[1] Guezzaz A., Benkirane S., Azrour M., and Khurram S., 2021. A reliable network intrusion detection approach using decision tree with enhanced data quality.Security and Communication Networks, 2021(1), 1230593 [2] Patel A., Taghavi M., Bakhtiyari K., and Júnior J.C., 2013. An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications,36(1), pp. 25-41. [3] Khraisat A., and Alazab A., 2021. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges.Cybersecurity, 4, pp.1-27. [4] Srivastava A., Gupta S., Quamara M., Chaudhary P., and Aski V.J., 2020. Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects.International Journal of Communication Systems, 33(12), e4443. [5] Asharf J., Moustafa N., Khurshid H., Debie E., Haider W., and Wahab A., 2020. A review of intrusion detection systems using machine and deep learning in internet of things: challenges, solutions and future directions.Electronics, 9(7), 1177. [6] Zarpelão B.B., Miani R.S., Kawakani C.T., and De Alvarenga S.C., 2017. A survey of intrusion detection in Internet of Things.Journal of Network and Computer Applications, 84, pp. 25-37. [7] Chaabouni N., Mosbah M., Zemmari A., Sauvignac C., and Faruki P., 2019. Network intrusion detection for IoT security based on learning techniques. IEEE Communications Surveys & Tutorials,21(3), pp. 2671-2701. [8] Elrawy M.F., Awad A.I., and Hamed H.F., 2018. Intrusion detection systems for IoT-based smart environments: a survey. Journal of Cloud Computing,7(1), pp. 1-20. [9] Tama B.A., and Rhee K.H., 2017. Attack classification analysis of IoT network via deep learning approach.Research Briefs on Information and Communication Technology Evolution, 3, pp. 150-158. [10] Verma A., and Ranga V., 2020. Machine learning based intrusion detection systems for IoT applications. Wireless Personal Communications,111(4), pp. 2287-2310. [11] Musleh D., Alotaibi M., Alhaidari F., Rahman A., and Mohammad R.M., 2023. Intrusion detection system using feature extraction with machine learning algorithms in IoT.Journal of Sensor and Actuator Networks, 12(2), 29. [12] Basheer Ahmed M.I., Zaghdoud R., Ahmed M.S., Sendi R., Alsharif S., Alabdulkarim J., Albin Saad B.A., Alsabt R., Rahman A., and Krishnasamy G., 2023. A real-time computer vision based approach to detection and classification of traffic incidents.Big Data and Cognitive Computing, 7(1), 22. [13] Alghamdi A.S., and Rahman A., 2023. Data mining approach to predict success of secondary school students: A Saudi Arabian case study.Education Sciences, 13(3), 293. [14] Cao Z., Qin Y., Jia L., Xie Z., Gao Y., Wang Y., Li P., and Yu Z., 2024. Railway intrusion detection based on machine vision: a survey, challenges, and perspectives.IEEE Transactions on Intelligent Transportation Systems. [15] Lee J., Woo S., and Lee Y., 2024. A practical method for identifying ECUs using differential voltage.IEEE Access. [16] Mudraje I., Herfet T., Quint C.D., Gao H., and Hartmann U., 2024. Design of an autonomous intrusion classification device for FIDS robustness.IEEE Access. [17] Kong X., Zhou Y., Xiao Y., Ye X., Qi H., and Liu X., 2024. iDetector: A novel real-time intrusion detection solution for IoT networks.IEEE Internet of Things Journal. |