Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/27256
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zebin, T | - |
dc.contributor.author | Rezvy, S | - |
dc.contributor.author | Luo, Y | - |
dc.date.accessioned | 2023-09-26T17:13:41Z | - |
dc.date.available | 2023-09-26T17:13:41Z | - |
dc.date.issued | 2022-06-15 | - |
dc.identifier | ORCID iDs: Tahmina Zebin https://orcid.org/0000-0003-0437-0570; Yuan Luo https://orcid.org/0000-0002-9812-5543. | - |
dc.identifier.citation | Zebin, T., and Rezvy, S. and Luo, Y. (2022) 'An Explainable AI-Based Intrusion Detection System for DNS over HTTPS (DoH) Attacks', IEEE Transactions on Information Forensics and Security, 17, pp. 2339 - 2349. doi: 10.1109/TIFS.2022.3183390. | en_US |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.uri | https://bura.brunel.ac.uk/handle/2438/27256 | - |
dc.format.extent | 2339 - 2349 | - |
dc.format.medium | Print-Electronic | - |
dc.language.iso | en_US | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
dc.rights | Copyright © 2022 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works by sending a request to pubs-permissions@ieee.org. See: https://www.ieee.org/publications/rights/rights-policies.html | - |
dc.rights.uri | https://www.ieee.org/publications/rights/rights-policies.html | - |
dc.subject | secure computing | en_US |
dc.subject | machine learning | en_US |
dc.subject | intrusion detection system | en_US |
dc.subject | explainable AI | en_US |
dc.title | An Explainable AI-Based Intrusion Detection System for DNS over HTTPS (DoH) Attacks | en_US |
dc.type | Article | en_US |
dc.identifier.doi | https://doi.org/10.1109/TIFS.2022.3183390 | - |
dc.relation.isPartOf | IEEE Transactions on Information Forensics and Security | - |
pubs.publication-status | Published | - |
pubs.volume | 17 | - |
dc.identifier.eissn | 1556-6021 | - |
dc.rights.holder | Institute of Electrical and Electronics Engineers (IEEE) | - |
Appears in Collections: | Dept of Computer Science Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FullText.pdf | Copyright © 2022 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works by sending a request to pubs-permissions@ieee.org. See: https://www.ieee.org/publications/rights/rights-policies.html | 7.11 MB | Adobe PDF | View/Open |
Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.