
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XV, Issue I, January 2026
www.ijltemas.in Page 778
jas.net/article/id/979c0935-23fb-4117-9b2d-05b925510504?viewType=HTML&pageType=en
[Retrieved on: 17.10.2025]
8. Pooja, T.S. and Shrinivasacharya, P., 2021. Evaluating neural networks using Bi-Directional LSTM
for network IDS (intrusion detection systems) in cyber security. Global Transitions Proceedings,
2(2), pp.448-454. Retrieved
from :https://www.sciencedirect.com/science/article/pii/S2666285X21000455 [Retrieved on:
17.10.2025]
9. Pinto, A., Herrera, L.C., Donoso, Y. and Gutierrez, J.A., 2023. Survey on intrusion detection
systems based on machine learning techniques for the protection of critical infrastructure. Sensors,
23(5), p.2415. Retrieved from : https://www.mdpi.com/1424-8220/23/5/2415 [Retrieved on:
17.10.2025]
10. Akgun, D., Hizal, S. and Cavusoglu, U., 2022. A new DDoS attacks intrusion detection model based
on deep learning for cybersecurity. Computers & Security, 118, p.102748.Retrieved from :
https://acikerisim.subu.edu.tr/yayinaea/
e0e6b57a78ff79e0cd36be2cc6723cb1180586827201979da083b805bd24871c111.pdf [Retrieved on:
17.10.2025]
11. Pascale, F., Adinolfi, E.A., Coppola, S. and Santonicola, E., 2021. Cybersecurity in automotive: An
intrusion detection system in connected vehicles. Electronics, 10(15), p.1765. Retrieved from :
https://www.mdpi.com/2079-9292/10/15/1765 [Retrieved on: 17.10.2025]
12. Satilmiş, H., Akleylek, S. and Tok, Z.Y., 2024. A systematic literature review on host-based
intrusion detection systems. Ieee Access, 12, pp.27237-27266. Retrieved
from :https://ieeexplore.ieee.org/iel7/6287639/10380310/10439152.pdf [Retrieved on: 17.10.2025]
13. Dash, B., Ansari, M.F., Sharma, P. and Ali, A., 2022. Threats and opportunities with AI-based cyber
security intrusion detection: a review. International Journal of Software Engineering & Applications
(IJSEA), 13(5). Retrieved from :https://www.mdpi.com/1999-5903/15/2/62 [Retrieved on:
17.10.2025]
14. Apruzzese, G., Andreolini, M., Ferretti, L., Marchetti, M. and Colajanni, M., 2022. Modeling
realistic adversarial attacks against network intrusion detection systems. Digital Threats: Research
and Practice (DTRAP), 3(3), pp.1-19. Retrieved
from :https://scholar.google.com/scholar?output=instlink&q=info:YAyTMuflFQ4J:
scholar.google.com/ &hl= en&as_sdt=0,5&as_ylo=2021&scillfp=12045959072546234233&oi=lle
[Retrieved on: 17.10.2025]
15. Alsirhani, A., Alshahrani, M.M., Hassan, A.M., Taloba, A.I., Abd El-Aziz, R.M. and Samak, A.H.,
2023. Implementation of African vulture optimization algorithm based on deep learning for
cybersecurity intrusion detection. Alexandria Engineering Journal, 79, pp.105-115.Retrieved
from:https://www.sciencedirect.com/science/article/pii/S1110016823006671[Retrieved on:
17.10.2025]
16. Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A. and Anwar, A., 2020. TON_IoT telemetry dataset:
A new generation dataset of IoT and IIoT for data-driven intrusion detection systems. Ieee Access, 8,
pp.165130-165150.Retrieved
from:https://ieeexplore.ieee.org/iel7/6287639/8948470/09189760.pdf[Retrieved on: 17.10.2025]
17. Kandhro, I.A., Alanazi, S.M., Ali, F., Kehar, A., Fatima, K., Uddin, M. and Karuppayah, S., 2023.
Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity
infrastructures. IEEE Access, 11, pp.9136-9148.Retrieved
from:https://ieeexplore.ieee.org/iel7/6287639/6514899/10023499.pdf[Retrieved on: 17.10.2025]
18. Yadulla, A.R., Kasula, V.K., Yenugula, M. and Konda, B., 2023. Enhancing Cybersecurity with AI:
Implementing a Deep Learning-Based Intrusion Detection System Using Convolutional Neural
Networks. European Journal of Advances in Engineering and Technology, 10(12), pp.89-
98.Retrieved from:
https://www.researchgate.net/profile/Vinay-Kumar-
Kasula/publication/385214025_Enhancing_Cybersecurity_with_AI_Implementing_a_Deep_Learnin