A survey on machine learning-based malware detection in executable files

J Singh, J Singh - Journal of Systems Architecture, 2021 - Elsevier
In last decade, a proliferation growth in the development of computer malware has been
done. Nowadays, cybercriminals (attacker) use malware as a weapon to carry out the …

Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations

MA Umer, KN Junejo, MT Jilani, AP Mathur - International Journal of …, 2022 - Elsevier
Methods from machine learning are used in the design of secure Industrial Control Systems.
Such methods focus on two major areas: detection of intrusions at the network level using …

Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies

I Zografopoulos, J Ospina, X Liu, C Konstantinou - IEEE Access, 2021 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are interconnected architectures that employ analog and
digital components as well as communication and computational resources for their …

Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders

JY Kim, SJ Bu, SB Cho - Information Sciences, 2018 - Elsevier
Detecting malicious software (malware) is important for computer security. Among the
different types of malware, zero-day malware is problematic because it cannot be removed …

Industry 4.0 for the construction industry—how ready is the industry?

R Maskuriy, A Selamat, KN Ali, P Maresova, O Krejcar - Applied Sciences, 2019 - mdpi.com
Technology and innovations have fueled the evolution of Industry 4.0, the fourth industrial
revolution. Industry 4.0 encourages growth and development through its efficiency capacity …

Deep belief network based intrusion detection techniques: A survey

I Sohn - Expert Systems with Applications, 2021 - Elsevier
With the recent growth in the number of IoT devices, the amount of personal, sensitive, and
important data flowing through the global network have grown rapidly. Additionally, the …

Cyber physical system (CPS)-based industry 4.0: A survey

Y Lu - Journal of Industrial Integration and Management, 2017 - World Scientific
Cyber Physical System (CPS) has provided an outstanding foundation to build advanced
industrial systems and applications by integrating innovative functionalities through Internet …

[HTML][HTML] Attacks and defences on intelligent connected vehicles: A survey

M Dibaei, X Zheng, K Jiang, R Abbas, S Liu… - Digital Communications …, 2020 - Elsevier
Intelligent vehicles are advancing at a fast speed with the improvement of automation and
connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle …

COSTE: Complexity-based OverSampling TEchnique to alleviate the class imbalance problem in software defect prediction

S Feng, J Keung, X Yu, Y **ao, KE Bennin… - Information and …, 2021 - Elsevier
Context: Generally, there are more non-defective instances than defective instances in the
datasets used for software defect prediction (SDP), which is referred to as the class …

Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model

MM Hassan, A Gumaei, S Huda… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The trustworthiness of an industrial Internet of Things (IIoT) network is an important
stakeholder expectation. Maintaining the trustworthiness of such a network is crucial to void …