Naive Bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation

I Wickramasinghe, H Kalutarage - Soft Computing, 2021 - Springer
Naïve Bayes (NB) is a well-known probabilistic classification algorithm. It is a simple but
efficient algorithm with a wide variety of real-world applications, ranging from product …

Detection of automotive CAN cyber-attacks by identifying packet timing anomalies in time windows

A Tomlinson, J Bryans, SA Shaikh… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
Cyber-attacks on the automotive controller area network (CAN) have recently been shown to
be achievable and potentially disruptive or deadly. Detecting an attack quickly will require …

Relaxation‐based anomaly detection in cyber‐physical systems using ensemble kalman filter

H Karimipour, H Leung - IET Cyber‐Physical Systems: Theory & …, 2020 - Wiley Online Library
As power systems mature into smart grid entities, they face new challenges toward online
monitoring and control of the system's behaviour. Burgeoning classes of cyber‐attacks are …

Network discovery and scanning strategies and the Dark Triad

DN Jones, E Padilla, SR Curtis, C Kiekintveld - Computers in Human …, 2021 - Elsevier
Research examining cybercrime and personality is a critical, but understudied topic. From
an applied perspective, such research will inform better practice in cyber defense. It will also …

Towards a threat assessment framework for apps collusion

HK Kalutarage, HN Nguyen, SA Shaikh - Telecommunication systems, 2017 - Springer
App collusion refers to two or more apps working together to achieve a malicious goal that
they otherwise would not be able to achieve individually. The permissions based security …

Nth order binary encoding with split-protocol

BS Rawal, S Liang, S Gautam… - International Journal of …, 2018 - igi-global.com
To cope up with the Big Data explosion, the Nth Order Binary Encoding (NOBE) algorithm
with the Split-protocol has been proposed. In the earlier papers, the application Split …

Early warning systems for cyber defence

H Kalutarage, S Shaikh, BS Lee, C Lee… - Open Problems in …, 2016 - Springer
Cybercriminals ramp up their efforts with sophisticated techniques while defenders gradually
update their typical security measures. Attackers often have a long-term interest in their …

Towards an early warning system for network attacks using bayesian inference

HK Kalutarage, C Lee, SA Shaikh… - 2015 IEEE 2nd …, 2015 - ieeexplore.ieee.org
The Internet has become the most vulnerable part of critical civil infrastructures. Proactive
measures such as early warnings are required to reduce the risk of disasters that can be …

[PDF][PDF] Traffic forecasting for monitoring in computer networks using time series

H Dornel, E Christo, K Costa, D Souza - International Journal of …, 2019 - academia.edu
With the expansion of connectivity and information exchange, monitoring Internet traffic
becomes a priority in network management to identify anomalies and resource use. This …

[PDF][PDF] Detecting cyber attacks on the automotive controller area network

A Tomlinson - 2020 - pureportal.coventry.ac.uk
The rise in data usage and connectivity in cars has led to concerns about their risk to
cyberattack. The Controller Area Network (CAN), used by all cars for communication …