Open Access
Issue
ITM Web Conf.
Volume 78, 2025
International Conference on Computer Science and Electronic Information Technology (CSEIT 2025)
Article Number 03020
Number of page(s) 9
Section Intelligent Systems and Computing in Industry, Robotics, and Smart Infrastructure
DOI https://doi.org/10.1051/itmconf/20257803020
Published online 08 September 2025
  1. Hammad A.A., Ahmed S.R., Abdul-Hussein M.K., Ahmed M.R., Majeed D.A., Algburi S.: 'Deep reinforcement learning for adaptive cyber defense in network security'. Proc. Cognitive Models and Artificial Intelligence Conf., 2024, pp. 292–297 [Google Scholar]
  2. Tariq Z.U.A., Baccour E., Erbad A., Guizani M., Hamdi M.: 'Network intrusion detection for smart infrastructure using multi-armed bandit based reinforcement learning in adversarial environment'. Proc. Int. Conf. Cyber Warfare and Security (ICCWS), 2022, pp. 75–82 [Google Scholar]
  3. Alqahtani H., Sarker I.H., Kalim A., Minhaz Hossain S.M., Ikhlaq S., Hossain S.: 'Cyber intrusion detection using machine learning classification techniques'. Proc. Int. Conf. Computing Science, Communication and Security (COMS2), Gujarat, India, 2020, pp. 121–131 [Google Scholar]
  4. Saranya T., Sridevi S., Deisy C., Chung T.D., Khan M.A.: 'Performance analysis of machine learning algorithms in intrusion detection system: A review', Procedia Computer Science, 2020, 171, pp. 1251–1260 [Google Scholar]
  5. Resende P.A.A., Drummond A.C.: 'A survey of random forest based methods for intrusion detection systems', ACM Computing Surveys (CSUR), 2018, 51, (3), pp. 1–36 [Google Scholar]
  6. Li W., Yi P., Wu Y., Pan L., Li J.: 'A new intrusion detection system based on KNN classification algorithm in wireless sensor network', Journal of Electrical and Computer Engineering, 2014, 2014, (1), 240217 [Google Scholar]
  7. Putrada A.G., Alamsyah N., Pane S.F., Fauzan M.N.: 'XGBoost for IDS on WSN cyber attacks with imbalanced data'. Proc. Int. Symp. Electronics and Smart Devices (ISESD), 2022, pp. 1–7 [Google Scholar]
  8. Gutierrez M.P., Kiekintveld C.: 'Bandits for cybersecurity: Adaptive intrusion detection using honeypots'. Proc. AAAI Workshop: Artificial Intelligence for Cyber Security, 2016 [Google Scholar]
  9. Yu K., Nguyen K., Park Y.: 'Flexible and robust real-time intrusion detection systems to network dynamics', IEEE Access, 2022, 10, pp. 98959–98969 [CrossRef] [Google Scholar]
  10. Mahajan A., Teneketzis D.: 'Multi-armed bandit problems'. In: Foundations and Applications of Sensor Management, 2008, pp. 121–151 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.