2021
DOI: 10.1007/978-3-030-70713-2_60
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Intrusion Detection Systems in IoT Using Deep Learning Techniques: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 40 publications
0
1
0
Order By: Relevance
“…In reference [5], from the perspective of the unavailability of some network services under intrusion attacks, impact factors are selected to evaluate the network tolerance to the intrusion of key power systems. Literature [6] used the basic principle of deep learning to model and evaluate the tolerance of network intrusion detection system. In addition, by using KNN, random forest, support vector machine, deep belief network and other classifiers, the evaluation effect of intrusion tolerance can also be improved by identifying intrusion features.…”
Section: Introductionmentioning
confidence: 99%
“…In reference [5], from the perspective of the unavailability of some network services under intrusion attacks, impact factors are selected to evaluate the network tolerance to the intrusion of key power systems. Literature [6] used the basic principle of deep learning to model and evaluate the tolerance of network intrusion detection system. In addition, by using KNN, random forest, support vector machine, deep belief network and other classifiers, the evaluation effect of intrusion tolerance can also be improved by identifying intrusion features.…”
Section: Introductionmentioning
confidence: 99%