--6623554:10}, year = {2021}, url = {https://doi.org/10.1155/2021/6623554}, doi = {10.1155/2021/6623554}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/Huang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/QiZJLZX21, author = {Guohong Qi and Jie Zhou and Wenxian Jia and Menghan Liu and Shengnan Zhang and Mengying Xu}, title = {Intrusion Detection for Network Based on Elite Clone Artificial Bee Colony and Back Propagation Neural Network}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {9956371:1--9956371:11}, year = {2021}, url = {https://doi.org/10.1155/2021/9956371}, doi = {10.1155/2021/9956371}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/QiZJLZX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/XieDW21, author = {Bin Xie and Xinyu Dong and Changguang Wang}, title = {An Improved {K} -Means Clustering Intrusion Detection Algorithm for Wireless Networks Based on Federated Learning}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {9322368:1--9322368:15}, year = {2021}, url = {https://doi.org/10.1155/2021/9322368}, doi = {10.1155/2021/9322368}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/XieDW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/MaheswariK21, author = {M. Maheswari and R. A. Karthika}, title = {A Novel QoS Based Secure Unequal Clustering Protocol with Intrusion Detection System in Wireless Sensor Networks}, journal = {Wirel. Pers. Commun.}, volume = {118}, number = {2}, pages = {1535--1557}, year = {2021}, url = {https://doi.org/10.1007/s11277-021-08101-2}, doi = {10.1007/S11277-021-08101-2}, timestamp = {Wed, 05 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/MaheswariK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acit3/NtiNAA21, author = {Isaac Kofi Nti and Owusu Nyarko{-}Boateng and Adebayo Felix Adekoya and R. Arjun}, title = {Network Intrusion Detection with StackNet: {A} phi coefficient Based Weak Learner Selection Approach}, booktitle = {22nd International Arab Conference on Information Technology, {ACIT} 2021, Muscat, Oman, December 21-23, 2021}, pages = {1--11}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ACIT53391.2021.9677338}, doi = {10.1109/ACIT53391.2021.9677338}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acit3/NtiNAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/YangXWZYQ21, author = {Yihong Yang and Xiaolong Xu and Lina Wang and Weiyi Zhong and Chao Yan and Lianyong Qi}, title = {Fast Anomaly Detection based on Data Stream in Network Intrusion Detection System}, booktitle = {{ACM} {TURC} 2021: {ACM} Turing Award Celebration Conference - Hefei, China, 30 July 2021 - 1 August 2021}, pages = {87--91}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3472634.3472656}, doi = {10.1145/3472634.3472656}, timestamp = {Mon, 11 Oct 2021 17:13:06 +0200}, biburl = {https://dblp.org/rec/conf/acmturc/YangXWZYQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/JeuneGM21, author = {Laurens Le Jeune and Toon Goedem{\'{e}} and Nele Mentens}, editor = {Jianying Zhou and Chuadhry Mujeeb Ahmed and Lejla Batina and Sudipta Chattopadhyay and Olga Gadyatskaya and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Bo Luo and Suryadipta Majumdar and Mihalis Maniatakos and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Masaki Shimaoka and Chunhua Su and Cong Wang}, title = {Towards Real-Time Deep Learning-Based Network Intrusion Detection on {FPGA}}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12809}, pages = {133--150}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81645-2\_9}, doi = {10.1007/978-3-030-81645-2\_9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/JeuneGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africon/AlimiOARA21, author = {Oyeniyi Akeem Alimi and Khmaies Ouahada and Adnan M. Abu{-}Mahfouz and Suvendi Rimer and Kuburat Oyeranti Adefemi Alimi}, title = {Intrusion Detection for Water Distribution Systems based on an Hybrid Particle Swarm Optimization with Back Propagation Neural Network}, booktitle = {2021 {IEEE} AFRICON, Arusha, Tanzania, United Republic of, September 13-15, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AFRICON51333.2021.9570951}, doi = {10.1109/AFRICON51333.2021.9570951}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africon/AlimiOARA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiml2/AmalapuramRCT21, author = {Suresh Kumar Amalapuram and Thushara Tippi Reddy and Sumohana S. Channappayya and Bheemarjuna Reddy Tamma}, title = {On Handling Class Imbalance in Continual Learning based Network Intrusion Detection Systems}, booktitle = {AIMLSystems 2021: The First International Conference on AI-ML-Systems, Bangalore India, October 21 - 23, 2021}, pages = {11:1--11:7}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3486001.3486231}, doi = {10.1145/3486001.3486231}, timestamp = {Wed, 10 Nov 2021 16:16:02 +0100}, biburl = {https://dblp.org/rec/conf/aiml2/AmalapuramRCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/PatelJ21, author = {Himanshu B. Patel and Devesh C. Jinwala}, editor = {Elhadi M. Shakshuki and Ansar{-}Ul{-}Haque Yasar}, title = {6MID: Mircochain based Intrusion Detection for 6LoWPAN based IoT networks}, booktitle = {The 12th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2021) / The 4th International Conference on Emerging Data and Industry 4.0 {(EDI40} 2021) / Affiliated Workshops, March 23-26, 2021, Warsaw, Poland}, series = {Procedia Computer Science}, volume = {184}, pages = {929--934}, publisher = {Elsevier}, year = {2021}, url = {https://doi.org/10.1016/j.procs.2021.04.023}, doi = {10.1016/J.PROCS.2021.04.023}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ant/PatelJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arabwic/ArchanaPKNSH21, author = {Archana and Chaitra H. P and Khushi and Pradhiksha Nandini and Sivaraman Eswaran and Prasad B. Honnavalli}, editor = {Manar Abu Talib and Laila Benhlima and Kaoutar El Maghraoui}, title = {Cloud-based Network Intrusion Detection System using Deep Learning}, booktitle = {ArabWIC 2021: The 7th Annual International Conference on Arab Women in Computing in Conjunction with the 2nd Forum of Women in Research, Sharjah, United Arab Emirates, August 25 - 26, 2021}, pages = {5:1--5:6}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485557.3485562}, doi = {10.1145/3485557.3485562}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arabwic/ArchanaPKNSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/MasumSHFVKRAC021, author = {Mohammad Masum and Hossain Shahriar and Hisham Haddad and Md. Jobair Hossain Faruk and Maria Valero and Md Abdullah Khan and Mohammad Ashiqur Rahman and Muhaiminul I. Adnan and Alfredo Cuzzocrea and Fan Wu}, editor = {Yixin Chen and Heiko Ludwig and Yicheng Tu and Usama M. Fayyad and Xingquan Zhu and Xiaohua Hu and Suren Byna and Xiong Liu and Jianping Zhang and Shirui Pan and Vagelis Papalexakis and Jianwu Wang and Alfredo Cuzzocrea and Carlos Ordonez}, title = {Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection}, booktitle = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando, FL, USA, December 15-18, 2021}, pages = {5413--5419}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigData52589.2021.9671576}, doi = {10.1109/BIGDATA52589.2021.9671576}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/MasumSHFVKRAC021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmsb/LuMLLGY21, author = {Jizhao Lu and Huiping Meng and Wencui Li and Yue Liu and Yihao Guo and Yang Yang}, title = {Network intrusion detection based on Contractive Sparse Stacked Denoising Autoencoder}, booktitle = {{IEEE} International Symposium on Broadband Multimedia Systems and Broadcasting, {BMSB} 2021, Chengdu, China, August 4-6, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BMSB53066.2021.9547087}, doi = {10.1109/BMSB53066.2021.9547087}, timestamp = {Tue, 05 Oct 2021 16:26:41 +0200}, biburl = {https://dblp.org/rec/conf/bmsb/LuMLLGY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/SasaSK21, author = {Seiichi Sasa and Hiroyuki Suzuki and Akio Koyama}, editor = {Leonard Barolli}, title = {A Machine Learning Based Network Intrusion Detection System with Applying Different Algorithm in Multiple Stages}, booktitle = {Advances on Broad-Band Wireless Computing, Communication and Applications - Proceedings of the 16th International Conference on Broad-Band Wireless Computing, Communication and Applications, {BWCCA} 2021, Fukuoka, Japan, 28-30 October 2021}, series = {Lecture Notes in Networks and Systems}, volume = {346}, pages = {100--110}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90072-4\_10}, doi = {10.1007/978-3-030-90072-4\_10}, timestamp = {Wed, 27 Oct 2021 09:51:39 +0200}, biburl = {https://dblp.org/rec/conf/bwcca/SasaSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbd/ZhangW21, author = {ZheYing Zhang and Lijuan Wang}, title = {An Efficient Intrusion Detection Model Based on Convolutional Neural Network and Transformer}, booktitle = {Ninth International Conference on Advanced Cloud and Big Data, {CBD} 2021, Xi'an, China, March 26-27, 2022}, pages = {248--254}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CBD54617.2021.00050}, doi = {10.1109/CBD54617.2021.00050}, timestamp = {Thu, 04 Aug 2022 11:52:19 +0200}, biburl = {https://dblp.org/rec/conf/cbd/ZhangW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccris/NiuHL21, author = {Hongchao Niu and Xiao{-}Bing Hu and Hang Li}, title = {Improved YOLOv5 network-based object detection for anti-intrusion of gantry crane}, booktitle = {{CCRIS} 2021: 2nd International Conference on Control, Robotics and Intelligent System, Qingdao, China, August 20-22, 2021}, pages = {147--152}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3483845.3483871}, doi = {10.1145/3483845.3483871}, timestamp = {Thu, 11 Nov 2021 12:24:20 +0100}, biburl = {https://dblp.org/rec/conf/ccris/NiuHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0002ZMZHQKPL21, author = {Zhongjie Wang and Shitong Zhu and Keyu Man and Pengxiong Zhu and Yu Hao and Zhiyun Qian and Srikanth V. Krishnamurthy and Tom La Porta and Michael J. De Lucia}, editor = {Trent Jaeger and Zhiyun Qian}, title = {Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison}, booktitle = {MTD@CCS 2021: Proceedings of the 8th {ACM} Workshop on Moving Target Defense, Virtual Event, Republic of Korea, 15 November 2021}, pages = {31--32}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474370.3485669}, doi = {10.1145/3474370.3485669}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0002ZMZHQKPL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0002ZMZHQKPL21a, author = {Zhongjie Wang and Shitong Zhu and Keyu Man and Pengxiong Zhu and Yu Hao and Zhiyun Qian and Srikanth V. Krishnamurthy and Tom La Porta and Michael J. De Lucia}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {3384--3399}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484762}, doi = {10.1145/3460120.3484762}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0002ZMZHQKPL21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comad/MishraDKH21, author = {Sanket Mishra and Rohit Dwivedula and Varad Kshirsagar and Chittaranjan Hota}, editor = {Jayant R. Haritsa and Shourya Roy and Manish Gupta and Sharad Mehrotra and Balaji Vasan Srinivasan and Yogesh Simmhan}, title = {Robust Detection of Network Intrusion using Tree-based Convolutional Neural Networks}, booktitle = {{CODS-COMAD} 2021: 8th {ACM} {IKDD} {CODS} and 26th COMAD, Virtual Event, Bangalore, India, January 2-4, 2021}, pages = {233--237}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3430984.3431036}, doi = {10.1145/3430984.3431036}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/comad/MishraDKH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/ChenLLJY21, author = {Shuyu Chen and Wei Li and Jun Liu and Haoyu Jin and Xuehui Yin}, title = {Network Intrusion Detection Based on Subspace Clustering and {BP} Neural Network}, booktitle = {8th {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2021/7th {IEEE} International Conference on Edge Computing and Scalable Cloud, EdgeCom 2021, Washington, DC, USA, June 26-28, 2021}, pages = {65--70}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSCloud-EdgeCom52276.2021.00022}, doi = {10.1109/CSCLOUD-EDGECOM52276.2021.00022}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscloud/ChenLLJY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csnet/Baldini21, author = {Gianmarco Baldini}, title = {Intrusion detection systems in in-vehicle networks based on bag-of-words}, booktitle = {5th Cyber Security in Networking Conference, CSNet 2021, Abu Dhabi, United Arab Emirates, October 12-14, 2021}, pages = {41--48}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSNet52717.2021.9614644}, doi = {10.1109/CSNET52717.2021.9614644}, timestamp = {Fri, 03 Dec 2021 17:36:15 +0100}, biburl = {https://dblp.org/rec/conf/csnet/Baldini21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/HannanGS21, author = {Abdul Hannan and Christian Gruhl and Bernhard Sick}, title = {Anomaly based Resilient Network Intrusion Detection using Inferential Autoencoders}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2021, Rhodes, Greece, July 26-28, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSR51186.2021.9527980}, doi = {10.1109/CSR51186.2021.9527980}, timestamp = {Thu, 23 Sep 2021 14:18:07 +0200}, biburl = {https://dblp.org/rec/conf/csr2/HannanGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/RehmanI21, author = {Faqeer ur Rehman and Clemente Izurieta}, title = {Statistical Metamorphic Testing of Neural Network Based Intrusion Detection Systems}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2021, Rhodes, Greece, July 26-28, 2021}, pages = {20--26}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSR51186.2021.9527993}, doi = {10.1109/CSR51186.2021.9527993}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csr2/RehmanI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcai/CarneiroOSMP21, author = {Jos{\'{e}} Carneiro and Nuno Oliveira and Norberto Sousa and Eva Maia and Isabel Pra{\c{c}}a}, editor = {Kenji Matsui and Sigeru Omatu and Tan Yigitcanlar and Sara Rodr{\'{\i}}guez{-}Gonz{\'{a}}lez}, title = {Machine Learning for Network-Based Intrusion Detection Systems: An Analysis of the {CIDDS-001} Dataset}, booktitle = {Distributed Computing and Artificial Intelligence, Volume 1: 18th International Conference, {DCAI} 2021, Salamanca, Spain, 6-8 October 2021}, series = {Lecture Notes in Networks and Systems}, volume = {327}, pages = {148--158}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86261-9\_15}, doi = {10.1007/978-3-030-86261-9\_15}, timestamp = {Tue, 15 Nov 2022 15:22:37 +0100}, biburl = {https://dblp.org/rec/conf/dcai/CarneiroOSMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsit/SongYHH21, author = {Zheng Song and Jianguo Yu and Yue He and Jikai He}, title = {Leaky Training: {A} Robustness Improvement Scheme for Autoencoder Based Network Intrusion Detection System under Online Learning}, booktitle = {{DSIT} 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23 - 25, 2021}, pages = {38--43}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3478905.3478913}, doi = {10.1145/3478905.3478913}, timestamp = {Wed, 29 Sep 2021 10:17:18 +0200}, biburl = {https://dblp.org/rec/conf/dsit/SongYHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsmlai/MeenaDMH21, author = {Gaurav Meena and Babita Dhanwal and Mehul Mahrishi and Kamal Kant Hiran}, editor = {Dharm Singh Jat and Colin Stanley and Jos{\'{e}} G. Quenum and Nilanjan Dey and Arpit Jain}, title = {Performance Comparison of Network Intrusion Detection System Based on Different Pre-processing Methods and Deep Neural Network}, booktitle = {{DSMLAI} '21: International Conference on Data Science, Machine Learning and Artificial Intelligence, Windhoek Namibia, August 9 - 12, 2021}, pages = {110--115}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3484824.3484878}, doi = {10.1145/3484824.3484878}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsmlai/MeenaDMH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ZhangNHZG21, author = {Yong Zhang and Jie Niu and Guojian He and Lin Zhu and Da Guo}, title = {Network Intrusion Detection Based on Active Semi-supervised Learning}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops, {DSN} Workshops 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {129--135}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN-W52860.2021.00031}, doi = {10.1109/DSN-W52860.2021.00031}, timestamp = {Sun, 05 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/ZhangNHZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/MuHLPL21, author = {Jieru Mu and Hua He and Lin Li and Shanchen Pang and Cong Liu}, editor = {Chunjie Cao and Yuqing Zhang and Yuan Hong and Ding Wang}, title = {A Hybrid Network Intrusion Detection Model Based on {CNN-LSTM} and Attention Mechanism}, booktitle = {Frontiers in Cyber Security - 4th International Conference, {FCS} 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1558}, pages = {214--229}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0523-0\_14}, doi = {10.1007/978-981-19-0523-0\_14}, timestamp = {Tue, 06 Dec 2022 11:39:09 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/MuHLPL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpsr/GrayDSH21, author = {Nicholas Gray and Katharina Dietz and Michael Seufert and Tobias Hossfeld}, title = {High Performance Network Metadata Extraction Using {P4} for ML-based Intrusion Detection Systems}, booktitle = {22nd {IEEE} International Conference on High Performance Switching and Routing, {HPSR} 2021, Paris, France, June 7-10, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/HPSR52026.2021.9481849}, doi = {10.1109/HPSR52026.2021.9481849}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpsr/GrayDSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icarti/ChindoveB21, author = {Hatitye Chindove and Dane Brown}, title = {Adaptive Machine Learning Based Network Intrusion Detection}, booktitle = {icARTi '21: International Conference on Artificial Intelligence and its Applications, Virtual Event, Mauritius, December 9 - 10, 2021}, pages = {15:1--15:6}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3487923.3487938}, doi = {10.1145/3487923.3487938}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icarti/ChindoveB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/OuyangLKS021, author = {Yuankai Ouyang and Beibei Li and Qinglei Kong and Han Song and Tao Li}, title = {{FS-IDS:} {A} Novel Few-Shot Learning Based Intrusion Detection System for {SCADA} Networks}, booktitle = {{ICC} 2021 - {IEEE} International Conference on Communications, Montreal, QC, Canada, June 14-23, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICC42927.2021.9500667}, doi = {10.1109/ICC42927.2021.9500667}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/OuyangLKS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccai/PengYHL21, author = {Kong De Peng and Ye Du and Li Mei Hong and Li Gui Ling}, title = {Industrial Intrusion Detection Technology Based on One-dimensional Multi-scale Residual Network}, booktitle = {{ICCAI} '21: 2021 7th International Conference on Computing and Artificial Intelligence, Tianjin China, April 23 - 26, 2021}, pages = {339--347}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3467707.3467759}, doi = {10.1145/3467707.3467759}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccai/PengYHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/WangPAL21, author = {Jianyu Wang and Jianli Pan and Ismail AlQerm and Yuanni Liu}, title = {Def-IDS: An Ensemble Defense Mechanism Against Adversarial Attacks for Deep Learning-based Network Intrusion Detection}, booktitle = {30th International Conference on Computer Communications and Networks, {ICCCN} 2021, Athens, Greece, July 19-22, 2021}, pages = {1--9}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCCN52240.2021.9522215}, doi = {10.1109/ICCCN52240.2021.9522215}, timestamp = {Wed, 22 Sep 2021 16:08:30 +0200}, biburl = {https://dblp.org/rec/conf/icccn/WangPAL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/RajuSGR21, author = {Deepanshu Raju and Sakshi Sawai and Shashank Gavel and Ajay Singh Raghuvanshi}, title = {Development of Anomaly-Based Intrusion Detection Scheme Using Deep Learning in Data Network}, booktitle = {12th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2021, Kharagpur, India, July 6-8, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCCNT51525.2021.9579510}, doi = {10.1109/ICCCNT51525.2021.9579510}, timestamp = {Thu, 25 Nov 2021 09:08:41 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/RajuSGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccs/KasongoS21, author = {Sydney Mambwe Kasongo and Yanxia Sun}, title = {A Gated Recurrent Unit based Intrusion Detection for {SCADA} Networks}, booktitle = {6th International Conference on Computing, Communication and Security, {ICCCS} 2021, Las Vegas, NV, USA, October 4-6, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCCS51487.2021.9776331}, doi = {10.1109/ICCCS51487.2021.9776331}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccs/KasongoS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycsee/CaiWZC21, author = {Zengyu Cai and Jingchao Wang and Jianwei Zhang and Xi Chen}, editor = {Jianchao Zeng and Pinle Qin and Weipeng Jing and Xianhua Song and Zeguang Lu}, title = {Design and Implementation of Intrusion Detection System Based on Neural Network}, booktitle = {Data Science - 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, {ICPCSEE} 2021, Taiyuan, China, September 17-20, 2021, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {1452}, pages = {179--189}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-5943-0\_15}, doi = {10.1007/978-981-16-5943-0\_15}, timestamp = {Thu, 15 Feb 2024 16:58:31 +0100}, biburl = {https://dblp.org/rec/conf/icycsee/CaiWZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/MauroGL21, author = {Mario Di Mauro and Giovanni Galatro and Antonio Liotta}, editor = {David Camacho and Domenico Rosaci and Giuseppe M. L. Sarn{\'{e}} and Mario Versaci}, title = {A WNN-Based Approach for Network Intrusion Detection}, booktitle = {Intelligent Distributed Computing XIV, 14th International Symposium on Intelligent Distributed Computing, {IDC} 2021, Virtual Event, 16-18 September 2021}, series = {Studies in Computational Intelligence}, volume = {1026}, pages = {79--88}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-96627-0\_8}, doi = {10.1007/978-3-030-96627-0\_8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idc/MauroGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/AhmedLS21a, author = {Usman Ahmed and Jerry Chun{-}Wei Lin and Gautam Srivastava}, title = {Network-Aware {SDN} Load Balancer with Deep Active Learning based Intrusion Detection Model}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen, China, July 18-22, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IJCNN52387.2021.9534424}, doi = {10.1109/IJCNN52387.2021.9534424}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcnn/AhmedLS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiuKLJ21, author = {Yang Liu and Jian Kang and Yiran Li and Bin Ji}, title = {A Network Intrusion Detection Method Based on {CNN} and {CBAM}}, booktitle = {2021 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484553}, doi = {10.1109/INFOCOMWKSHPS51825.2021.9484553}, timestamp = {Fri, 23 Jul 2021 09:24:13 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiuKLJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ShiGLYL21, author = {Jibo Shi and Bin Ge and Yang Liu and Yu Yan and Shuang Li}, title = {Data Privacy Security Guaranteed Network Intrusion Detection System Based on Federated Learning}, booktitle = {2021 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2021, Vancouver, BC, Canada, May 10-13, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INFOCOMWKSHPS51825.2021.9484545}, doi = {10.1109/INFOCOMWKSHPS51825.2021.9484545}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ShiGLYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/JinCX21, author = {Shiyi Jin and Jin{-}Gyun Chung and Yinan Xu}, title = {Signature-Based Intrusion Detection System {(IDS)} for In-Vehicle {CAN} Bus Network}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2021, Daegu, South Korea, May 22-28, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCAS51556.2021.9401087}, doi = {10.1109/ISCAS51556.2021.9401087}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscas/JinCX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/ZhongGLQYWYYS021, author = {Ying Zhong and Ziqi Gao and Rui Li and Citong Que and Xinjie Yang and Zhiliang Wang and Jiahai Yang and Xia Yin and Xingang Shi and Keqin Li}, title = {{STRAD:} Network Intrusion Detection Algorithm Based on Zero-Positive Learning in Real Complex Network Environment}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2021, Athens, Greece, September 5-8, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCC53001.2021.9631496}, doi = {10.1109/ISCC53001.2021.9631496}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscc/ZhongGLQYWYYS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/Dong0LQF21, author = {Tian Dong and Han Qiu and Jialiang Lu and Meikang Qiu and Chun Fan}, title = {Towards Fast Network Intrusion Detection based on Efficiency-preserving Federated Learning}, booktitle = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30 - Oct. 3, 2021}, pages = {468--475}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00071}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00071}, timestamp = {Thu, 06 Jan 2022 09:48:16 +0100}, biburl = {https://dblp.org/rec/conf/ispa/Dong0LQF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isr2/LiuYLL21, author = {Jingyu Liu and Dongsheng Yang and Mengjia Lian and Mingshi Li}, title = {Research on Classification of Intrusion Detection in Internet of Things Network Layer Based on Machine Learning}, booktitle = {{IEEE} International Conference on Intelligence and Safety for Robotics, {ISR} 2021, Tokoname, Japan, March 4-6, 2021}, pages = {106--110}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISR50024.2021.9419529}, doi = {10.1109/ISR50024.2021.9419529}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isr2/LiuYLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivic/QassimJM21, author = {Qais Saif Qassim and Norziana Jamil and Mohammed Najah Mahdi}, editor = {Halimah Badioze Zaman and Alan F. Smeaton and Timothy K. Shih and Sergio A. Velastin and Tada Terutoshi and Bo N{\o}rregaard J{\o}rgensen and Hazleen Aris and Nazrita Ibrahim}, title = {Symptoms-Based Network Intrusion Detection System}, booktitle = {Advances in Visual Informatics - 7th International Visual Informatics Conference, {IVIC} 2021, Kajang, Malaysia, November 23-25, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13051}, pages = {482--494}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90235-3\_42}, doi = {10.1007/978-3-030-90235-3\_42}, timestamp = {Wed, 22 Mar 2023 16:53:34 +0100}, biburl = {https://dblp.org/rec/conf/ivic/QassimJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/CaoZFMLD21, author = {Ke Cao and Jinqi Zhu and Weiiia Feng and Chunmei Ma and Ming Liu and Tian Du}, title = {Network Intrusion Detection based on Dense Dilated Convolutions and Attention Mechanism}, booktitle = {17th International Wireless Communications and Mobile Computing, {IWCMC} 2021, Harbin City, China, June 28 - July 2, 2021}, pages = {463--468}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IWCMC51323.2021.9498652}, doi = {10.1109/IWCMC51323.2021.9498652}, timestamp = {Fri, 13 Aug 2021 16:13:45 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/CaoZFMLD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/DingWK21, author = {Shanshuo Ding and Yingxin Wang and Liang Kou}, title = {Network intrusion detection based on BiSRU and {CNN}}, booktitle = {{IEEE} 18th International Conference on Mobile Ad Hoc and Smart Systems, {MASS} 2021, Denver, CO, USA, October 4-7, 2021}, pages = {145--147}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/MASS52906.2021.00026}, doi = {10.1109/MASS52906.2021.00026}, timestamp = {Mon, 20 Dec 2021 09:12:57 +0100}, biburl = {https://dblp.org/rec/conf/mass/DingWK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medes/ZhuHY21, author = {Yujie Zhu and Dezhi Han and Xinming Yin}, editor = {Richard Chbeir and Yannis Manolopoulos and Ladjel Bellatreche and Djamal Benslimane and Mirjana Ivanovic and Zakaria Maamar}, title = {A hierarchical network intrusion detection model based on unsupervised clustering}, booktitle = {{MEDES} '21: Proceedings of the 13th International Conference on Management of Digital EcoSystems, Virtual Event, Tunisia, November 1 - 3, 2021}, pages = {22--29}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3444757.3485098}, doi = {10.1145/3444757.3485098}, timestamp = {Thu, 11 Nov 2021 08:15:12 +0100}, biburl = {https://dblp.org/rec/conf/medes/ZhuHY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nana/Lin21, author = {Zhang Lin}, title = {Network Intrusion Detection based of Semi-Supervised Ensemble Learning Algorithm for Imbalanced Data}, booktitle = {2021 International Conference on Networking and Network Applications, NaNA 2021, Lijiang City, China, October 29 - Nov. 1, 2021}, pages = {338--344}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/NaNA53684.2021.00065}, doi = {10.1109/NANA53684.2021.00065}, timestamp = {Thu, 06 Jan 2022 10:47:03 +0100}, biburl = {https://dblp.org/rec/conf/nana/Lin21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/niss/DadiA21, author = {Sihem Dadi and Mohamed Abid}, editor = {Mohamed Ben Ahmed and Horia{-}Nicolai L. Teodorescu and Tomader Mazri and Parthasarathy Subashini and Anouar Abdelhakim Boudhir}, title = {Enhanced Intrusion Detection System Based on AutoEncoder Network and Support Vector Machine}, booktitle = {Networking, Intelligent Systems and Security - Proceedings of {NISS} 2021, Kenitra, Morocco, April 1-2, 2021}, series = {Smart Innovation, Systems and Technologies}, volume = {237}, pages = {327--341}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-3637-0\_23}, doi = {10.1007/978-981-16-3637-0\_23}, timestamp = {Wed, 01 Dec 2021 16:42:24 +0100}, biburl = {https://dblp.org/rec/conf/niss/DadiA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/niss/KamelELT21, author = {Nadiya El Kamel and Mohamed Eddabbah and Youssef Lmoumen and Raja Touahni}, editor = {Mohamed Ben Ahmed and Horia{-}Nicolai L. Teodorescu and Tomader Mazri and Parthasarathy Subashini and Anouar Abdelhakim Boudhir}, title = {A Real-Time Smart Agent for Network Traffic Profiling and Intrusion Detection Based on Combined Machine Learning Algorithms}, booktitle = {Networking, Intelligent Systems and Security - Proceedings of {NISS} 2021, Kenitra, Morocco, April 1-2, 2021}, series = {Smart Innovation, Systems and Technologies}, volume = {237}, pages = {301--309}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-3637-0\_21}, doi = {10.1007/978-981-16-3637-0\_21}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/niss/KamelELT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/VyQDP21, author = {Nguyen Chi Vy and Nguyen Huu Quyen and Phan The Duy and Van{-}Hau Pham}, editor = {Min Yang and Chao Chen and Yang Liu}, title = {Federated Learning-Based Intrusion Detection in the Context of IIoT Networks: Poisoning Attack and Defense}, booktitle = {Network and System Security - 15th International Conference, {NSS} 2021, Tianjin, China, October 23, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13041}, pages = {131--147}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92708-0\_8}, doi = {10.1007/978-3-030-92708-0\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/VyQDP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/ChenYCZYZ21, author = {Jinfu Chen and Shang Yin and Saihua Cai and Chi Zhang and Yemin Yin and Ling Zhou}, title = {An Efficient Network Intrusion Detection Model Based on Temporal Convolutional Networks}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021, Hainan, China, December 6-10, 2021}, pages = {768--775}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS54544.2021.00086}, doi = {10.1109/QRS54544.2021.00086}, timestamp = {Wed, 16 Mar 2022 22:32:21 +0100}, biburl = {https://dblp.org/rec/conf/qrs/ChenYCZYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/AydinB21, author = {Erim Aydin and Serif Bahtiyar}, editor = {Naghmeh Moradpoor and Atilla El{\c{c}}i and Andrei Petrovski}, title = {{OCIDS:} An Online CNN-Based Network Intrusion Detection System for DDoS Attacks with IoT Botnets}, booktitle = {14th International Conference on Security of Information and Networks, {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SIN54109.2021.9699288}, doi = {10.1109/SIN54109.2021.9699288}, timestamp = {Wed, 23 Feb 2022 18:55:51 +0100}, biburl = {https://dblp.org/rec/conf/sin/AydinB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartnets/RehmanI21, author = {Faqeer ur Rehman and Clemente Izurieta}, title = {A Hybridized Approach for Testing Neural Network Based Intrusion Detection Systems}, booktitle = {International Conference on Smart Applications, Communications and Networking, SmartNets 2021, Glasgow, United Kingdom, September 22-24, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SmartNets50376.2021.9555416}, doi = {10.1109/SMARTNETS50376.2021.9555416}, timestamp = {Thu, 14 Oct 2021 16:38:35 +0200}, biburl = {https://dblp.org/rec/conf/smartnets/RehmanI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/YahyaouiLAA21, author = {Aymen Yahyaoui and Haithem Lakhdhar and Takoua Abdellatif and Rabah Attia}, title = {Machine learning based network intrusion detection for data streaming IoT applications}, booktitle = {21st {ACIS} International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} Winter 2021, Ho Chi Minh City, Vietnam, January 28-30, 2021}, pages = {51--56}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SNPDWinter52325.2021.00019}, doi = {10.1109/SNPDWINTER52325.2021.00019}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/snpd/YahyaouiLAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/DuyKHTHHP21, author = {Phan The Duy and Nghi Hoang Khoa and Hoang Hiep and Nguyen Ba Tuan and Hien Do Hoang and Do Thi Thu Hien and Van{-}Hau Pham}, editor = {Hamido Fujita and H{\'{e}}ctor P{\'{e}}rez{-}Meana}, title = {A Deep Transfer Learning Approach for Flow-Based Intrusion Detection in SDN-Enabled Network}, booktitle = {New Trends in Intelligent Software Methodologies, Tools and Techniques - Proceedings of the 20th International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 202, Cancun, Mexico, 21-23 September, 2021}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {337}, pages = {327--339}, publisher = {{IOS} Press}, year = {2021}, url = {https://doi.org/10.3233/FAIA210031}, doi = {10.3233/FAIA210031}, timestamp = {Fri, 24 Sep 2021 11:30:21 +0200}, biburl = {https://dblp.org/rec/conf/somet/DuyKHTHHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/IannucciAAACB21, author = {Stefano Iannucci and Jesse Ables and William Anderson and Bhuvanesh Abburi and Valeria Cardellini and Ioana Banicescu}, title = {A Performance-Oriented Comparison of Neural Network Approaches for Anomaly-based Intrusion Detection}, booktitle = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2021, Orlando, FL, USA, December 5-7, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SSCI50451.2021.9660100}, doi = {10.1109/SSCI50451.2021.9660100}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssci/IannucciAAACB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/taai/HsiehS21, author = {Chia{-}Fen Hsieh and Che{-}Min Su}, title = {{MLNN:} {A} Novel Network Intrusion Detection Based on Multilayer Neural Network}, booktitle = {2021 International Conference on Technologies and Applications of Artificial Intelligence, {TAAI} 2021, Taichung, Taiwan, November 18-20, 2021}, pages = {43--48}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TAAI54685.2021.00017}, doi = {10.1109/TAAI54685.2021.00017}, timestamp = {Wed, 08 Jun 2022 16:30:07 +0200}, biburl = {https://dblp.org/rec/conf/taai/HsiehS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiWWS21, author = {Zeyi Li and Yun Wang and Pan Wang and Haorui Su}, title = {{PGAN:} {A} Generative Adversarial Network based Anomaly Detection Method for Network Intrusion Detection System}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {734--741}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00107}, doi = {10.1109/TRUSTCOM53373.2021.00107}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiWWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/LinWLL21, author = {Jiaying Lin and Yehua Wei and Wenjia Li and Jing Long}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle {CAN} Networks}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {255--267}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_19}, doi = {10.1007/978-981-19-0468-4\_19}, timestamp = {Wed, 25 May 2022 10:56:01 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/LinWLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/AlfardusR21, author = {Asma Alfardus and Danda B. Rawat}, title = {Intrusion Detection System for {CAN} Bus In-Vehicle Network based on Machine Learning Algorithms}, booktitle = {12th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile Communication Conference, {UEMCON} 2021, New York, NY, USA, December 1-4, 2021}, pages = {944--949}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/UEMCON53757.2021.9666745}, doi = {10.1109/UEMCON53757.2021.9666745}, timestamp = {Tue, 18 Jan 2022 17:38:45 +0100}, biburl = {https://dblp.org/rec/conf/uemcom/AlfardusR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/ZhaoLXOG21, author = {Ruijie Zhao and Zhaojie Li and Zhi Xue and Tomoaki Ohtsuki and Guan Gui}, title = {A Novel Approach based on Lightweight Deep Neural Network for Network Intrusion Detection}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2021, Nanjing, China, March 29 - April 1, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WCNC49053.2021.9417568}, doi = {10.1109/WCNC49053.2021.9417568}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/ZhaoLXOG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wf-iot/AzumahEAZL21, author = {Sylvia Worlali Azumah and Nelly Elsayed and Victor Adewopo and Zaghloul Saad Zaghloul and Chengcheng Li}, title = {A Deep {LSTM} based Approach for Intrusion Detection IoT Devices Network in Smart Home}, booktitle = {7th {IEEE} World Forum on Internet of Things, WF-IoT 2021, New Orleans, LA, USA, June 14 - July 31, 2021}, pages = {836--841}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WF-IoT51360.2021.9596033}, doi = {10.1109/WF-IOT51360.2021.9596033}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wf-iot/AzumahEAZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MoggEK21, author = {Raymond Mogg and Simon Yusuf Enoch and Dong Seong Kim}, editor = {Hyoungshick Kim}, title = {A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {51--63}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_5}, doi = {10.1007/978-3-030-89432-0\_5}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MoggEK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-03546, author = {Seonghoon Jeong and Boosun Jeon and Boheung Chung and Huy Kang Kim}, title = {Convolutional Neural Network-based Intrusion Detection System for {AVTP} Streams in Automotive Ethernet-based Networks}, journal = {CoRR}, volume = {abs/2102.03546}, year = {2021}, url = {https://arxiv.org/abs/2102.03546}, eprinttype = {arXiv}, eprint = {2102.03546}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-03546.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-16329, author = {Wai Weng Lo and Siamak Layeghy and Mohanad Sarhan and Marcus Gallagher and Marius Portmann}, title = {E-GraphSAGE: {A} Graph Neural Network based Intrusion Detection System}, journal = {CoRR}, volume = {abs/2103.16329}, year = {2021}, url = {https://arxiv.org/abs/2103.16329}, eprinttype = {arXiv}, eprint = {2103.16329}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-16329.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-16930, author = {Emrah Tufan and Cihangir Tezcan and Cengiz Acart{\"{u}}rk}, title = {Anomaly-Based Intrusion Detection by Machine Learning: {A} Case Study on Probing Attacks to an Institutional Network}, journal = {CoRR}, volume = {abs/2103.16930}, year = {2021}, url = {https://arxiv.org/abs/2103.16930}, eprinttype = {arXiv}, eprint = {2103.16930}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-16930.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-07183, author = {Mohanad Sarhan and Siamak Layeghy and Marius Portmann}, title = {An Explainable Machine Learning-based Network Intrusion Detection System for Enabling Generalisability in Securing IoT Networks}, journal = {CoRR}, volume = {abs/2104.07183}, year = {2021}, url = {https://arxiv.org/abs/2104.07183}, eprinttype = {arXiv}, eprint = {2104.07183}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-07183.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-10015, author = {Muhammad Almas Khan and Muazzam Ali Khan and Shahid Latif and Awais Aziz Shah and Mujeeb Ur Rehman and Wadii Boulila and Maha Driss and Jawad Ahmad}, title = {Voting Classifier-based Intrusion Detection for IoT Networks}, journal = {CoRR}, volume = {abs/2104.10015}, year = {2021}, url = {https://arxiv.org/abs/2104.10015}, eprinttype = {arXiv}, eprint = {2104.10015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-10015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-06765, author = {Stanislav Abaimov}, title = {Towards a Privacy-preserving Deep Learning-based Network Intrusion Detection in Data Distribution Services}, journal = {CoRR}, volume = {abs/2106.06765}, year = {2021}, url = {https://arxiv.org/abs/2106.06765}, eprinttype = {arXiv}, eprint = {2106.06765}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-06765.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-02362, author = {Jyoti Fakirah and Lauhim Mahfuz Zishan and Roshni Mooruth and Michael N. Johnstone and Wencheng Yang}, title = {A Low-Cost Machine Learning Based Network Intrusion Detection System with Data Privacy Preservation}, journal = {CoRR}, volume = {abs/2107.02362}, year = {2021}, url = {https://arxiv.org/abs/2107.02362}, eprinttype = {arXiv}, eprint = {2107.02362}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-02362.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-02753, author = {Jos{\'{e}} Carneiro and Nuno Oliveira and Norberto Sousa and Eva Maia and Isabel Pra{\c{c}}a}, title = {Machine Learning for Network-based Intrusion Detection Systems: an Analysis of the {CIDDS-001} Dataset}, journal = {CoRR}, volume = {abs/2107.02753}, year = {2021}, url = {https://arxiv.org/abs/2107.02753}, eprinttype = {arXiv}, eprint = {2107.02753}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-02753.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-02992, author = {Dai Li and Kaiyuan Yang}, title = {A Dual-Port 8-T CAM-Based Network Intrusion Detection Engine for IoT}, journal = {CoRR}, volume = {abs/2107.02992}, year = {2021}, url = {https://arxiv.org/abs/2107.02992}, eprinttype = {arXiv}, eprint = {2107.02992}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-02992.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-05172, author = {Sk. Tanzir Mehedi and Adnan Anwar and Ziaur Rahman and Kawsar Ahmed}, title = {Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks}, journal = {CoRR}, volume = {abs/2107.05172}, year = {2021}, url = {https://arxiv.org/abs/2107.05172}, eprinttype = {arXiv}, eprint = {2107.05172}, timestamp = {Fri, 06 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-05172.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-08262, author = {Natasha Alkhatib and Hadi Ghauch and Jean{-}Luc Danger}, title = {{SOME/IP} Intrusion Detection using Deep Learning-based Sequential Models in Automotive Ethernet Networks}, journal = {CoRR}, volume = {abs/2108.08262}, year = {2021}, url = {https://arxiv.org/abs/2108.08262}, eprinttype = {arXiv}, eprint = {2108.08262}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-08262.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-12722, author = {Mohanad Sarhan and Siamak Layeghy and Nour Moustafa and Marcus Gallagher and Marius Portmann}, title = {Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks}, journal = {CoRR}, volume = {abs/2108.12722}, year = {2021}, url = {https://arxiv.org/abs/2108.12722}, eprinttype = {arXiv}, eprint = {2108.12722}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-12722.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-11224, author = {Manuela M. C. de Souza and Camila F. T. Pontes and Jo{\~{a}}o J. C. Gondim and Lu{\'{\i}}s Paulo F. Garcia and Luiz A. DaSilva and Marcelo Antonio Marotta}, title = {An Anomaly-based Multi-class Classifier for Network Intrusion Detection}, journal = {CoRR}, volume = {abs/2109.11224}, year = {2021}, url = {https://arxiv.org/abs/2109.11224}, eprinttype = {arXiv}, eprint = {2109.11224}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-11224.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-02791, author = {Mohanad Sarhan and Siamak Layeghy and Nour Moustafa and Marius Portmann}, title = {A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection}, journal = {CoRR}, volume = {abs/2111.02791}, year = {2021}, url = {https://arxiv.org/abs/2111.02791}, eprinttype = {arXiv}, eprint = {2111.02791}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-02791.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-13978, author = {Hooman Alavizadeh and Julian Jang{-}Jaccard and Hootan Alavizadeh}, title = {Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection}, journal = {CoRR}, volume = {abs/2111.13978}, year = {2021}, url = {https://arxiv.org/abs/2111.13978}, eprinttype = {arXiv}, eprint = {2111.13978}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-13978.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuLZL21, title = {Intrusion Detection Method Based on Adaptive Clonal Genetic Algorithm and Backpropagation Neural Network}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {9938586:1--9938586:12}, year = {2021}, note = {Withdrawn.}, url = {https://doi.org/10.1155/2021/9938586}, doi = {10.1155/2021/9938586}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LuLZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangWSWWZL21, title = {Intrusion Detection for Industrial Control Systems Based on Open Set Artificial Neural Network}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {4027900:1--4027900:14}, year = {2021}, note = {Withdrawn.}, url = {https://doi.org/10.1155/2021/4027900}, doi = {10.1155/2021/4027900}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/WangWSWWZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YueWWDY21, title = {Detecting Temporal Attacks: An Intrusion Detection System for Train Communication Ethernet Based on Dynamic Temporal Convolutional Network}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {3913515:1--3913515:21}, year = {2021}, note = {Withdrawn.}, url = {https://doi.org/10.1155/2021/3913515}, doi = {10.1155/2021/3913515}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/YueWWDY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Labonne20, author = {Maxime Labonne}, title = {Anomaly-based network intrusion detection using machine learning. (D{\'{e}}tection d'intrusion r{\'{e}}seau par anomalies avec apprentissage automatique)}, school = {Polytechnic Institute of Paris, France}, year = {2020}, url = {https://tel.archives-ouvertes.fr/tel-02988296}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Labonne20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChenLLFCP20, author = {Zhuo Chen and Na Lv and Pengfei Liu and Yu Fang and Kun Chen and Wu Pan}, title = {Intrusion Detection for Wireless Edge Networks Based on Federated Learning}, journal = {{IEEE} Access}, volume = {8}, pages = {217463--217472}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3041793}, doi = {10.1109/ACCESS.2020.3041793}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ChenLLFCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuWQLY20, author = {Zhiquan Hu and Liejun Wang and Lei Qi and Yongming Li and Wenzhong Yang}, title = {A Novel Wireless Network Intrusion Detection Method Based on Adaptive Synthetic Sampling and an Improved Convolutional Neural Network}, journal = {{IEEE} Access}, volume = {8}, pages = {195741--195751}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3034015}, doi = {10.1109/ACCESS.2020.3034015}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HuWQLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JiangHYZ20, author = {Hui Jiang and Zheng He and Gang Ye and Huyin Zhang}, title = {Network Intrusion Detection Based on PSO-Xgboost Model}, journal = {{IEEE} Access}, volume = {8}, pages = {58392--58401}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2982418}, doi = {10.1109/ACCESS.2020.2982418}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JiangHYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MurvayG20, author = {Pal{-}Stefan Murvay and Bogdan Groza}, title = {{TIDAL-CAN:} Differential Timing Based Intrusion Detection and Localization for Controller Area Network}, journal = {{IEEE} Access}, volume = {8}, pages = {68895--68912}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2985326}, doi = {10.1109/ACCESS.2020.2985326}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MurvayG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PachecoBFS20, author = {Jesus Pacheco and Victor H. Benitez and Luis Carlos F{\'{e}}lix{-}Herr{\'{a}}n and Pratik Satam}, title = {Artificial Neural Networks-Based Intrusion Detection System for Internet of Things Fog Nodes}, journal = {{IEEE} Access}, volume = {8}, pages = {73907--73918}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2988055}, doi = {10.1109/ACCESS.2020.2988055}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/PachecoBFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QuYGSMFRLM20, author = {Xiaofei Qu and Lin Yang and Kai Guo and Meng Sun and Linru Ma and Tao Feng and Shuangyin Ren and Kechao Li and Xin Ma}, title = {Direct Batch Growth Hierarchical Self-Organizing Mapping Based on Statistics for Efficient Network Intrusion Detection}, journal = {{IEEE} Access}, volume = {8}, pages = {42251--42260}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2976810}, doi = {10.1109/ACCESS.2020.2976810}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/QuYGSMFRLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RakasSM20, author = {Slavica V. Bostjancic Rakas and Mirjana D. Stojanovic and Jasna D. Markovic{-}Petrovic}, title = {A Review of Research Work on Network-Based {SCADA} Intrusion Detection Systems}, journal = {{IEEE} Access}, volume = {8}, pages = {93083--93108}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2994961}, doi = {10.1109/ACCESS.2020.2994961}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RakasSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangLYSZL20, author = {Liqun Yang and Jianqiang Li and Liang Yin and Zhonghao Sun and Yufei Zhao and Zhoujun Li}, title = {Real-Time Intrusion Detection in Wireless Network: {A} Deep Learning-Based Intelligent Mechanism}, journal = {{IEEE} Access}, volume = {8}, pages = {170128--170139}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3019973}, doi = {10.1109/ACCESS.2020.3019973}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YangLYSZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangZWYW20, author = {Yanqing Yang and Kangfeng Zheng and Bin Wu and Yixian Yang and Xiujuan Wang}, title = {Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization}, journal = {{IEEE} Access}, volume = {8}, pages = {42169--42184}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2977007}, doi = {10.1109/ACCESS.2020.2977007}, timestamp = {Thu, 27 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YangZWYW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZavrakI20, author = {Sultan Zavrak and Murat Iskefiyeli}, title = {Anomaly-Based Intrusion Detection From Network Flow Features Using Variational Autoencoder}, journal = {{IEEE} Access}, volume = {8}, pages = {108346--108358}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3001350}, doi = {10.1109/ACCESS.2020.3001350}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZavrakI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangWLSHL20, author = {Guoling Zhang and Xiaodan Wang and Rui Li and Yafei Song and Jiaxing He and Jie Lai}, title = {Network Intrusion Detection Based on Conditional Wasserstein Generative Adversarial Network and Cost-Sensitive Stacked Autoencoder}, journal = {{IEEE} Access}, volume = {8}, pages = {190431--190447}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3031892}, doi = {10.1109/ACCESS.2020.3031892}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangWLSHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/accs/GandhimathiM20, author = {L. Gandhimathi and G. Murugaboopathi}, title = {A Novel Hybrid Intrusion Detection Using Flow-Based Anomaly Detection and Cross-Layer Features in Wireless Sensor Network}, journal = {Autom. Control. Comput. Sci.}, volume = {54}, number = {1}, pages = {62--69}, year = {2020}, url = {https://doi.org/10.3103/S0146411620010046}, doi = {10.3103/S0146411620010046}, timestamp = {Fri, 25 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/accs/GandhimathiM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/TianHLLDC20, author = {Qiuting Tian and Dezhi Han and Kuan{-}Ching Li and XingAo Liu and Letian Duan and Arcangelo Castiglione}, title = {An intrusion detection approach based on improved deep belief network}, journal = {Appl. Intell.}, volume = {50}, number = {10}, pages = {3162--3178}, year = {2020}, url = {https://doi.org/10.1007/s10489-020-01694-4}, doi = {10.1007/S10489-020-01694-4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/TianHLLDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccfton/LatahT20, author = {Majd Latah and Levent Toker}, title = {An efficient flow-based multi-level hybrid intrusion detection system for software-defined networks}, journal = {{CCF} Trans. Netw.}, volume = {3}, number = {3-4}, pages = {261--271}, year = {2020}, url = {https://doi.org/10.1007/s42045-020-00040-z}, doi = {10.1007/S42045-020-00040-Z}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccfton/LatahT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AbdulqadderZZAA20, author = {Ihsan H. Abdulqadder and Shijie Zhou and Deqing Zou and Israa T. Aziz and Syed Muhammad Abrar Akber}, title = {Multi-layered intrusion detection and prevention in the {SDN/NFV} enabled cloud of 5G networks using AI-based defense mechanisms}, journal = {Comput. Networks}, volume = {179}, pages = {107364}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2020.107364}, doi = {10.1016/J.COMNET.2020.107364}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AbdulqadderZZAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SouzaWMSV20, author = {Cristiano Antonio de Souza and Carlos Becker Westphall and Renato B. Machado and Jo{\~{a}}o Bosco Mangueira Sobral and Gustavo dos Santos Vieira}, title = {Hybrid approach to intrusion detection in fog-based IoT environments}, journal = {Comput. Networks}, volume = {180}, pages = {107417}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2020.107417}, doi = {10.1016/J.COMNET.2020.107417}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SouzaWMSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhangHWL20, author = {Hongpo Zhang and Lulu Huang and Chase Q. Wu and Zhanbo Li}, title = {An effective convolutional neural network based on {SMOTE} and Gaussian mixture model for intrusion detection in imbalanced dataset}, journal = {Comput. Networks}, volume = {177}, pages = {107315}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2020.107315}, doi = {10.1016/J.COMNET.2020.107315}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZhangHWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhouCJD20, author = {Yuyang Zhou and Guang Cheng and Shanqing Jiang and Mian Dai}, title = {Building an efficient intrusion detection system based on feature selection and ensemble classifier}, journal = {Comput. Networks}, volume = {174}, pages = {107247}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2020.107247}, doi = {10.1016/J.COMNET.2020.107247}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZhouCJD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhouHLF20, author = {Man Zhou and Lansheng Han and Hongwei Lu and Cai Fu}, title = {Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant}, journal = {Comput. Networks}, volume = {172}, pages = {107174}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2020.107174}, doi = {10.1016/J.COMNET.2020.107174}, timestamp = {Tue, 28 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZhouHLF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/XuHLJ20, author = {Jing Xu and Dezhi Han and Kuan{-}Ching Li and Hai Jiang}, title = {A K-means algorithm based on characteristics of density applied to network intrusion detection}, journal = {Comput. Sci. Inf. Syst.}, volume = {17}, number = {2}, pages = {665--687}, year = {2020}, url = {https://doi.org/10.2298/CSIS200406014X}, doi = {10.2298/CSIS200406014X}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/XuHLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/AlmianiGAR20, author = {Muder Almiani and Alia Abu Ghazleh and Amer Al{-}Rahayfeh and Abdul Razaque}, title = {Cascaded hybrid intrusion detection model based on {SOM} and {RBF} neural networks}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {21}, year = {2020}, url = {https://doi.org/10.1002/cpe.5233}, doi = {10.1002/CPE.5233}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/AlmianiGAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/SwamiDR20, author = {Rochak Swami and Mayank Dave and Virender Ranga}, title = {Voting-based intrusion detection framework for securing software-defined networks}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {24}, year = {2020}, url = {https://doi.org/10.1002/cpe.5927}, doi = {10.1002/CPE.5927}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/SwamiDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/LiuHX20, author = {Hui Liu and Gang Hao and Bin Xing}, title = {Entropy clustering-based granular classifiers for network intrusion detection}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2020}, number = {1}, pages = {4}, year = {2020}, url = {https://doi.org/10.1186/s13638-019-1567-1}, doi = {10.1186/S13638-019-1567-1}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/LiuHX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/ZhouMS20, author = {Ying Zhou and Thomas A. Mazzuchi and Shahram Sarkani}, title = {M-AdaBoost-A based ensemble system for network intrusion detection}, journal = {Expert Syst. Appl.}, volume = {162}, pages = {113864}, year = {2020}, url = {https://doi.org/10.1016/j.eswa.2020.113864}, doi = {10.1016/J.ESWA.2020.113864}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/ZhouMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/FerragMADJ20, author = {Mohamed Amine Ferrag and Leandros A. Maglaras and Ahmed Ahmim and Makhlouf Derdour and Helge Janicke}, title = {{RDTIDS:} Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks}, journal = {Future Internet}, volume = {12}, number = {3}, pages = {44}, year = {2020}, url = {https://doi.org/10.3390/fi12030044}, doi = {10.3390/FI12030044}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/FerragMADJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DongLZY20, author = {Rui{-}Hong Dong and Xue{-}Yong Li and Qiu{-}Yu Zhang and Hui Yuan}, title = {Network intrusion detection model based on multivariate correlation analysis - long short-time memory network}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {2}, pages = {166--174}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2019.0294}, doi = {10.1049/IET-IFS.2019.0294}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/DongLZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SelvarajanSAK20, author = {Shitharth Selvarajan and Masood Shaik and Sirajudeen Ameerjohn and Sangeetha Kannan}, title = {Mining of intrusion attack in {SCADA} network using clustering and genetically seeded flora-based optimal classification algorithm}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {1}, pages = {1--11}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2019.0011}, doi = {10.1049/IET-IFS.2019.0011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SelvarajanSAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbm/Dai20, author = {Zhenjun Dai}, title = {Research on network intrusion detection security based on improved extreme learning algorithms and neural network algorithms}, journal = {Int. J. Biom.}, volume = {12}, number = {1}, pages = {56--66}, year = {2020}, url = {https://doi.org/10.1504/IJBM.2020.105623}, doi = {10.1504/IJBM.2020.105623}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbm/Dai20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcia/SinghVG20, author = {Neha Singh and Deepali Virmani and Xiao{-}Zhi Gao}, title = {A Fuzzy Logic-Based Method to Avert Intrusions in Wireless Sensor Networks Using {WSN-DS} Dataset}, journal = {Int. J. Comput. Intell. Appl.}, volume = {19}, number = {3}, pages = {2050018:1--2050018:18}, year = {2020}, url = {https://doi.org/10.1142/S1469026820500182}, doi = {10.1142/S1469026820500182}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcia/SinghVG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/LuHDT20, author = {Xue Lu and Dezhi Han and Letian Duan and Qiuting Tian}, title = {Intrusion detection of wireless sensor networks based on {IPSO} algorithm and {BP} neural network}, journal = {Int. J. Comput. Sci. Eng.}, volume = {22}, number = {2/3}, pages = {221--232}, year = {2020}, url = {https://doi.org/10.1504/IJCSE.2020.107344}, doi = {10.1504/IJCSE.2020.107344}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcse/LuHDT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/WangH20, author = {Jing Wang and Dezhi Han}, title = {Design of network intrusion detection system based on parallel {DPC} clustering algorithm}, journal = {Int. J. Embed. Syst.}, volume = {13}, number = {3}, pages = {318--327}, year = {2020}, url = {https://doi.org/10.1504/IJES.2020.109969}, doi = {10.1504/IJES.2020.109969}, timestamp = {Thu, 22 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/WangH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MengLYL20, author = {Weizhi Meng and Wenjuan Li and Laurence T. Yang and Peng Li}, title = {Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain}, journal = {Int. J. Inf. Sec.}, volume = {19}, number = {3}, pages = {279--290}, year = {2020}, url = {https://doi.org/10.1007/s10207-019-00462-x}, doi = {10.1007/S10207-019-00462-X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MengLYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnc/HaoFKS20, author = {Zhao Hao and Yaokai Feng and Hiroshi Koide and Kouichi Sakurai}, title = {A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks}, journal = {Int. J. Netw. Comput.}, volume = {10}, number = {2}, pages = {213--226}, year = {2020}, url = {http://www.ijnc.org/index.php/ijnc/article/view/231}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnc/HaoFKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/DongYZ20, author = {Rui{-}Hong Dong and Hou{-}Hua Yan and Qiu{-}Yu Zhang}, title = {An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm}, journal = {Int. J. Netw. Secur.}, volume = {22}, number = {2}, pages = {218--230}, year = {2020}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n2/ijns-2020-v22-n2-p218-230.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/DongYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnvo/EzhilarasiK20, author = {M. Ezhilarasi and V. Krishnaveni}, title = {Robust intrusion detection system based on fuzzy {C} means clustering scheme implemented in IoT-based wireless sensor networks}, journal = {Int. J. Netw. Virtual Organisations}, volume = {23}, number = {4}, pages = {312--326}, year = {2020}, url = {https://doi.org/10.1504/IJNVO.2020.110502}, doi = {10.1504/IJNVO.2020.110502}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnvo/EzhilarasiK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SanoussiOH20, author = {Nouhad Sanoussi and Ghizlane Orhanou and Said El Hajji}, title = {A game theoretic approach based on intrusion tolerant systems}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {3}, pages = {175--181}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.109698}, doi = {10.1504/IJSN.2020.109698}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SanoussiOH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SinghKS20, author = {Rohit Singh and Mala Kalra and Shano Solanki}, title = {A hybrid approach for intrusion detection based on machine learning}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {4}, pages = {233--242}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.111128}, doi = {10.1504/IJSN.2020.111128}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SinghKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwin/WangYLWT20, author = {Xiaowei Wang and Shoulin Yin and Hang Li and Jiachi Wang and Lin Teng}, title = {A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional Neural Network}, journal = {Int. J. Wirel. Inf. Networks}, volume = {27}, number = {4}, pages = {503--517}, year = {2020}, url = {https://doi.org/10.1007/s10776-020-00495-3}, doi = {10.1007/S10776-020-00495-3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijwin/WangYLWT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/WangX20, author = {Debing Wang and Guangyu Xu}, title = {Research on the Detection of Network Intrusion Prevention With Svm Based Optimization Algorithm}, journal = {Informatica (Slovenia)}, volume = {44}, number = {2}, year = {2020}, url = {https://doi.org/10.31449/inf.v44i2.3195}, doi = {10.31449/INF.V44I2.3195}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/WangX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/Martindale0T20, author = {Nathan Martindale and Muhammad Ismail and Douglas A. Talbert}, title = {Ensemble-Based Online Machine Learning Algorithms for Network Intrusion Detection Systems Using Streaming Data}, journal = {Inf.}, volume = {11}, number = {6}, pages = {315}, year = {2020}, url = {https://doi.org/10.3390/info11060315}, doi = {10.3390/INFO11060315}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/Martindale0T20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RaviS20a, author = {Nagarathna Ravi and S. Mercy Shalinie}, title = {Semisupervised-Learning-Based Security to Detect and Mitigate Intrusions in IoT Network}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {11}, pages = {11041--11052}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2993410}, doi = {10.1109/JIOT.2020.2993410}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/RaviS20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Al-TuraikiAAAAA20, author = {Isra Al{-}Turaiki and Najwa Altwaijry and Abeer Agil and Haya Aljodhi and Sara Alharbi and Lina Alqassem}, title = {Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {12}, number = {3}, pages = {37--44}, year = {2020}, url = {https://doi.org/10.22042/isecure.2021.271076.624}, doi = {10.22042/ISECURE.2021.271076.624}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Al-TuraikiAAAAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isi/ChenCZMZ20, author = {Fei Chen and Rui Cheng and Yayun Zhu and Siwei Miao and Liang Zhou}, title = {An Intrusion Detection Method for Enterprise Network Based on Backpropagation Neural Network}, journal = {Ing{\'{e}}nierie des Syst{\`{e}}mes d Inf.}, volume = {25}, number = {3}, pages = {377--382}, year = {2020}, url = {https://doi.org/10.18280/isi.250313}, doi = {10.18280/ISI.250313}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isi/ChenCZMZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/AyoFAAA20, author = {Femi Emmanuel Ayo and Sakinat Oluwabukonla Folorunso and Adebayo Abayomi{-}Alli and Adebola Olayinka Adekunle and Joseph Bamidele Awotunde}, title = {Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {29}, number = {6}, pages = {267--283}, year = {2020}, url = {https://doi.org/10.1080/19393555.2020.1767240}, doi = {10.1080/19393555.2020.1767240}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/AyoFAAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/PhamSC20, author = {Vinh Pham and Eunil Seo and Tai{-}Myoung Chung}, title = {Lightweight Convolutional Neural Network Based Intrusion Detection System}, journal = {J. Commun.}, volume = {15}, number = {11}, pages = {808--817}, year = {2020}, url = {https://doi.org/10.12720/jcm.15.11.808-817}, doi = {10.12720/JCM.15.11.808-817}, timestamp = {Tue, 03 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcm/PhamSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcnc/ThangP20, author = {Vu Viet Thang and Fedor F. Pashchenko}, title = {Corrigendum to "Multistage System-Based Machine Learning Techniques for Intrusion Detection in WiFi Network"}, journal = {J. Comput. Networks Commun.}, volume = {2020}, pages = {6576725:1--6576725:1}, year = {2020}, url = {https://doi.org/10.1155/2020/6576725}, doi = {10.1155/2020/6576725}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcnc/ThangP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/KejiaPQTP20, author = {Shen Kejia and Hamid Parvin and Sultan Noman Qasem and Bui Anh Tuan and Kim{-}Hung Pho}, title = {A classification model based on svm and fuzzy rough set for network intrusion detection}, journal = {J. Intell. Fuzzy Syst.}, volume = {39}, number = {5}, pages = {6801--6817}, year = {2020}, url = {https://doi.org/10.3233/JIFS-191621}, doi = {10.3233/JIFS-191621}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/KejiaPQTP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/WangCH20, author = {Hui Wang and Zijian Cao and Bo Hong}, title = {A network intrusion detection system based on convolutional neural network}, journal = {J. Intell. Fuzzy Syst.}, volume = {38}, number = {6}, pages = {7623--7637}, year = {2020}, url = {https://doi.org/10.3233/JIFS-179833}, doi = {10.3233/JIFS-179833}, timestamp = {Sun, 17 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/WangCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WuWHZW20, author = {Zhendong Wu and Jingjing Wang and Liqin Hu and Zhang Zhang and Han Wu}, title = {A network intrusion detection method based on semantic Re-encoding and deep learning}, journal = {J. Netw. Comput. Appl.}, volume = {164}, pages = {102688}, year = {2020}, url = {https://doi.org/10.1016/j.jnca.2020.102688}, doi = {10.1016/J.JNCA.2020.102688}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WuWHZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/Ramadan20, author = {Rabie A. Ramadan}, title = {Efficient Intrusion Detection Algorithms for Smart Cities-Based Wireless Sensing Technologies}, journal = {J. Sens. Actuator Networks}, volume = {9}, number = {3}, pages = {39}, year = {2020}, url = {https://doi.org/10.3390/jsan9030039}, doi = {10.3390/JSAN9030039}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsan/Ramadan20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/SatheeshRRSDDVS20, author = {N. Satheesh and Rathnamma V. Mydukuri and G. Rajeshkumar and P. Vidya Sagar and Pankaj Dadheech and Sanwta Ram Dogiwal and Priya Velayutham and Sudhakar Sengan}, title = {Flow-based anomaly intrusion detection using machine learning model with software defined networking for OpenFlow network}, journal = {Microprocess. Microsystems}, volume = {79}, pages = {103285}, year = {2020}, url = {https://doi.org/10.1016/j.micpro.2020.103285}, doi = {10.1016/J.MICPRO.2020.103285}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/SatheeshRRSDDVS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/NgoPT20, author = {Duc{-}Minh Ngo and Cuong Pham{-}Quoc and Tran Ngoc Thinh}, title = {Heterogeneous Hardware-based Network Intrusion Detection System with Multiple Approaches for {SDN}}, journal = {Mob. Networks Appl.}, volume = {25}, number = {3}, pages = {1178--1192}, year = {2020}, url = {https://doi.org/10.1007/s11036-019-01437-x}, doi = {10.1007/S11036-019-01437-X}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/NgoPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/RibeiroSMRSA20, author = {Jos{\'{e}} Carlos Ribeiro and Firooz B. Saghezchi and Georgios Mantas and Jonathan Rodriguez and Simon J. Shepherd and Raed A. Abd{-}Alhameed}, title = {An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices}, journal = {Mob. Networks Appl.}, volume = {25}, number = {1}, pages = {164--172}, year = {2020}, url = {https://doi.org/10.1007/s11036-019-01220-y}, doi = {10.1007/S11036-019-01220-Y}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/RibeiroSMRSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mva/VillamizarMCO20, author = {Michael Villamizar and {\'{A}}ngel Mart{\'{\i}}nez{-}Gonz{\'{a}}lez and Olivier Can{\'{e}}vet and Jean{-}Marc Odobez}, title = {WatchNet++: efficient and accurate depth-based network for detecting people attacks and intrusion}, journal = {Mach. Vis. Appl.}, volume = {31}, number = {6}, pages = {41}, year = {2020}, url = {https://doi.org/10.1007/s00138-020-01089-y}, doi = {10.1007/S00138-020-01089-Y}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mva/VillamizarMCO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/DevanK20, author = {Preethi Devan and Neelu Khare}, title = {An efficient XGBoost-DNN-based classification model for network intrusion detection system}, journal = {Neural Comput. Appl.}, volume = {32}, number = {16}, pages = {12499--12514}, year = {2020}, url = {https://doi.org/10.1007/s00521-020-04708-x}, doi = {10.1007/S00521-020-04708-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/DevanK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ShawlyKEG20, author = {Tawfeeq A. Shawly and Mosab Khayat and Ali A. Elghariani and Arif Ghafoor}, title = {Evaluation of HMM-Based Network Intrusion Detection System for Multiple Multi-Stage Attacks}, journal = {{IEEE} Netw.}, volume = {34}, number = {3}, pages = {240--248}, year = {2020}, url = {https://doi.org/10.1109/MNET.001.1900426}, doi = {10.1109/MNET.001.1900426}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/ShawlyKEG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/AbdelhaqAAAATST20, author = {Maha S. Abdelhaq and Raed A. Alsaqour and Abeer Algarni and Maali Alabdulhafith and Mahmoud A. Alawi and Aqeel Taha and Baraa T. Sharef and Mustafa Tariq}, title = {Human immune-based model for intrusion detection in mobile ad hoc networks}, journal = {Peer-to-Peer Netw. Appl.}, volume = {13}, number = {3}, pages = {1046--1068}, year = {2020}, url = {https://doi.org/10.1007/s12083-019-00862-9}, doi = {10.1007/S12083-019-00862-9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppna/AbdelhaqAAAATST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaoFC20, author = {Xuefei Cao and Yulong Fu and Bo Chen}, title = {Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8860418:1--8860418:12}, year = {2020}, url = {https://doi.org/10.1155/2020/8860418}, doi = {10.1155/2020/8860418}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/CaoFC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Farahani20, author = {Gholamreza Farahani}, title = {Feature Selection Based on Cross-Correlation for the Intrusion Detection System}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8875404:1--8875404:17}, year = {2020}, url = {https://doi.org/10.1155/2020/8875404}, doi = {10.1155/2020/8875404}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/Farahani20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GuNHK20, author = {Zhiwei Gu and Shah Nazir and Cheng Hong and Sulaiman Khan}, title = {Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8830903:1--8830903:10}, year = {2020}, url = {https://doi.org/10.1155/2020/8830903}, doi = {10.1155/2020/8830903}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/GuNHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MoukafihOE20, author = {Nabil Moukafih and Ghizlane Orhanou and Said Elhajji}, title = {Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in {SIEM/IDS} Systems}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {3512737:1--3512737:15}, year = {2020}, url = {https://doi.org/10.1155/2020/3512737}, doi = {10.1155/2020/3512737}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MoukafihOE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangXXYZS20, author = {Zhiyong Wang and Shengwei Xu and Guoai Xu and Yongfeng Yin and Miao Zhang and Dawei Sun}, title = {Game Theoretical Method for Anomaly-Based Intrusion Detection}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8824163:1--8824163:10}, year = {2020}, url = {https://doi.org/10.1155/2020/8824163}, doi = {10.1155/2020/8824163}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/WangXXYZS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/BoniXCB20, author = {Kenneth Rodolphe Chabi Boni and Lizhong Xu and Zhe Chen and Thelma Dede Baddoo}, title = {A Security Concept Based on Scaler Distribution of a Novel Intrusion Detection Device for Wireless Sensor Networks in a Smart Environment}, journal = {Sensors}, volume = {20}, number = {17}, pages = {4717}, year = {2020}, url = {https://doi.org/10.3390/s20174717}, doi = {10.3390/S20174717}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/BoniXCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WangLLL20, author = {Zhidong Wang and Yingxu Lai and Zenghui Liu and Jing Liu}, title = {Explaining the Attributes of a Deep Learning Based Intrusion Detection System for Industrial Control Networks}, journal = {Sensors}, volume = {20}, number = {14}, pages = {3817}, year = {2020}, url = {https://doi.org/10.3390/s20143817}, doi = {10.3390/S20143817}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/WangLLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/ZhangHLM20, author = {Wenjie Zhang and Dezhi Han and Kuan{-}Ching Li and Francisco Isidro Massetto}, title = {Wireless sensor network intrusion detection system based on {MK-ELM}}, journal = {Soft Comput.}, volume = {24}, number = {16}, pages = {12361--12374}, year = {2020}, url = {https://doi.org/10.1007/s00500-020-04678-1}, doi = {10.1007/S00500-020-04678-1}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/ZhangHLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/Almomani20, author = {Omar Almomani}, title = {A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, {FFA} and {GA} Algorithms}, journal = {Symmetry}, volume = {12}, number = {6}, pages = {1046}, year = {2020}, url = {https://doi.org/10.3390/sym12061046}, doi = {10.3390/SYM12061046}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/Almomani20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/MacielSF20, author = {Lucas Andrade Maciel and Matheus Alc{\^{a}}ntara Souza and Henrique Cota de Freitas}, title = {Reconfigurable FPGA-Based K-Means/K-Modes Architecture for Network Intrusion Detection}, journal = {{IEEE} Trans. Circuits Syst. {II} Express Briefs}, volume = {67-II}, number = {8}, pages = {1459--1463}, year = {2020}, url = {https://doi.org/10.1109/TCSII.2019.2939826}, doi = {10.1109/TCSII.2019.2939826}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/MacielSF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/ZhouJZL20, author = {Jia Zhou and Prachi Joshi and Haibo Zeng and Renfa Li}, title = {BTMonitor: Bit-time-based Intrusion Detection and Attacker Identification in Controller Area Network}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {18}, number = {6}, pages = {117:1--117:23}, year = {2020}, url = {https://doi.org/10.1145/3362034}, doi = {10.1145/3362034}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/ZhouJZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuSD20, author = {Congyuan Xu and Jizhong Shen and Xin Du}, title = {A Method of Few-Shot Network Intrusion Detection Based on Meta-Learning Framework}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3540--3552}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2991876}, doi = {10.1109/TIFS.2020.2991876}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/LiangLLKZ20, author = {Wei Liang and Kuan{-}Ching Li and Jing Long and Xiaoyan Kui and Albert Y. Zomaya}, title = {An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {3}, pages = {2063--2071}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2946791}, doi = {10.1109/TII.2019.2946791}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/LiangLLKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/LiangLCZ20, author = {Junwei Liang and Qiuzhen Lin and Jianyong Chen and Yingying Zhu}, title = {A Filter Model Based on Hidden Generalized Mixture Transition Distribution Model for Intrusion Detection System in Vehicle Ad Hoc Networks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {21}, number = {7}, pages = {2707--2722}, year = {2020}, url = {https://doi.org/10.1109/TITS.2019.2905415}, doi = {10.1109/TITS.2019.2905415}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/LiangLCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ZuoCDCH20, author = {Xiaojun Zuo and Ze Chen and Limian Dong and Jie Chang and Botao Hou}, title = {Power information network intrusion detection based on data mining algorithm}, journal = {J. Supercomput.}, volume = {76}, number = {7}, pages = {5521--5539}, year = {2020}, url = {https://doi.org/10.1007/s11227-019-02899-2}, doi = {10.1007/S11227-019-02899-2}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/ZuoCDCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/NieNWHCL20, author = {Laisen Nie and Zhaolong Ning and Xiaojie Wang and Xiping Hu and Jun Cheng and Yongkang Li}, title = {Data-Driven Intrusion Detection for Intelligent Internet of Vehicles: {A} Deep Convolutional Neural Network-Based Method}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {7}, number = {4}, pages = {2219--2230}, year = {2020}, url = {https://doi.org/10.1109/TNSE.2020.2990984}, doi = {10.1109/TNSE.2020.2990984}, timestamp = {Tue, 04 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/NieNWHCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/MauroGL20, author = {Mario Di Mauro and Giovanni Galatro and Antonio Liotta}, title = {Experimental Review of Neural-Based Approaches for Network Intrusion Management}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {17}, number = {4}, pages = {2480--2495}, year = {2020}, url = {https://doi.org/10.1109/TNSM.2020.3024225}, doi = {10.1109/TNSM.2020.3024225}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/MauroGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/OlufowobiYZB20, author = {Habeeb Olufowobi and Clinton Young and Joseph Zambreno and Gedare Bloom}, title = {SAIDuCANT: Specification-Based Automotive Intrusion Detection Using Controller Area Network {(CAN)} Timing}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {2}, pages = {1484--1494}, year = {2020}, url = {https://doi.org/10.1109/TVT.2019.2961344}, doi = {10.1109/TVT.2019.2961344}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/OlufowobiYZB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/DerhabAEK20, author = {Abdelouahid Derhab and Arwa Aldweesh and Ahmed Z. Emam and Farrukh Aslam Khan}, title = {Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2020}, pages = {6689134:1--6689134:16}, year = {2020}, url = {https://doi.org/10.1155/2020/6689134}, doi = {10.1155/2020/6689134}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/DerhabAEK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/PirozmandGSR20, author = {Poria Pirozmand and Mohsen Angoraj Ghafary and Safieh Siadat and Jiankang Ren}, title = {Intrusion Detection into Cloud-Fog-Based IoT Networks Using Game Theory}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2020}, pages = {8819545:1--8819545:9}, year = {2020}, url = {https://doi.org/10.1155/2020/8819545}, doi = {10.1155/2020/8819545}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/PirozmandGSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/KrishnanJRKSTL20, author = {R. Santhana Krishnan and Eanoch Golden Julie and Yesudhas Harold Robinson and Raghvendra Kumar and Le Hoang Son and Tong Anh Tuan and Hoang Viet Long}, title = {Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks}, journal = {Wirel. Networks}, volume = {26}, number = {2}, pages = {1275--1289}, year = {2020}, url = {https://doi.org/10.1007/s11276-019-02151-y}, doi = {10.1007/S11276-019-02151-Y}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/winet/KrishnanJRKSTL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/BabuR20, author = {M. Jagadeesh Babu and A. Raji Reddy}, title = {{SH-IDS:} Specification Heuristics Based Intrusion Detection System for IoT Networks}, journal = {Wirel. Pers. Commun.}, volume = {112}, number = {3}, pages = {2023--2045}, year = {2020}, url = {https://doi.org/10.1007/s11277-020-07137-0}, doi = {10.1007/S11277-020-07137-0}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/BabuR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/SinhaP20, author = {Somnath Sinha and Aditi Paul}, title = {Neuro-Fuzzy Based Intrusion Detection System for Wireless Sensor Network}, journal = {Wirel. Pers. Commun.}, volume = {114}, number = {1}, pages = {835--851}, year = {2020}, url = {https://doi.org/10.1007/s11277-020-07395-y}, doi = {10.1007/S11277-020-07395-Y}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/SinhaP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acit3/ProticS20, author = {Danijela Protic and Miomir Stankovic}, title = {A Hybrid Model for Anomaly-Based Intrusion Detection in Complex Computer Networks}, booktitle = {21st International Arab Conference on Information Technology, {ACIT} 2020, Giza, Egypt, November 28-30, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ACIT50332.2020.9299965}, doi = {10.1109/ACIT50332.2020.9299965}, timestamp = {Tue, 26 Oct 2021 12:13:28 +0200}, biburl = {https://dblp.org/rec/conf/acit3/ProticS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atci/FengZ20, author = {Li Feng and Kejie Zhao}, editor = {Jemal H. Abawajy and Kim{-}Kwang Raymond Choo and Zheng Xu and Mohammed Atiquzzaman}, title = {Network Intrusion Path of Power Monitoring System Based on Simulation System}, booktitle = {2020 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence {(ATCI} 2020), Fuyang, China, 20-22 June, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1244}, pages = {244--249}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-53980-1\_37}, doi = {10.1007/978-3-030-53980-1\_37}, timestamp = {Tue, 05 Apr 2022 12:05:39 +0200}, biburl = {https://dblp.org/rec/conf/atci/FengZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/PiplaiCJ20, author = {Aritran Piplai and Sai Sree Laya Chukkapalli and Anupam Joshi}, title = {NAttack! Adversarial Attacks to bypass a {GAN} based classifier trained to detect Network intrusion}, booktitle = {6th {IEEE} International Conference on Big Data Security on Cloud, {IEEE} International Conference on High Performance and Smart Computing, and {IEEE} International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2020, Baltimore, MD, USA, May 25-27, 2020}, pages = {49--54}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00020}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS49724.2020.00020}, timestamp = {Wed, 14 Jul 2021 09:36:30 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/PiplaiCJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbd/ChenKXSY20, author = {Lin Chen and Xiaoyun Kuang and Aidong Xu and Siliang Suo and Yiwei Yang}, title = {A Novel Network Intrusion Detection System Based on {CNN}}, booktitle = {Eighth International Conference on Advanced Cloud and Big Data, {CBD} 2020, Taiyuan, China, December 5-6, 2020}, pages = {243--247}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CBD51900.2020.00051}, doi = {10.1109/CBD51900.2020.00051}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cbd/ChenKXSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciat/XuY20, author = {Xiandong Xu and Xiang Yu}, editor = {Zhihong Tian and Lihua Yin and Zhaoquan Gu}, title = {A network digital works protection method based on digital watermarking and intrusion detection}, booktitle = {{CIAT} 2020: International Conference on Cyberspace Innovation of Advanced Technologies, Virtual Event / Guangzhou, China, December 5, 2020}, pages = {582--586}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3444370.3444631}, doi = {10.1145/3444370.3444631}, timestamp = {Thu, 21 Jan 2021 16:32:07 +0100}, biburl = {https://dblp.org/rec/conf/ciat/XuY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud2/JiYX20, author = {Shujian Ji and Kejiang Ye and Cheng{-}Zhong Xu}, editor = {Qi Zhang and Yingwei Wang and Liang{-}Jie Zhang}, title = {A Network Intrusion Detection Approach Based on Asymmetric Convolutional Autoencoder}, booktitle = {Cloud Computing - {CLOUD} 2020 - 13th International Conference, Held as Part of the Services Conference Federation, {SCF} 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12403}, pages = {126--140}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59635-4\_9}, doi = {10.1007/978-3-030-59635-4\_9}, timestamp = {Tue, 22 Sep 2020 17:23:44 +0200}, biburl = {https://dblp.org/rec/conf/cloud2/JiYX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/HossainIOFK20, author = {Md Delwar Hossain and Hiroyuki Inoue and Hideya Ochiai and Doudou Fall and Youki Kadobayashi}, title = {Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus}, booktitle = {44th {IEEE} Annual Computers, Software, and Applications Conference, {COMPSAC} 2020, Madrid, Spain, July 13-17, 2020}, pages = {10--17}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/COMPSAC48688.2020.00011}, doi = {10.1109/COMPSAC48688.2020.00011}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/HossainIOFK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csia/Li20h, author = {Sile Li}, editor = {Zheng Xu and Reza M. Parizi and Mohammad Hammoudeh and Octavio Loyola{-}Gonz{\'{a}}lez}, title = {Network Intrusion Detection Model Based on Improved Convolutional Neural Network}, booktitle = {Cyber Security Intelligence and Analytics - Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics, {CSIA} 2020, Haikou, China, 28-29 February 2020, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {1146}, pages = {18--24}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-43306-2\_3}, doi = {10.1007/978-3-030-43306-2\_3}, timestamp = {Mon, 11 Jan 2021 10:06:59 +0100}, biburl = {https://dblp.org/rec/conf/csia/Li20h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csoc/Thanh20, author = {Cao Tien Thanh}, editor = {Radek Silhavy}, title = {A Novel Approach for Intrusion Detection Based on Deep Belief Network}, booktitle = {Artificial Intelligence and Bioinspired Computational Methods - Proceedings of the 9th Computer Science On-line Conference 2020, Vol. 2}, series = {Advances in Intelligent Systems and Computing}, volume = {1225}, pages = {297--311}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51971-1\_24}, doi = {10.1007/978-3-030-51971-1\_24}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csoc/Thanh20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/ZhangD20, author = {Siyuan Zhang and Chaoming Du}, title = {Semi-Supervised Deep Learning based Network Intrusion Detection}, booktitle = {International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2020, Chongqing, China, October 29-30, 2020}, pages = {35--40}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberC49757.2020.00016}, doi = {10.1109/CYBERC49757.2020.00016}, timestamp = {Tue, 02 Feb 2021 11:46:01 +0100}, biburl = {https://dblp.org/rec/conf/cyberc/ZhangD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/AhnYLHKP20, author = {Sunwoo Ahn and Hayoon Yi and Younghan Lee and Whoi Ree Ha and Giyeol Kim and Yunheung Paek}, title = {Hawkware: Network Intrusion Detection based on Behavior Analysis with ANNs on an IoT Device}, booktitle = {57th {ACM/IEEE} Design Automation Conference, {DAC} 2020, San Francisco, CA, USA, July 20-24, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DAC18072.2020.9218559}, doi = {10.1109/DAC18072.2020.9218559}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/AhnYLHKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/Melaragno20, author = {Anthony Melaragno}, title = {Would an Object Representation Invariant Provide Sufficient State Based Knowledge to Adapt Network Intrusion Detection System Rules With Minimal Impact to System Resources?}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22, 2020}, pages = {556--561}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00099}, doi = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH49142.2020.00099}, timestamp = {Fri, 20 Nov 2020 11:30:51 +0100}, biburl = {https://dblp.org/rec/conf/dasc/Melaragno20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsaa/ShahCMC20, author = {Ajay Shah and Sophine Clachar and Manfred Minimair and Davis Cook}, editor = {Geoffrey I. Webb and Zhongfei Zhang and Vincent S. Tseng and Graham Williams and Michalis Vlachos and Longbing Cao}, title = {Building Multiclass Classification Baselines for Anomaly-based Network Intrusion Detection Systems}, booktitle = {7th {IEEE} International Conference on Data Science and Advanced Analytics, {DSAA} 2020, Sydney, Australia, October 6-9, 2020}, pages = {759--760}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DSAA49011.2020.00102}, doi = {10.1109/DSAA49011.2020.00102}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsaa/ShahCMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ebimcs/PanX20, author = {Leilei Pan and Xiaolan Xie}, title = {Network Intrusion Detection Model Based on {PCA} + {ADASYN} and XGBoost}, booktitle = {{EBIMCS} 2020: 3rd International Conference on E-Business, Information Management and Computer Science, Wuhan, China, December, 2020}, pages = {44--48}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3453187.3453311}, doi = {10.1145/3453187.3453311}, timestamp = {Thu, 15 Feb 2024 13:36:17 +0100}, biburl = {https://dblp.org/rec/conf/ebimcs/PanX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/DuLZ20, author = {Xiangtong Du and Yongzhong Li and Shipeng Zhang}, title = {Research on Intrusion Detection Algorithm Based on Deep Belief Networks and Three-way Decisions}, booktitle = {{EITCE} 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020 - 8 November, 2020}, pages = {50--56}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3443467.3443728}, doi = {10.1145/3443467.3443728}, timestamp = {Fri, 04 Aug 2023 10:04:46 +0200}, biburl = {https://dblp.org/rec/conf/eitce/DuLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnc/SerinelliCN20, author = {Benedetto Marco Serinelli and Anastasija Collen and Niels Alexander Nijdam}, editor = {Elhadi M. Shakshuki and Ansar{-}Ul{-}Haque Yasar}, title = {Training Guidance with {KDD} Cup 1999 and {NSL-KDD} Data Sets of {ANIDINR:} Anomaly-Based Network Intrusion Detection System}, booktitle = {The 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2020) / The 15th International Conference on Future Networks and Communications {(FNC-2020)} / The 10th International Conference on Sustainable Energy Information Technology, Leuven, Belgium, August 9-12, 2020}, series = {Procedia Computer Science}, volume = {175}, pages = {560--565}, publisher = {Elsevier}, year = {2020}, url = {https://doi.org/10.1016/j.procs.2020.07.080}, doi = {10.1016/J.PROCS.2020.07.080}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fnc/SerinelliCN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcct/ZhangZL20, author = {Jie Zhang and Yong Zhang and Kexin Li}, title = {A Network Intrusion Detection Model based on the Combination of ReliefF and Borderline-SMOTE}, booktitle = {{HPCCT} {\&} {BDAI} 2020: 4th High Performance Computing and Cluster Technologies Conference {\&} 3rd International Conference on Big Data and Artificial Intelligence, Qingdao, China, July, 2020}, pages = {199--203}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3409501.3409516}, doi = {10.1145/3409501.3409516}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcct/ZhangZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ibica/WadiaiMB20, author = {Younes Wadiai and Yousef El Mourabit and Mohamed Baslam}, editor = {Ajith Abraham and Hideyasu Sasaki and Ricardo Rios and Niketa Gandhi and Umang Singh and Kun Ma}, title = {Machine Learning for Intrusion Detection: Design and Implementation of an {IDS} Based on Artificial Neural Network}, booktitle = {Innovations in Bio-Inspired Computing and Applications - Proceedings of the 11th International Conference on Innovations in Bio-Inspired Computing and Applications {(IBICA} 2020) held during December 16-18, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1372}, pages = {206--216}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-73603-3\_19}, doi = {10.1007/978-3-030-73603-3\_19}, timestamp = {Thu, 22 Feb 2024 09:42:25 +0100}, biburl = {https://dblp.org/rec/conf/ibica/WadiaiMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaiic/MeliboevAK20, author = {Azizjon Meliboev and Jumabek Alikhanov and Wooseong Kim}, title = {1D {CNN} based network intrusion detection with normalization on imbalanced data}, booktitle = {2020 International Conference on Artificial Intelligence in Information and Communication, {ICAIIC} 2020, Fukuoka, Japan, February 19-21, 2020}, pages = {218--224}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICAIIC48513.2020.9064976}, doi = {10.1109/ICAIIC48513.2020.9064976}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaiic/MeliboevAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaiic/ParkPC20, author = {Shin Hyuk Park and Hyunjae Park and Young{-}June Choi}, title = {RNN-based Prediction for Network Intrusion Detection}, booktitle = {2020 International Conference on Artificial Intelligence in Information and Communication, {ICAIIC} 2020, Fukuoka, Japan, February 19-21, 2020}, pages = {572--574}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICAIIC48513.2020.9065249}, doi = {10.1109/ICAIIC48513.2020.9065249}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaiic/ParkPC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/YanQWLC20, author = {Yu Yan and Lin Qi and Jie Wang and Yun Lin and Lei Chen}, title = {A Network Intrusion Detection Method Based on Stacked Autoencoder and {LSTM}}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149384}, doi = {10.1109/ICC40277.2020.9149384}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/YanQWLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhangLY20, author = {Jielun Zhang and Fuhao Li and Feng Ye}, title = {An Ensemble-based Network Intrusion Detection Scheme with Bayesian Deep Learning}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149402}, doi = {10.1109/ICC40277.2020.9149402}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZhangLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/RaniK20, author = {Deepa Rani and Narottam Chand Kaushal}, title = {Supervised Machine Learning Based Network Intrusion Detection System for Internet of Things}, booktitle = {11th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCCNT49239.2020.9225340}, doi = {10.1109/ICCCNT49239.2020.9225340}, timestamp = {Thu, 22 Oct 2020 13:44:41 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/RaniK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/RattiSN20, author = {Ritesh Ratti and Sanasam Ranbir Singh and Sukumar Nandi}, title = {Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique}, booktitle = {11th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCCNT49239.2020.9225476}, doi = {10.1109/ICCCNT49239.2020.9225476}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/RattiSN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/SureshM20, author = {Geethu M. Suresh and Minu Lalitha Madhavu}, title = {{AI} Based Intrusion Detection System Using Self-Adaptive Energy Efficient {BAT} Algorithm for Software Defined IoT Networks}, booktitle = {11th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCCNT49239.2020.9225415}, doi = {10.1109/ICCCNT49239.2020.9225415}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/SureshM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/LabonneOPZ20, author = {Maxime Labonne and Alexis Olivereau and Baptiste Polv{\'{e}} and Djamal Zeghlache}, title = {Unsupervised Protocol-based Intrusion Detection for Real-world Networks}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2020, Big Island, HI, USA, February 17-20, 2020}, pages = {299--303}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICNC47757.2020.9049796}, doi = {10.1109/ICNC47757.2020.9049796}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccnc/LabonneOPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/WangW20, author = {Quanmin Wang and Xuan Wei}, title = {The Detection of Network Intrusion Based on Improved Adaboost Algorithm}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {84--88}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377660}, doi = {10.1145/3377644.3377660}, timestamp = {Thu, 30 Apr 2020 16:20:40 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/WangW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/HalderC020, author = {Subir Halder and Mauro Conti and Sajal K. Das}, editor = {Nandini Mukherjee and Sriram V. Pemmaraju}, title = {{COIDS:} {A} Clock Offset Based Intrusion Detection System for Controller Area Networks}, booktitle = {{ICDCN} 2020: 21st International Conference on Distributed Computing and Networking, Kolkata, India, January 4-7, 2020}, pages = {22:1--22:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369740.3369787}, doi = {10.1145/3369740.3369787}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/HalderC020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciot3/AlsaadiHTA20, author = {Hajar Saif Alsaadi and Rachid Hedjam and Abderezak Touzene and Abdelhamid Abdessalem}, title = {Fast Binary Network Intrusion Detection based on Matched Filter Optimization}, booktitle = {{IEEE} International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020, Doha, Qatar, February 2-5, 2020}, pages = {195--199}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICIoT48696.2020.9089659}, doi = {10.1109/ICIOT48696.2020.9089659}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciot3/AlsaadiHTA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TeradoH20, author = {Ryosuke Terado and Morihiro Hayashida}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Improving Accuracy and Speed of Network-based Intrusion Detection using Gradient Boosting Trees}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {490--497}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008963504900497}, doi = {10.5220/0008963504900497}, timestamp = {Tue, 14 Apr 2020 10:48:30 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TeradoH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icit2/QiaoBC20, author = {Hanli Qiao and Jan Olaf Blech and Huazhou Chen}, title = {A Machine learning based intrusion detection approach for industrial networks}, booktitle = {2020 {IEEE} International Conference on Industrial Technology, {ICIT} 2020, Buenos Aires, Argentina, February 26-28, 2020}, pages = {265--270}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICIT45562.2020.9067253}, doi = {10.1109/ICIT45562.2020.9067253}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icit2/QiaoBC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmlt/YangTXL20, author = {Shuaichuang Yang and Minsheng Tan and Shiying Xia and Fangju Liu}, title = {A method of intrusion detection based on Attention-LSTM neural network}, booktitle = {{ICMLT} 2020: 5th International Conference on Machine Learning Technologies, Beijing, China, June, 2020}, pages = {46--50}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3409073.3409096}, doi = {10.1145/3409073.3409096}, timestamp = {Thu, 22 Feb 2024 13:30:59 +0100}, biburl = {https://dblp.org/rec/conf/icmlt/YangTXL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icons2/AlamYST20, author = {Md. Shahanur Alam and Chris Yakopcic and Guru Subramanyam and Tarek M. Taha}, editor = {Thomas E. Potok and Catherine D. Schuman}, title = {Memristor Based Neuromorphic Adaptive Resonance Theory for One-Shot Online Learning and Network Intrusion Detection}, booktitle = {Proceedings of the International Conference on Neuromorphic Systems, {ICONS} 2020, Oak Ridge, Tennessee, USA, July, 2020}, pages = {25:1--25:8}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407197.3407608}, doi = {10.1145/3407197.3407608}, timestamp = {Wed, 05 Aug 2020 15:04:08 +0200}, biburl = {https://dblp.org/rec/conf/icons2/AlamYST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/LeePL20, author = {Joohwa Lee and Ju{-}Geon Pak and Myungsuk Lee}, title = {Network Intrusion Detection System using Feature Extraction based on Deep Sparse Autoencoder}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2020, Jeju Island, Korea (South), October 21-23, 2020}, pages = {1282--1287}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICTC49870.2020.9289253}, doi = {10.1109/ICTC49870.2020.9289253}, timestamp = {Sat, 11 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/LeePL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idaacssws/BelejKSVA20, author = {Olexander Belej and Mikolaj P. Karpinski and Aigul Shaikhanova and Olga Veselska and Azamat Azatov}, title = {Development of Intrusion Monitoring System in Wireless Sensor Networks Based on Neural Networks}, booktitle = {2020 {IEEE} 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), Dortmund, Germany, September 17-18, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IDAACS-SWS50031.2020.9297080}, doi = {10.1109/IDAACS-SWS50031.2020.9297080}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idaacssws/BelejKSVA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/RohLSHKP20, author = {Jae{-}hee Roh and Seok{-}Ki Lee and Choul{-}Woong Son and Cheonghwan Hwang and Jiwoong Kang and Jaehyun Park}, title = {Cyber Security System with FPGA-based Network Intrusion Detector for Nuclear Power Plant}, booktitle = {The 46th Annual Conference of the {IEEE} Industrial Electronics Society, {IECON} 2020, Singapore, October 18-21, 2020}, pages = {2121--2125}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IECON43393.2020.9255158}, doi = {10.1109/IECON43393.2020.9255158}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iecon/RohLSHKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/LeiLCLLK20, author = {Mingjian Lei and Xiaoyong Li and Binsi Cai and Yunfeng Li and Limengwei Liu and Wenping Kong}, title = {{P-DNN:} An Effective Intrusion Detection Method based on Pruning Deep Neural Network}, booktitle = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020, Glasgow, United Kingdom, July 19-24, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IJCNN48605.2020.9206805}, doi = {10.1109/IJCNN48605.2020.9206805}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/LeiLCLLK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/GongLYF20, author = {Yiguang Gong and Yunping Liu and Chuanyang Yin and Zhiyong Fan}, editor = {Xiaofeng Chen and Hongyang Yan and Qiben Yan and Xiangliang Zhang}, title = {A Two-Phase Cycle Algorithm Based on Multi-objective Genetic Algorithm and Modified {BP} Neural Network for Effective Cyber Intrusion Detection}, booktitle = {Machine Learning for Cyber Security - Third International Conference, {ML4CS} 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12486}, pages = {73--88}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62223-7\_7}, doi = {10.1007/978-3-030-62223-7\_7}, timestamp = {Wed, 11 Nov 2020 16:33:52 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/GongLYF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/MinawiWAE20, author = {Omar Minawi and Jason Whelan and Abdulaziz Almehmadi and Khalil El{-}Khatib}, editor = {Mirela Sechi Moretti Annoni Notare and Peng Sun}, title = {Machine Learning-Based Intrusion Detection System for Controller Area Networks}, booktitle = {DIVANet '20: Proceedings of the 10th {ACM} Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, Alicante, Spain, November 16-20, 2020}, pages = {41--47}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3416014.3424581}, doi = {10.1145/3416014.3424581}, timestamp = {Thu, 26 Nov 2020 17:57:37 +0100}, biburl = {https://dblp.org/rec/conf/mswim/MinawiWAE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LiTW20, author = {Wenjuan Li and Jiao Tan and Yu Wang}, editor = {Miroslaw Kutylowski and Jun Zhang and Chao Chen}, title = {A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking}, booktitle = {Network and System Security - 14th International Conference, {NSS} 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12570}, pages = {261--276}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65745-1\_15}, doi = {10.1007/978-3-030-65745-1\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/LiTW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/AzminI20, author = {Shuhana Azmin and A. B. M. Alim Al Islam}, title = {Network Intrusion Detection System based on Conditional Variational Laplace AutoEncoder}, booktitle = {7th NSysS 2020: 7th International Conference on Networking, Systems and Security, Dhaka, Bangladesh, 22-24 December, 2020}, pages = {82--88}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3428363.3428371}, doi = {10.1145/3428363.3428371}, timestamp = {Thu, 21 Jan 2021 17:31:27 +0100}, biburl = {https://dblp.org/rec/conf/nsyss/AzminI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/TariqLW20, author = {Shahroz Tariq and Sangyup Lee and Simon S. Woo}, editor = {Chih{-}Cheng Hung and Tom{\'{a}}s Cern{\'{y}} and Dongwan Shin and Alessio Bechini}, title = {CANTransfer: transfer learning based intrusion detection on a controller area network using convolutional {LSTM} network}, booktitle = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020}, pages = {1048--1055}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3341105.3373868}, doi = {10.1145/3341105.3373868}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/TariqLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sbrc/DAndradaAC20, author = {Lu{\'{\i}}s Felipe Prado D'Andrada and Paulo Freitas de Araujo{-}Filho and Divanilson R. Campelo}, editor = {Marcelo Gon{\c{c}}alves Rubinstein and Anelise Munaretto}, title = {A Real-time Anomaly-based Intrusion Detection System for Automotive Controller Area Networks}, booktitle = {{XXXVIII} Brazilian Symposium on Computer Networks and Distributed Systems, {SBRC} 2020, Rio de Janeiro, Brazil (virtual), December 7-10, 2020}, pages = {658--671}, year = {2020}, url = {https://doi.org/10.5753/sbrc.2020.12316}, doi = {10.5753/SBRC.2020.12316}, timestamp = {Tue, 18 Jan 2022 09:24:51 +0100}, biburl = {https://dblp.org/rec/conf/sbrc/DAndradaAC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcloud/CocorosSSC20, author = {Peter Cocoros and Matthew Sobocinski and Kyle Steiger and Joel Coffman}, title = {Evaluating Techniques for Practical Cloud-based Network Intrusion Detection}, booktitle = {{IEEE} International Conference on Smart Cloud, SmartCloud 2020, Washington, DC, USA, November 6-8, 2020}, pages = {62--67}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SmartCloud49737.2020.00020}, doi = {10.1109/SMARTCLOUD49737.2020.00020}, timestamp = {Thu, 03 Dec 2020 12:50:24 +0100}, biburl = {https://dblp.org/rec/conf/smartcloud/CocorosSSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/Liu20, author = {Ze Liu}, editor = {Guojun Wang and Bing Chen and Wei Li and Roberto Di Pietro and Xuefeng Yan and Hao Han}, title = {Reinforcement-Learning Based Network Intrusion Detection with Human Interaction in the Loop}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12382}, pages = {131--144}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68851-6\_9}, doi = {10.1007/978-3-030-68851-6\_9}, timestamp = {Fri, 05 Feb 2021 12:16:10 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/Liu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spde/HanCM20, author = {Mu Han and Pengzhou Cheng and Shidian Ma}, editor = {Shui Yu and Peter Mueller and Jiangbo Qian}, title = {CVNNs-IDS: Complex-Valued Neural Network Based In-Vehicle Intrusion Detection System}, booktitle = {Security and Privacy in Digital Economy - First International Conference, {SPDE} 2020, Quzhou, China, October 30 - November 1, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1268}, pages = {263--277}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-9129-7\_19}, doi = {10.1007/978-981-15-9129-7\_19}, timestamp = {Sun, 12 Nov 2023 02:16:41 +0100}, biburl = {https://dblp.org/rec/conf/spde/HanCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/svcc/SongFCP20, author = {Chungsik Song and Wenjun Fan and Sang{-}Yoon Chang and Younghee Park}, editor = {Younghee Park and Divyesh Jadav and Thomas H. Austin}, title = {Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity}, booktitle = {Silicon Valley Cybersecurity Conference - First Conference, {SVCC} 2020, San Jose, CA, USA, December 17-19, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1383}, pages = {169--187}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-72725-3\_13}, doi = {10.1007/978-3-030-72725-3\_13}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/svcc/SongFCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SchellK20, author = {Oleg Schell and Marcel Kneib}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {{VALID:} Voltage-Based Lightweight Intrusion Detection for the Controller Area Network}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {225--232}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00041}, doi = {10.1109/TRUSTCOM50675.2020.00041}, timestamp = {Fri, 30 Apr 2021 12:35:40 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SchellK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wicon/SarhanLMP20, author = {Mohanad Sarhan and Siamak Layeghy and Nour Moustafa and Marius Portmann}, editor = {Deze Zeng and Huan Huang and Rui Hou and Seungmin Rho and Naveen K. Chilamkurti}, title = {NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems}, booktitle = {Big Data Technologies and Applications - 10th {EAI} International Conference, {BDTA} 2020, and 13th {EAI} International Conference on Wireless Internet, WiCON 2020, Virtual Event, December 11, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {371}, pages = {117--135}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-72802-1\_9}, doi = {10.1007/978-3-030-72802-1\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wicon/SarhanLMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LiuKA20, author = {Jinxin Liu and Burak Kantarci and Carlisle Adams}, editor = {Ren{\'{e}} Mayrhofer and Michael Roland}, title = {Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to {NSL-KDD} dataset}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020}, pages = {25--30}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395352.3402621}, doi = {10.1145/3395352.3402621}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/LiuKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpmc/SuLZ20, author = {Bingying Su and Rongpeng Li and Honggang Zhang}, title = {Evolving Deep Convolutional Neural Network for Intrusion Detection Based on {NEAT}}, booktitle = {23rd International Symposium on Wireless Personal Multimedia Communications, {WPMC} 2020, Okayama, Japan, October 19-26, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/WPMC50192.2020.9309451}, doi = {10.1109/WPMC50192.2020.9309451}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpmc/SuLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/GullaVVK20, author = {Kishor Kumar Gulla and P. Viswanath and Suresh Babu Veluru and R. Raja Kumar}, editor = {Brij B. Gupta and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Dharma P. Agrawal and Deepak Gupta}, title = {Machine Learning Based Intrusion Detection Techniques}, booktitle = {Handbook of Computer Networks and Cyber Security, Principles and Paradigms}, pages = {873--888}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-22277-2\_35}, doi = {10.1007/978-3-030-22277-2\_35}, timestamp = {Sun, 12 Nov 2023 02:22:31 +0100}, biburl = {https://dblp.org/rec/books/sp/20/GullaVVK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/BlaiseSS20, author = {Agathe Blaise and Sandra Scott{-}Hayward and Stefano Secci}, editor = {Jacek Rak and David Hutchison}, title = {Scalable and Collaborative Intrusion Detection and Prevention Systems Based on {SDN} and {NFV}}, booktitle = {Guide to Disaster-Resilient Communication Networks}, series = {Computer Communications and Networks}, pages = {653--673}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44685-7\_26}, doi = {10.1007/978-3-030-44685-7\_26}, timestamp = {Thu, 22 Sep 2022 08:31:34 +0200}, biburl = {https://dblp.org/rec/series/ccn/BlaiseSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-08527, author = {Aritran Piplai and Sai Sree Laya Chukkapalli and Anupam Joshi}, title = {NAttack! Adversarial Attacks to bypass a {GAN} based classifier trained to detect Network intrusion}, journal = {CoRR}, volume = {abs/2002.08527}, year = {2020}, url = {https://arxiv.org/abs/2002.08527}, eprinttype = {arXiv}, eprint = {2002.08527}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-08527.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-07405, author = {Mubarak Albarka Umar and Zhanfang Chen and Yan Liu}, title = {Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection}, journal = {CoRR}, volume = {abs/2008.07405}, year = {2020}, url = {https://arxiv.org/abs/2008.07405}, eprinttype = {arXiv}, eprint = {2008.07405}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-07405.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-09011, author = {Mario Di Mauro and Giovanni Galatro and Antonio Liotta}, title = {Experimental Review of Neural-based approaches for Network Intrusion Management}, journal = {CoRR}, volume = {abs/2009.09011}, year = {2020}, url = {https://arxiv.org/abs/2009.09011}, eprinttype = {arXiv}, eprint = {2009.09011}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-09011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-10940, author = {Punam Bedi and Neha Gupta and Vinita Jindal}, title = {I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems}, journal = {CoRR}, volume = {abs/2009.10940}, year = {2020}, url = {https://arxiv.org/abs/2009.10940}, eprinttype = {arXiv}, eprint = {2009.10940}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-10940.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-11440, author = {Riadul Islam and Rafi Ud Daula Refat and Sai Manikanta Yerram and Hafiz Malik}, title = {Graph-Based Intrusion Detection System for Controller Area Networks}, journal = {CoRR}, volume = {abs/2009.11440}, year = {2020}, url = {https://arxiv.org/abs/2009.11440}, eprinttype = {arXiv}, eprint = {2009.11440}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-11440.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-09144, author = {Mohanad Sarhan and Siamak Layeghy and Nour Moustafa and Marius Portmann}, title = {NetFlow Datasets for Machine Learning-based Network Intrusion Detection Systems}, journal = {CoRR}, volume = {abs/2011.09144}, year = {2020}, url = {https://arxiv.org/abs/2011.09144}, eprinttype = {arXiv}, eprint = {2011.09144}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-09144.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-00476, title = {1D {CNN} Based Network Intrusion Detection with Normalization on Imbalanced Data}, journal = {CoRR}, volume = {abs/2003.00476}, year = {2020}, note = {Withdrawn.}, url = {https://arxiv.org/abs/2003.00476}, eprinttype = {arXiv}, eprint = {2003.00476}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-00476.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HeSHZHR19, author = {Haitao He and Xiaobing Sun and Hongdou He and Guyu Zhao and Ligang He and Jiadong Ren}, title = {A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection}, journal = {{IEEE} Access}, volume = {7}, pages = {183207--183221}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2959131}, doi = {10.1109/ACCESS.2019.2959131}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HeSHZHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NiaziF19, author = {Rumaisa Aimen Niazi and Yasir Faheem}, title = {A Bayesian Game-Theoretic Intrusion Detection System for Hypervisor-Based Software Defined Networks in Smart Grids}, journal = {{IEEE} Access}, volume = {7}, pages = {88656--88672}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2924968}, doi = {10.1109/ACCESS.2019.2924968}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/NiaziF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WeiLZHLL19, author = {Peng Wei and Yufeng Li and Zhen Zhang and Tao Hu and Ziyong Li and Diyang Liu}, title = {An Optimization Method for Intrusion Detection Classification Model Based on Deep Belief Network}, journal = {{IEEE} Access}, volume = {7}, pages = {87593--87605}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2925828}, doi = {10.1109/ACCESS.2019.2925828}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WeiLZHLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XiaoXZZ19, author = {Yihan Xiao and Cheng Xing and Taining Zhang and Zhongkai Zhao}, title = {An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks}, journal = {{IEEE} Access}, volume = {7}, pages = {42210--42219}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2904620}, doi = {10.1109/ACCESS.2019.2904620}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XiaoXZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangQY19, author = {Hongyu Yang and Geng Qin and Li Ye}, title = {Combined Wireless Network Intrusion Detection Model Based on Deep Learning}, journal = {{IEEE} Access}, volume = {7}, pages = {82624--82632}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2923814}, doi = {10.1109/ACCESS.2019.2923814}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YangQY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangW19c, author = {Hongyu Yang and Fengyan Wang}, title = {Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network}, journal = {{IEEE} Access}, volume = {7}, pages = {64366--64374}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2917299}, doi = {10.1109/ACCESS.2019.2917299}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YangW19c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangZLLZ19, author = {Aimin Yang and Yunxi Zhuansun and Chenshuai Liu and Jie Li and Chunying Zhang}, title = {Design of Intrusion Detection System for Internet of Things Based on Improved {BP} Neural Network}, journal = {{IEEE} Access}, volume = {7}, pages = {106043--106052}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2929919}, doi = {10.1109/ACCESS.2019.2929919}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YangZLLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZengGWG19, author = {Yi Zeng and Huaxi Gu and Wenting Wei and Yantao Guo}, title = {{\textdollar}Deep-Full-Range{\textdollar} : {A} Deep Learning Based Network Encrypted Traffic Classification and Intrusion Detection Framework}, journal = {{IEEE} Access}, volume = {7}, pages = {45182--45190}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2908225}, doi = {10.1109/ACCESS.2019.2908225}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZengGWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangCJWG19, author = {Yong Zhang and Xu Chen and Lei Jin and Xiaojuan Wang and Da Guo}, title = {Network Intrusion Detection: Based on Deep Hierarchical Network and Original Flow Data}, journal = {{IEEE} Access}, volume = {7}, pages = {37004--37016}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2905041}, doi = {10.1109/ACCESS.2019.2905041}, timestamp = {Sat, 07 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangCJWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangLW19, author = {Ying Zhang and Peisong Li and Xinheng Wang}, title = {Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network}, journal = {{IEEE} Access}, volume = {7}, pages = {31711--31722}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2903723}, doi = {10.1109/ACCESS.2019.2903723}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ajiips/FuKHS19, author = {Neng Fu and Nuerbiye Kamili and Yanhong Huang and Jianqi Shi}, title = {A Novel Deep Intrusion Detection Model Based On a Convolutional Neural Network}, journal = {Aust. J. Intell. Inf. Process. Syst.}, volume = {15}, number = {2}, pages = {52--59}, year = {2019}, url = {http://ajiips.com.au/papers/V15.2/v15n2\_56-63.pdf}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ajiips/FuKHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/LiangCZY19, author = {Junwei Liang and Jianyong Chen and Yingying Zhu and F. Richard Yu}, title = {A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position}, journal = {Appl. Soft Comput.}, volume = {75}, pages = {712--727}, year = {2019}, url = {https://doi.org/10.1016/j.asoc.2018.12.001}, doi = {10.1016/J.ASOC.2018.12.001}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/asc/LiangCZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/ElmasryAZ19, author = {Wisam Elmasry and Akhan Akbulut and Abdul Halim Zaim}, title = {Empirical study on multiclass classification-based network intrusion detection}, journal = {Comput. Intell.}, volume = {35}, number = {4}, pages = {919--954}, year = {2019}, url = {https://doi.org/10.1111/coin.12220}, doi = {10.1111/COIN.12220}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ci/ElmasryAZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/SubbarayaluSK19, author = {Venkatraman Subbarayalu and B. Surendiran and P. Arun Raj Kumar}, title = {Hybrid Network Intrusion Detection System for Smart Environments Based on Internet of Things}, journal = {Comput. J.}, volume = {62}, number = {12}, pages = {1822--1839}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxz082}, doi = {10.1093/COMJNL/BXZ082}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/SubbarayaluSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/BalaJC19, author = {K. Bala and Jothi Soundaram and A. Chandrasekar}, title = {An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis}, journal = {Clust. Comput.}, volume = {22}, number = {6}, pages = {15205--15212}, year = {2019}, url = {https://doi.org/10.1007/s10586-018-2545-9}, doi = {10.1007/S10586-018-2545-9}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/BalaJC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/BharathisindhuB19, author = {P. Bharathisindhu and S. Selva Brunda}, title = {An improved model based on genetic algorithm for detecting intrusion in mobile ad hoc network}, journal = {Clust. Comput.}, volume = {22}, number = {Suppl 1}, pages = {265--275}, year = {2019}, url = {https://doi.org/10.1007/s10586-018-1745-7}, doi = {10.1007/S10586-018-1745-7}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/BharathisindhuB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ZhangSWLGC19, author = {Kun Zhang and Chong Shen and Haifeng Wang and Zhuang Li and Qian Gao and Xiaoyan Chen}, title = {Cluster computing data mining based on massive intrusion interference constraints in hybrid networks}, journal = {Clust. Comput.}, volume = {22}, number = {Supplement}, pages = {7481--7489}, year = {2019}, url = {https://doi.org/10.1007/s10586-018-1780-4}, doi = {10.1007/S10586-018-1780-4}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/ZhangSWLGC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CostaPLMA19, author = {Kelton A. P. da Costa and Jo{\~{a}}o P. Papa and Celso O. Lisboa and Roberto Mu{\~{n}}oz and Victor Hugo C. de Albuquerque}, title = {Internet of Things: {A} survey on machine learning-based intrusion detection approaches}, journal = {Comput. Networks}, volume = {151}, pages = {147--157}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2019.01.023}, doi = {10.1016/J.COMNET.2019.01.023}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CostaPLMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BK19, author = {Selvakumar B and K. Muneeswaran}, title = {Firefly algorithm based feature selection for network intrusion detection}, journal = {Comput. Secur.}, volume = {81}, pages = {148--155}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2018.11.005}, doi = {10.1016/J.COSE.2018.11.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RingWSLH19, author = {Markus Ring and Sarah Wunderlich and Deniz Scheuring and Dieter Landes and Andreas Hotho}, title = {A survey of network-based intrusion detection data sets}, journal = {Comput. Secur.}, volume = {86}, pages = {147--167}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.06.005}, doi = {10.1016/J.COSE.2019.06.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RingWSLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/AzeezAMMD19, author = {Nureni Ayofe Azeez and Tolulope Jide Ayemobola and Sanjay Misra and Rytis Maskeliunas and Robertas Damasevicius}, title = {Network Intrusion Detection with a Hashing Based Apriori Algorithm Using Hadoop MapReduce}, journal = {Comput.}, volume = {8}, number = {4}, pages = {86}, year = {2019}, url = {https://doi.org/10.3390/computers8040086}, doi = {10.3390/COMPUTERS8040086}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/AzeezAMMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/DuanHT19, author = {Letian Duan and Dezhi Han and Qiuting Tian}, title = {Design of intrusion detection system based on improved ABC{\_}elite and {BP} neural networks}, journal = {Comput. Sci. Inf. Syst.}, volume = {16}, number = {3}, pages = {773--795}, year = {2019}, url = {https://doi.org/10.2298/CSIS181001026D}, doi = {10.2298/CSIS181001026D}, timestamp = {Mon, 11 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsis/DuanHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/ChaabouniMZSF19, author = {Nadia Chaabouni and Mohamed Mosbah and Akka Zemmari and Cyrille Sauvignac and Parvez Faruki}, title = {Network Intrusion Detection for IoT Security Based on Learning Techniques}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {21}, number = {3}, pages = {2671--2701}, year = {2019}, url = {https://doi.org/10.1109/COMST.2019.2896380}, doi = {10.1109/COMST.2019.2896380}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/ChaabouniMZSF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/LiuZ19a, author = {Yansong Liu and Li Zhu}, title = {A new intrusion detection and alarm correlation technology based on neural network}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2019}, pages = {109}, year = {2019}, url = {https://doi.org/10.1186/s13638-019-1419-z}, doi = {10.1186/S13638-019-1419-Z}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/LiuZ19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/evi/BenmessahelXCS19, author = {Ilyas Benmessahel and Kun Xie and Mouna Chellal and Thabo Semong}, title = {A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization}, journal = {Evol. Intell.}, volume = {12}, number = {2}, pages = {131--146}, year = {2019}, url = {https://doi.org/10.1007/s12065-019-00199-5}, doi = {10.1007/S12065-019-00199-5}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/evi/BenmessahelXCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ViegasSBN19, author = {Eduardo Viegas and Altair Olivo Santin and Alysson Bessani and Nuno Neves}, title = {BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks}, journal = {Future Gener. Comput. Syst.}, volume = {93}, pages = {473--485}, year = {2019}, url = {https://doi.org/10.1016/j.future.2018.09.051}, doi = {10.1016/J.FUTURE.2018.09.051}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ViegasSBN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ict-express/KanimozhiJ19, author = {V. Kanimozhi and T. Prem Jacob}, title = {Artificial Intelligence based Network Intrusion Detection with hyper-parameter optimization tuning on the realistic cyber dataset {CSE-CIC-IDS2018} using cloud computing}, journal = {{ICT} Express}, volume = {5}, number = {3}, pages = {211--214}, year = {2019}, url = {https://doi.org/10.1016/j.icte.2019.03.003}, doi = {10.1016/J.ICTE.2019.03.003}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ict-express/KanimozhiJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/JiaWW19, author = {Yang Jia and Meng Wang and Yagang Wang}, title = {Network intrusion detection algorithm based on deep neural network}, journal = {{IET} Inf. Secur.}, volume = {13}, number = {1}, pages = {48--53}, year = {2019}, url = {https://doi.org/10.1049/iet-ifs.2018.5258}, doi = {10.1049/IET-IFS.2018.5258}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/JiaWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaip/KukrejaDR19, author = {Deepika Kukreja and Sanjay K. Dhurandher and B. V. Ramana Reddy}, title = {Securing ad hoc networks using energy efficient and distributed trust-based intrusion detection system}, journal = {Int. J. Adv. Intell. Paradigms}, volume = {13}, number = {3/4}, pages = {430--448}, year = {2019}, url = {https://doi.org/10.1504/IJAIP.2019.101990}, doi = {10.1504/IJAIP.2019.101990}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaip/KukrejaDR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbidm/ManickamRC19, author = {M. Manickam and N. Ramaraj and C. Chellappan}, title = {A combined {PFCM} and recurrent neural network-based intrusion detection system for cloud environment}, journal = {Int. J. Bus. Intell. Data Min.}, volume = {14}, number = {4}, pages = {504--527}, year = {2019}, url = {https://doi.org/10.1504/IJBIDM.2019.099963}, doi = {10.1504/IJBIDM.2019.099963}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbidm/ManickamRC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccc/LinWGW19, author = {Tao Lin and Peng Wu and Fengmei Gao and Tianshu Wu}, title = {Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation}, journal = {Int. J. Comput. Commun. Control}, volume = {14}, number = {5}, pages = {660--671}, year = {2019}, url = {https://doi.org/10.15837/ijccc.2019.5.3629}, doi = {10.15837/IJCCC.2019.5.3629}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijccc/LinWGW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcia/MohammadiA19, author = {Shahriar Mohammadi and Fatemeh Amiri}, title = {An Efficient Hybrid Self-Learning Intrusion Detection System Based on Neural Networks}, journal = {Int. J. Comput. Intell. Appl.}, volume = {18}, number = {1}, pages = {1950001:1--1950001:19}, year = {2019}, url = {https://doi.org/10.1142/S1469026819500019}, doi = {10.1142/S1469026819500019}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcia/MohammadiA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnds/AdhanomM19, author = {Alemtsehay Adhanom and Henock M. Melaku}, title = {A hybrid behavioural-based cyber intrusion detection system}, journal = {Int. J. Commun. Networks Distributed Syst.}, volume = {23}, number = {4}, pages = {473--498}, year = {2019}, url = {https://doi.org/10.1504/IJCNDS.2019.102986}, doi = {10.1504/IJCNDS.2019.102986}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnds/AdhanomM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Chiba19, author = {Zouhair Chiba}, title = {New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3764}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Chiba19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/ChibaAMOR19, author = {Zouhair Chiba and Noreddine Abghour and Khalid Moussaid and Amina El Omri and Mohammed Rida}, title = {Intelligent and Improved Self-Adaptive Anomaly based Intrusion Detection System for Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {2}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/4144}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/ChibaAMOR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/SinghKNLK19, author = {Parminder Singh and Sujatha Krishnamoorthy and Anand Nayyar and Ashish Kumar Luhach and Avinash Kaur}, title = {Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system}, journal = {Int. J. Distributed Sens. Networks}, volume = {15}, number = {10}, year = {2019}, url = {https://doi.org/10.1177/1550147719883132}, doi = {10.1177/1550147719883132}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/SinghKNLK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/ZhouC19, author = {Peng Zhou and Wen{-}Kuang Chou}, title = {IBBO-LSSVM-based network anomaly intrusion detection}, journal = {Int. J. Embed. Syst.}, volume = {11}, number = {3}, pages = {352--362}, year = {2019}, url = {https://doi.org/10.1504/IJES.2019.099440}, doi = {10.1504/IJES.2019.099440}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/ZhouC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/PektasA19, author = {Abdurrahman Pektas and Tankut Acarman}, title = {A deep learning method to detect network intrusion through flow-based features}, journal = {Int. J. Netw. Manag.}, volume = {29}, number = {3}, year = {2019}, url = {https://doi.org/10.1002/nem.2050}, doi = {10.1002/NEM.2050}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/PektasA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/He19, author = {Yunbin He}, title = {Identification and Processing of Network Abnormal Events Based on Network Intrusion Detection Algorithm}, journal = {Int. J. Netw. Secur.}, volume = {21}, number = {1}, pages = {153--159}, year = {2019}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n1/ijns-2019-v21-n1-p153-159.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/He19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Zhang19, author = {Jinming Zhang}, title = {Detection of Network Protection Security Vulnerability Intrusion Based on Data Mining}, journal = {Int. J. Netw. Secur.}, volume = {21}, number = {6}, pages = {979--984}, year = {2019}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n6/ijns-2019-v21-n6-p979-984.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Zhang19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijprai/LuLHZZ19, author = {Jiazhong Lu and Xiaolei Liu and Teng Hu and Jianwei Zhang and Xiaosong Zhang}, title = {Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus}, journal = {Int. J. Pattern Recognit. Artif. Intell.}, volume = {33}, number = {14}, pages = {1955015:1--1955015:15}, year = {2019}, url = {https://doi.org/10.1142/S0218001419550152}, doi = {10.1142/S0218001419550152}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijprai/LuLHZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsinnov/SampathM19, author = {Nithya Sampath and M. Dinakaran}, title = {Flow Based Classification for Specification Based Intrusion Detection in Software Defined Networking: FlowClassify}, journal = {Int. J. Softw. Innov.}, volume = {7}, number = {2}, pages = {1--8}, year = {2019}, url = {https://doi.org/10.4018/IJSI.2019040101}, doi = {10.4018/IJSI.2019040101}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsinnov/SampathM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/Pandey19, author = {Sushant Kumar Pandey}, title = {An anomaly detection technique-based intrusion detection system for wireless sensor network}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {17}, number = {4}, pages = {323--333}, year = {2019}, url = {https://doi.org/10.1504/IJWMC.2019.103110}, doi = {10.1504/IJWMC.2019.103110}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/Pandey19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/XueTL19, author = {Yu Xue and Tao Tang and Alex X. Liu}, title = {Feedforward neural network based on ensemble evolutionary algorithm with self-adaptive strategy and parameter for intrusion detection}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {17}, number = {2}, pages = {202--211}, year = {2019}, url = {https://doi.org/10.1504/IJWMC.2019.10022941}, doi = {10.1504/IJWMC.2019.10022941}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/XueTL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/DeyYS19, author = {Saurabh Dey and Qiang Ye and Srinivas Sampalli}, title = {A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks}, journal = {Inf. Fusion}, volume = {49}, pages = {205--215}, year = {2019}, url = {https://doi.org/10.1016/j.inffus.2019.01.002}, doi = {10.1016/J.INFFUS.2019.01.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/inffus/DeyYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/XiaoX19, author = {Yuelei Xiao and Xing Xiao}, title = {An Intrusion Detection System Based on a Simplified Residual Network}, journal = {Inf.}, volume = {10}, number = {11}, pages = {356}, year = {2019}, url = {https://doi.org/10.3390/info10110356}, doi = {10.3390/INFO10110356}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/XiaoX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inis/TruongTNNT19, author = {Thu Huong Truong and Phuong Bac Ta and Quoc{-}Th{\^{o}}ng Nguyen and Huu Du Nguyen and Kim Phuc Tran}, title = {A data-driven approach for Network Intrusion Detection and Monitoring based on Kernel Null Space}, journal = {{EAI} Endorsed Trans. Ind. Networks Intell. Syst.}, volume = {6}, number = {20}, pages = {e1}, year = {2019}, url = {https://doi.org/10.4108/eai.13-6-2019.159801}, doi = {10.4108/EAI.13-6-2019.159801}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/inis/TruongTNNT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiZLZ19, author = {Jiaqi Li and Zhifeng Zhao and Rongpeng Li and Honggang Zhang}, title = {AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {2093--2102}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2883344}, doi = {10.1109/JIOT.2018.2883344}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiZLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/MoustafaTC19, author = {Nour Moustafa and Benjamin P. Turnbull and Kim{-}Kwang Raymond Choo}, title = {An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {3}, pages = {4815--4830}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2871719}, doi = {10.1109/JIOT.2018.2871719}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/MoustafaTC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HanZJDX19, author = {Lansheng Han and Man Zhou and Wenjing Jia and Zakaria Dalil and Xingbo Xu}, title = {Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model}, journal = {Inf. Sci.}, volume = {476}, pages = {491--504}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2018.06.017}, doi = {10.1016/J.INS.2018.06.017}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/HanZJDX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiK19, author = {Wenjuan Li and Lam For Kwok}, title = {Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: {A} further analysis}, journal = {J. Inf. Secur. Appl.}, volume = {47}, pages = {1--7}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.019}, doi = {10.1016/J.JISA.2019.03.019}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/WangG19, author = {Benyou Wang and Li Gu}, title = {Detection of Network Intrusion Threat Based on the Probabilistic Neural Network Model}, journal = {Inf. Technol. Control.}, volume = {48}, number = {4}, pages = {618--625}, year = {2019}, url = {https://doi.org/10.5755/j01.itc.48.4.24036}, doi = {10.5755/J01.ITC.48.4.24036}, timestamp = {Sun, 13 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itc/WangG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcnc/GhugarPBS19, author = {Umashankar Ghugar and Jayaram Pradhan and Sourav Kumar Bhoi and Rashmi Ranjan Sahoo}, title = {{LB-IDS:} Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System}, journal = {J. Comput. Networks Commun.}, volume = {2019}, pages = {2054298:1--2054298:13}, year = {2019}, url = {https://doi.org/10.1155/2019/2054298}, doi = {10.1155/2019/2054298}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcnc/GhugarPBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcnc/ThangP19, author = {Vu Viet Thang and Fedor F. Pashchenko}, title = {Multistage System-Based Machine Learning Techniques for Intrusion Detection in WiFi Network}, journal = {J. Comput. Networks Commun.}, volume = {2019}, pages = {4708201:1--4708201:13}, year = {2019}, url = {https://doi.org/10.1155/2019/4708201}, doi = {10.1155/2019/4708201}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcnc/ThangP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/LiuZL19, author = {Yansong Liu and Li Zhu and Feng Liu}, title = {Optimal design of hadoop intrusion detection system based on neural network boosting algorithms}, journal = {J. Intell. Fuzzy Syst.}, volume = {37}, number = {5}, pages = {6127--6138}, year = {2019}, url = {https://doi.org/10.3233/JIFS-179197}, doi = {10.3233/JIFS-179197}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/LiuZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/MaziniSM19, author = {Mehrnaz Mazini and Babak Shirazi and Iraj Mahdavi}, title = {Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {31}, number = {4}, pages = {541--553}, year = {2019}, url = {https://doi.org/10.1016/j.jksuci.2018.03.011}, doi = {10.1016/J.JKSUCI.2018.03.011}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/MaziniSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmmis/KimSC19, author = {Jiyeon Kim and Yulim Shin and EunJung Choi}, title = {An Intrusion Detection Model based on a Convolutional Neural Network}, journal = {J. Multim. Inf. Syst.}, volume = {6}, number = {4}, pages = {165--172}, year = {2019}, url = {https://doi.org/10.33851/jmis.2019.6.4.165}, doi = {10.33851/JMIS.2019.6.4.165}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmmis/KimSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/ZhangX19, author = {Ruirui Zhang and Xin Xiao}, title = {Intrusion Detection in Wireless Sensor Networks with an Improved {NSA} Based on Space Division}, journal = {J. Sensors}, volume = {2019}, pages = {5451263:1--5451263:20}, year = {2019}, url = {https://doi.org/10.1155/2019/5451263}, doi = {10.1155/2019/5451263}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/js/ZhangX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/DingWZLX19, author = {Hongwei Ding and Liang Wan and Kang Zhou and Tingyan Long and Zhuang Xin}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{28145}}{\unicode{24230}}{\unicode{21367}}{\unicode{31215}}{\unicode{31070}}{\unicode{32463}}{\unicode{32593}}{\unicode{32476}}{\unicode{30340}}{\unicode{20837}}{\unicode{20405}}{\unicode{26816}}{\unicode{27979}}{\unicode{30740}}{\unicode{31350}} (Study on Intrusion Detection Based on Deep Convolution Neural Network)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {46}, number = {10}, pages = {173--179}, year = {2019}, url = {https://doi.org/10.11896/jsjkx.180801429}, doi = {10.11896/JSJKX.180801429}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/DingWZLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/LiangMSY19, author = {Junwei Liang and Maode Ma and Muhammad Sadiq and Kai{-}Hau Yeung}, title = {A filter model for intrusion detection system in Vehicle Ad Hoc Networks: {A} hidden Markov methodology}, journal = {Knowl. Based Syst.}, volume = {163}, pages = {611--623}, year = {2019}, url = {https://doi.org/10.1016/j.knosys.2018.09.022}, doi = {10.1016/J.KNOSYS.2018.09.022}, timestamp = {Thu, 05 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/LiangMSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/LiuHZMTNG19, author = {Jinping Liu and Jiezhou He and Wuxia Zhang and Tianyu Ma and Zhaohui Tang and Jean Paul Niyoyita and Weihua Gui}, title = {ANID-SEoKELM: Adaptive network intrusion detection based on selective ensemble of kernel ELMs with random features}, journal = {Knowl. Based Syst.}, volume = {177}, pages = {104--116}, year = {2019}, url = {https://doi.org/10.1016/j.knosys.2019.04.008}, doi = {10.1016/J.KNOSYS.2019.04.008}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/LiuHZMTNG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/ZhouLDSWT19, author = {Mu Zhou and Yaoping Li and Zhian Deng and Yongliang Sun and Yanmeng Wang and Zengshan Tian}, title = {Indoor Target Intrusion Detection via Iterative Transfer Learning Based Cognitive Sensing}, journal = {Mob. Networks Appl.}, volume = {24}, number = {6}, pages = {2002--2013}, year = {2019}, url = {https://doi.org/10.1007/s11036-019-01335-2}, doi = {10.1007/S11036-019-01335-2}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/ZhouLDSWT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pnc/ShangZLYZ19, author = {Fengjun Shang and Dan Zhou and Cheng Li and Han{-}Yun Yeh and Yuting Zhao}, title = {Research on the intrusion detection model based on improved cumulative summation and evidence theory for wireless sensor network}, journal = {Photonic Netw. Commun.}, volume = {37}, number = {2}, pages = {212--223}, year = {2019}, url = {https://doi.org/10.1007/s11107-018-0810-8}, doi = {10.1007/S11107-018-0810-8}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pnc/ShangZLYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/SultanaCPA19, author = {Nasrin Sultana and Naveen K. Chilamkurti and Wei Peng and Rabei Alhadad}, title = {Survey on {SDN} based network intrusion detection system using machine learning approaches}, journal = {Peer-to-Peer Netw. Appl.}, volume = {12}, number = {2}, pages = {493--501}, year = {2019}, url = {https://doi.org/10.1007/s12083-017-0630-0}, doi = {10.1007/S12083-017-0630-0}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/SultanaCPA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Albahar19, author = {Marwan Ali Albahar}, title = {Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in {SDN} Environments}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8939041:1--8939041:9}, year = {2019}, url = {https://doi.org/10.1155/2019/8939041}, doi = {10.1155/2019/8939041}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Albahar19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChuLL19, author = {Ankang Chu and Yingxu Lai and Jing Liu}, title = {Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6757685:1--6757685:11}, year = {2019}, url = {https://doi.org/10.1155/2019/6757685}, doi = {10.1155/2019/6757685}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChuLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/IraqiB19, author = {Omar Iraqi and Hanan El Bakkali}, title = {Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8368473:1--8368473:13}, year = {2019}, url = {https://doi.org/10.1155/2019/8368473}, doi = {10.1155/2019/8368473}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/IraqiB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RenGWYXJ19, author = {Jiadong Ren and Jiawei Guo and Qian Wang and Yuan Huang and Hao Xiaobing and Hu Jingjing}, title = {Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7130868:1--7130868:11}, year = {2019}, url = {https://doi.org/10.1155/2019/7130868}, doi = {10.1155/2019/7130868}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RenGWYXJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShenZC19, author = {Zhidong Shen and Yuhao Zhang and Weiying Chen}, title = {A Bayesian Classification Intrusion Detection Method Based on the Fusion of {PCA} and {LDA}}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6346708:1--6346708:11}, year = {2019}, url = {https://doi.org/10.1155/2019/6346708}, doi = {10.1155/2019/6346708}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShenZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShenZWY19, author = {Yanping Shen and Kangfeng Zheng and Chunhua Wu and Yixian Yang}, title = {A Neighbor Prototype Selection Method Based on {CCHPSO} for Intrusion Detection}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1283495:1--1283495:9}, year = {2019}, url = {https://doi.org/10.1155/2019/1283495}, doi = {10.1155/2019/1283495}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShenZWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AlqahtaniGMI19, author = {Mnahi Alqahtani and Abdu Gumaei and Hassan Mathkour and Mohamed Maher Ben Ismail}, title = {A Genetic-Based Extreme Gradient Boosting Model for Detecting Intrusions in Wireless Sensor Networks}, journal = {Sensors}, volume = {19}, number = {20}, pages = {4383}, year = {2019}, url = {https://doi.org/10.3390/s19204383}, doi = {10.3390/S19204383}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AlqahtaniGMI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/TanSHGZSL19, author = {Xiaopeng Tan and Shaojing Su and Zhiping Huang and Xiaojun Guo and Zhen Zuo and Xiaoyong Sun and Longqing Li}, title = {Wireless Sensor Networks Intrusion Detection Based on {SMOTE} and the Random Forest Algorithm}, journal = {Sensors}, volume = {19}, number = {1}, pages = {203}, year = {2019}, url = {https://doi.org/10.3390/s19010203}, doi = {10.3390/S19010203}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/TanSHGZSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/TanSZGS19, author = {Xiaopeng Tan and Shaojing Su and Zhen Zuo and Xiaojun Guo and Xiaoyong Sun}, title = {Intrusion Detection of UAVs Based on the Deep Belief Network Optimized by {PSO}}, journal = {Sensors}, volume = {19}, number = {24}, pages = {5529}, year = {2019}, url = {https://doi.org/10.3390/s19245529}, doi = {10.3390/S19245529}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/TanSZGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HomoliakTOBHH19, author = {Ivan Homoliak and Martin Teknos and Mart{\'{\i}}n Ochoa and Dominik Breitenbacher and Saeid Hosseini and Petr Han{\'{a}}cek}, title = {Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {17}, pages = {e4}, year = {2019}, url = {https://doi.org/10.4108/eai.10-1-2019.156245}, doi = {10.4108/EAI.10-1-2019.156245}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/HomoliakTOBHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/KhanKK19, author = {Muhammad Ashfaq Khan and Md. Rezaul Karim and Yangwoo Kim}, title = {A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network}, journal = {Symmetry}, volume = {11}, number = {4}, pages = {583}, year = {2019}, url = {https://doi.org/10.3390/sym11040583}, doi = {10.3390/SYM11040583}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/KhanKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/Ye19, author = {Kai Ye}, title = {Key Feature Recognition Algorithm of Network Intrusion Signal Based on Neural Network and Support Vector Machine}, journal = {Symmetry}, volume = {11}, number = {3}, pages = {380}, year = {2019}, url = {https://doi.org/10.3390/sym11030380}, doi = {10.3390/SYM11030380}, timestamp = {Tue, 16 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/Ye19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/PajouhJKDC19, author = {Hamed Haddad Pajouh and Reza Javidan and Raouf Khayami and Ali Dehghantanha and Kim{-}Kwang Raymond Choo}, title = {A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {7}, number = {2}, pages = {314--323}, year = {2019}, url = {https://doi.org/10.1109/TETC.2016.2633228}, doi = {10.1109/TETC.2016.2633228}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/PajouhJKDC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YingSCBP19, author = {Xuhang Ying and Sang Uk Sagong and Andrew Clark and Linda Bushnell and Radha Poovendran}, title = {Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {9}, pages = {2300--2314}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2895957}, doi = {10.1109/TIFS.2019.2895957}, timestamp = {Tue, 06 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YingSCBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.