[1] Tan L.,Pan Y.,Wu J.,Zhou J.,Jiang H.,Deng Y. .2020 .A new framework for DDoS attack detection and defense in SDN environment. ” IEEE Access, 8 : 161908-161919.
[2] Ye J.,Zhu L.,Feng L. .2018 .A DDoS attack detection method based on SVM in software defined network,” Security and Communication Networks. , : .
[3] Perez-Diaz J. A.,Valdovinos I. A.,K. K. R. Choo D.,Zhu D. .2020 .A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. ” IEEE Access, 8 : 155859-155872.
[4] Habibi O.,Chemmakha M.,Lazaar M. .2023 .Imbalanced tabular data modelization using CTGAN and machine learning to improve IoT Botnet attacks detection. ” Engineering Applications of Artificial Intelligence, 118 : 105669.
[5] Ilango H. S.,Su R. .2022 .A feedforward-convolutional neural network to detect low-rate dos in IoT. Engineering Applications of Artificial Intelligence, 114 : 105059.
[6] Rao K. N.,Rao K. V.,P. R. PVGD K. V. .2021 .A hybrid intrusion detection system based on sparse autoencoder and deep neural network,” Computer Communications. , 180 : 77-88.
[7] Nguyen H. T.,Ngo Q. D.,Nguyen D. H.,Le V. H. .2020 .PSI-rooted subgraph: A novel feature for IoT botnet detection using classifier algorithms. ” ICT Express, 6(2) : 128-138.
[8] Meidan Y.,Bohadana M.,Mathov Y.,Mirsky Y.,Shabtai A.,Breitenbacher D.,Elovici Y. .2018 .N-baiotnetwork-based detection of IoT botnet attacks using deep autoencoders,” IEEE Pervasive Computing. , 17(3) : 12-22.
[9] Al Shorman A.,Faris H.,and I. Aljarah H. .2020 .Unsupervised intelligent system based on one class support vector machine and grey wolf optimization for IoT botnet detection. ” Journal of Ambient Intelligence and Humanized Computing, 11(7) : 2809-2825.
[10] Saba T.,Rehman A.,Sadad T.,Kolivand H.,Bahaj S. A. .2022 .Anomaly-based intrusion detection system for IoT networks through deep learning model,” Computers and Electrical Engineering. , 99 : 107810.
[11] Elsayed M. S.,Le-Khac N. A.,Dev S.,Jurcut A. D. .2020 .Ddosnet: A deep-learning model for detecting network attacks,” in 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). Aug, : 391-396.
[12] Sahoo K. S.,Tripathy B. K.,Naik K.,Ramasubbareddy S.,Balusamy B.,Khari M.,Burgos D. .2020 .An evolutionary SVM model for DDOS attack detection in software defined networks. ” IEEE Access, 8 : 132502-132513.
[13] Ahmed A. A.,Jabbar W. A.,Sadiq A. S.,Patel H. .2022 .Deep learning-based classification model for botnet attack detection. ” Journal of Ambient Intelligence and Humanized Computing, 13(7) : 3457-3466.
[14] G. D. L. T. Parra P.,Rad P.,K. K. R. Choo N.,Beebe N. .2020 .Detecting Internet of Things attacks using distributed deep learning. ” Journal of Network and Computer Applications, 163 : 102662.
[15] Su T.,Sun H.,Zhu J.,Wang S.,Li Y. .2020 .Deep learning methods on network intrusion detection using NSL-KDD dataset. ” IEEE Access, 8 : 29575-29585.
[16] Gamage S.,Samarabandu J. .2020 .Deep learning methods in network intrusion detection: A survey and an objective comparison. ” Journal of Network and Computer Applications, 169 : 102767.
[17] Robberts C.,Toft J. .2019 .Finding vulnerabilities in IoT devices: Ethical hacking of electronic locks,” School of Electrical Engineering. , : .
[18] Aldweesh A.,Derhab A.,Emam A. Z. .2020 .Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues,” Knowledge-Based Systems. , 189 : 105124.
[19] Ferrag M. A.,Maglaras L.,Moschoyiannis S.,Janicke H. .2020 .Deep learning for cyber security intrusion detection: Approaches, datasets. ” Journal of Information Security and Applications, 50 : 102419.
[20] Ge M.,Fu X.,Syed N.,Baig Z.,G. Z.,Robles-Kelly A. .2019 .Deep learning-based intrusion detection for IoT networks,” in 2019 IEEE 24th pacific rim international symposium on dependable computing (PRDC). , : 256-25609.
[21] M. M. Hassan A.,Gumaei A.,Alsanad M.,Alrubaian M. .2020 .A hybrid deep learning model for efficient intrusion detection in big data environment,”. Information Sciences, 513 : 386-396.
[22] Li D.,Deng L.,Lee M.,Wang H. .2019 .IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. International journal of information management, 49 : 533-545.
[23] Yin C.,Zhang S.,Wang J.,Xiong N. N. . .Anomaly detection based on convolutional recurrent autoencoder for IoT time series. ” IEEE Transactions on Systems, Man, and Cybernetics: Systems, 52(1) : 112-122.
[24] Wang B.,Su Y.,Zhang M.,Nie J. .2020 .A deep hierarchical network for packet-level malicious traffic detection. ” IEEE Access, 8 : 201728-201740.
[25] Yang H.,Wang F. .2019 .Wireless network intrusion detection based on improved convolutional neural network,” IEEE Access. , 7 : 64366-64374.
[26] Otoum Y.,Liu D.,Nayak A. .2022 .DL-IDS: A deep learning-based intrusion detection framework for securing IoT,” Transactions on Emerging Telecommunications Technologies. , 33(3) : e3803.
[27] Li Y.,Xu Y.,Liu Z.,Hou H.,Zheng Y.,Xin Y.,Zhao Y.,Cui L. .2020 .Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. , 154 : 107450.
[28] Kunang Y. N.,Nurmaini S.,Stiawan D.,Suprapto B. Y. .2021 .Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. ” Journal of Information Security and Applications, 58 : 102804.
[29] Sherubha P.,Sasirekha S. P.,Manikandan V.,Gowsic K.,Mohanasundaram N. .2020 .Graph based event measurement for analyzing distributed anomalies in sensor networks. ” Sādhanā, 45 : 1-5.
[30] Sherubha P.,Mohanasundaram N. .2019 .An efficient network threat detection and classification method using ANP-MVPS algorithm in wireless sensor networks. International Journal of Innovative Technology and Exploring Engineering, 8(11) : 1597-1606.
[31] Sherubha P.,Mohanasundaram N. .2019 .An efficient intrusion detection and authentication mechanism for detecting clone attack in wireless sensor networks. ” J Adv Res Dyn Control Syst, 11(5) : 55-68.
[32] Gamage S.,Samarabandu J. .2020 .Deep learning methods in network intrusion detection: A survey and an objective comparison. ” Journal of Network and Computer Applications, 169 : 102767.
[33] Rieth C. A.,Amsel B. D.,Tran R.,M. B. Cook R. .2018 .Issues and advances in anomaly detection evaluation for joint human-automated systems. Advances in Human Factors in Robots and Unmanned Systems: Proceedings of the AHFE 2017 International Conference on Human Factors in Robots and Unmanned Systems, July 17− 21, : 52-63.
[34] Men J.,Lv Z.,Zhou X.,Han Z.,Xian H.,Song Y. N. .2020 .Machine learning methods for industrial protocol security analysis: Issues, taxonomy. ” IEEE Access, 8 : 83842-83857.
[35] Weng T. W.,Zhang H.,Yi J.,Su D.,Gao Y.,Hsieh C. J. .1801 .Evaluating the robustness of neural networks: An extreme value theory approach. , 10578 : .