A survey on machine learning-based malware detection in executable files
J Singh, J Singh - Journal of Systems Architecture, 2021 - Elsevier
In last decade, a proliferation growth in the development of computer malware has been
done. Nowadays, cybercriminals (attacker) use malware as a weapon to carry out the …
done. Nowadays, cybercriminals (attacker) use malware as a weapon to carry out the …
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations
Methods from machine learning are used in the design of secure Industrial Control Systems.
Such methods focus on two major areas: detection of intrusions at the network level using …
Such methods focus on two major areas: detection of intrusions at the network level using …
Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies
Cyber-physical systems (CPS) are interconnected architectures that employ analog and
digital components as well as communication and computational resources for their …
digital components as well as communication and computational resources for their …
Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders
Detecting malicious software (malware) is important for computer security. Among the
different types of malware, zero-day malware is problematic because it cannot be removed …
different types of malware, zero-day malware is problematic because it cannot be removed …
Industry 4.0 for the construction industry—how ready is the industry?
Technology and innovations have fueled the evolution of Industry 4.0, the fourth industrial
revolution. Industry 4.0 encourages growth and development through its efficiency capacity …
revolution. Industry 4.0 encourages growth and development through its efficiency capacity …
Deep belief network based intrusion detection techniques: A survey
I Sohn - Expert Systems with Applications, 2021 - Elsevier
With the recent growth in the number of IoT devices, the amount of personal, sensitive, and
important data flowing through the global network have grown rapidly. Additionally, the …
important data flowing through the global network have grown rapidly. Additionally, the …
Cyber physical system (CPS)-based industry 4.0: A survey
Y Lu - Journal of Industrial Integration and Management, 2017 - World Scientific
Cyber Physical System (CPS) has provided an outstanding foundation to build advanced
industrial systems and applications by integrating innovative functionalities through Internet …
industrial systems and applications by integrating innovative functionalities through Internet …
[HTML][HTML] Attacks and defences on intelligent connected vehicles: A survey
Intelligent vehicles are advancing at a fast speed with the improvement of automation and
connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle …
connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle …
COSTE: Complexity-based OverSampling TEchnique to alleviate the class imbalance problem in software defect prediction
Context: Generally, there are more non-defective instances than defective instances in the
datasets used for software defect prediction (SDP), which is referred to as the class …
datasets used for software defect prediction (SDP), which is referred to as the class …
Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model
The trustworthiness of an industrial Internet of Things (IIoT) network is an important
stakeholder expectation. Maintaining the trustworthiness of such a network is crucial to void …
stakeholder expectation. Maintaining the trustworthiness of such a network is crucial to void …