Kumar et al., 2017
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Khraisat et al. | A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges | |
| Wani et al. | SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL) | |
| Alshamrani et al. | A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities | |
| Kumar et al. | Intrusion detection systems: a review | |
| Hajj et al. | Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets | |
| Bijone | A survey on secure network: intrusion detection & prevention approaches | |
| Bagui et al. | Using machine learning techniques to identify rare cyber‐attacks on the UNSW‐NB15 dataset | |
| Moustafa | Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic | |
| Thomas | Improving intrusion detection for imbalanced network traffic | |
| Chen et al. | Intrusion detection | |
| Krishnapriya et al. | A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques. | |
| Möller | Intrusion detection and prevention | |
| Suhag et al. | Study of statistical techniques and artificial intelligence methods in distributed denial of service (DDOS) assault and defense | |
| Sfetcu | Advanced persistent threats in cybersecurity–Cyber warfare | |
| Chaitanya et al. | Security and Privacy in Wireless Sensor Networks Using Intrusion Detection Models to Detect DDOS and Drdos Attacks: A Survey | |
| Alauthman | An efficient approach to online bot detection based on a reinforcement learning technique | |
| Borisenko et al. | How the CSE-CIC-IDS2018 Dataset is Related to the MITRE Matrix | |
| Hagar et al. | Big data analytic using machine learning algorithms for intrusion detection system: A survey | |
| Ali et al. | Behavior analysis of machine learning algorithms for botnets detection | |
| Baazeem | Cybersecurity: BotNet Threat Detection Across the Seven-Layer ISO-OSI Model Using Machine Learning Techniques | |
| Möller | Intrusion detection and prevention | |
| Chablani et al. | Analysis of Cyber Defense mechanisms using honeypots in Cloud Environment | |
| Giri et al. | Intrusion detection system for local networks–A review study | |
| Petersen | Detecting network intrusions | |
| Mahfouz | Towards a Holistic Efficient Stacking Ensemble Intrusion Detection System Using Newly Generated Heterogeneous Datasets |