Author:
Oueslati Nour Elhouda,Mrabet Hichem,Jemai Abderrazak
Publisher
Springer Nature Switzerland
Reference36 articles.
1. Ghumro, A., Memon, A.K., Memon, I., Simming, I.A.: A review of mitigation of attacks in IoT using deep learning models. Quaid-E-Awam Univ. Res. J. Eng. Sci. Technol. Nawabshah. 18(1), 36–42 (2020)
2. Rodriguez, E., Otero, B., Gutierrez, N., Canal, R.: A survey of deep learning techniques for cybersecurity in mobile networks. IEEE Commun. Surv. Tutorials 23(3), 1920–1955 (2021)
3. Altunay, H.C., Albayrak, Z.: A hybrid CNN+ LSTMbased intrusion detection system for industrial IoT networks. Eng. Sci. Technol. Int. J. 38, 101322 (2023)
4. Wang, Y.C., Houng, Y.C., Chen, H.X., Tseng, S.M.: Network anomaly intrusion detection based on deep learning approach. Sensors 23(4), 2171 (2023)
5. Alabadi, M., Celik, Y.: Anomaly detection for cyber-security based on convolution neural network: A survey. In: International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1–14. IEEE (2020)