Business email compromise phishing detection based on machine learning: A systematic literature review

HF Atlam, O Oluwatimilehin - Electronics, 2022 - mdpi.com
The risk of cyberattacks against businesses has risen considerably, with Business Email
Compromise (BEC) schemes taking the lead as one of the most common phishing attack …

[HTML][HTML] A hybrid methodology for anomaly detection in Cyber–Physical Systems

N Jeffrey, Q Tan, JR Villar - Neurocomputing, 2024 - Elsevier
The rapid adoption of Industry 4.0 has seen Information Technology (IT) networks
increasingly merged with Operational Technology (OT) networks, which have traditionally …

Integrated security information and event management (siem) with intrusion detection system (ids) for live analysis based on machine learning

AR Muhammad, P Sukarno, AA Wardana - Procedia Computer Science, 2023 - Elsevier
Abstract This research builds Security Information & Event Management (SIEM) based on
live analysis using machine learning on Intrusion Detection System (IDS). To implement a …

Global supply chains security: a comparative analysis of emerging threats and traceability solutions

B Gokkaya, E Karafili, L Aniello, B Halak - … : An International Journal, 2024 - emerald.com
Purpose The purpose of this study is to increase awareness of current supply chain (SC)
security-related issues by providing an extensive analysis of existing SC security solutions …

A multilayer perceptron model for anomaly detection in water treatment plants

GR MR, N Somu, AP Mathur - International Journal of Critical Infrastructure …, 2020 - Elsevier
Early and accurate anomaly detection in critical infrastructure (CI), such as water treatment
plants and electric power grid, is necessary to avoid plant damage and service disruption …

A false sense of security? Revisiting the state of machine learning-based industrial intrusion detection

D Kus, E Wagner, J Pennekamp, K Wolsing… - Proceedings of the 8th …, 2022 - dl.acm.org
Anomaly-based intrusion detection promises to detect novel or unknown attacks on
industrial control systems by modeling expected system behavior and raising corresponding …

Blending data and physics against false data injection attack: An event-triggered moving target defence approach

W Xu, M Higgins, J Wang… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Fast and accurate detection of cyberattacks is a key element for a cyber-resilient power
system. Recently, data-driven detectors and physics-based Moving Target Defences (MTD) …

A hybrid physics-based data-driven framework for anomaly detection in industrial control systems

MRG Raman, AP Mathur - IEEE Transactions on Systems, Man …, 2021 - ieeexplore.ieee.org
A method referred to as PbNN is proposed to detect cyber-physical attacks through the
identification of resulting anomalies in the process dynamics of the underlying ICS. Unlike …

AI for cyberbiosecurity in water systems—A survey

D Sobien, MO Yardimci, MBT Nguyen, WY Mao… - … : A new field to deal with …, 2023 - Springer
Abstract The use of Artificial Intelligence (AI) is growing in areas where decisions and
consequences have high-stakes such as larger scale software, critical infrastructure, and …

High-fidelity cyber and physical simulation of water distribution systems. II: Enabling cyber-physical attack localization

A Murillo, R Taormina, NO Tippenhauer… - Journal of Water …, 2023 - ascelibrary.org
A fundamental problem in the realm of cyber-physical security of smart water networks is
attack detection, a key step towards designing adequate countermeasures. This task is …