Hajj et al., 2021
| Publication | Publication Date | Title |
|---|---|---|
| Hajj et al. | Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets | |
| Ozkan-Okay et al. | A comprehensive systematic literature review on intrusion detection systems | |
| Santhosh Kumar et al. | A comprehensive survey on machine learning‐based intrusion detection systems for secure communication in internet of things | |
| Fernandes Jr et al. | A comprehensive survey on network anomaly detection | |
| US12225045B2 (en) | Incorporating software-as-a-service data into a cyber threat defense system | |
| Wani et al. | SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL) | |
| Bijone | A survey on secure network: intrusion detection & prevention approaches | |
| Bhuyan et al. | Network anomaly detection: methods, systems and tools | |
| Manhas et al. | Implementation of intrusion detection system for internet of things using machine learning techniques | |
| Repalle et al. | Intrusion detection system using ai and machine learning algorithm | |
| Kumar et al. | Intrusion detection systems: a review | |
| Deka et al. | Network defense: Approaches, methods and techniques | |
| Min | An analysis of K-means algorithm based network intrusion detection system | |
| Thomas | Improving intrusion detection for imbalanced network traffic | |
| Wang | Big data in intrusion detection systems and intrusion prevention systems | |
| Möller | Intrusion detection and prevention | |
| Shankar et al. | Deep analysis of risks and recent trends towards network intrusion detection system | |
| Bhardwaj et al. | Detection of cyber attacks: Xss, sqli, phishing attacks and detecting intrusion using machine learning algorithms | |
| Razak | A study on IDS for preventing Denial of Service attack using outliers techniques | |
| Walling et al. | A survey on intrusion detection systems: Types, datasets, machine learning methods for NIDS and challenges | |
| Andreas et al. | Flow-based and packet-based intrusion detection using BLSTM | |
| Subramani et al. | Comprehensive review on distributed denial of service attacks in wireless sensor networks | |
| Bhati et al. | A comprehensive study of intrusion detection and prevention systems | |
| Stiawan et al. | Characterizing network intrusion prevention system | |
| Suresh et al. | Detection of malicious activities by AI-Supported Anomaly-Based IDS |