[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

State-of-the-art and research opportunities for next-generation consumer electronics

CK Wu, CT Cheng, Y Uwate, G Chen… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The tremendous advancement of Internet-of-Things (IoT) has proliferated the interaction
between the physical and cyber worlds. Consumer electronics, as the first tier in the physical …

[HTML][HTML] Integrated process safety and process security risk assessment of industrial cyber-physical systems in chemical plants

S Yuan, M Yang, G Reniers - Computers in Industry, 2024 - Elsevier
Aligned with the development needs of Industry 4.0, industrial cyber-physical systems
(ICPSs) are widely applied to chemical facilities to facilitate so-called intelligent production …

[HTML][HTML] Detecting communities in higher-order networks by using their derivative graphs

G Contreras-Aso, R Criado, GV de Salas… - Chaos, Solitons & …, 2023 - Elsevier
Similar to what happens in the pairwise network domain, the communities of nodes of a
hypergraph (also called higher-order network) are formed by groups of nodes that share …

Quantitative risk assessment of cyber attacks on cyber-physical systems using attack graphs

I Semertzis, VS Rajkumar, A Ştefanov… - 2022 10th Workshop …, 2022 - ieeexplore.ieee.org
Over the past decade, the number of cyber attack incidents targeting critical infrastructures
such as the electrical power system has increased. To assess the risk of cyber attacks on the …

A novel method for intrusion detection in computer networks by identifying multivariate outliers and ReliefF feature selection

B Uzun, S Ballı - Neural Computing and Applications, 2022 - Springer
The identification of unusual data in computer networks is a critical task for intrusion
detection systems. In this study, a novel approach has been proposed for improving …

Empowering Security Operation Center with Artificial Intelligence and Machine Learning–A Systematic Literature Review

M Khayat, E Barka, MA Serhani, F Sallabi… - IEEE …, 2025 - ieeexplore.ieee.org
Organizational cybersecurity relies heavily on security operation centers (SOCs) to protect
businesses and institutions from emerging cyber threats. In recent years, the complexity and …

Model of information system communication in aggressive cyberspace: reliability, functional safety, economics

V Kovtun, I Izonin, M Greguš - IEEE Access, 2022 - ieeexplore.ieee.org
The manuscript presents a mathematical apparatus for modeling the process of operation of
the information system in the conditions of aggressive cyberspace, for which the …

[HTML][HTML] Machine Learning in Information and Communications Technology: A Survey

E Dritsas, M Trigka - Information, 2024 - mdpi.com
The rapid growth of data and the increasing complexity of modern networks have driven the
demand for intelligent solutions in the information and communications technology (ICT) …

Increasing the effectiveness of network intrusion detection systems (nidss) by using multiplex networks and visibility graphs

S Iglesias Perez, R Criado - Mathematics, 2022 - mdpi.com
In this paper, we present a new approach to NIDS deployment based on machine learning.
This new approach is based on detecting attackers by analyzing the relationship between …