Analysis of cyber security attacks and its solutions for the smart grid using machine learning and blockchain methods

T Mazhar, HM Irfan, S Khan, I Haq, I Ullah, M Iqbal… - Future Internet, 2023 - mdpi.com
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid
has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the …

[PDF][PDF] The role of machine learning in network anomaly detection for cybersecurity

A Yaseen - Sage Science Review of Applied Machine Learning, 2023 - researchgate.net
This research introduces a theoretical framework for network anomaly detection in
cybersecurity, emphasizing the integration of adaptive machine learning models, ensemble …

An IoT-focused intrusion detection system approach based on preprocessing characterization for cybersecurity datasets

X Larriva-Novo, VA Villagrá, M Vega-Barbas, D Rivera… - Sensors, 2021 - mdpi.com
Security in IoT networks is currently mandatory, due to the high amount of data that has to be
handled. These systems are vulnerable to several cybersecurity attacks, which are …

An agile approach to identify single and hybrid normalization for enhancing machine learning-based network intrusion detection

MA Siddiqi, W Pak - IEEE Access, 2021 - ieeexplore.ieee.org
Detecting intrusion in network traffic has remained a problematic task for years. Progress in
the field of machine learning is paving the way for enhancing intrusion detection systems …

[HTML][HTML] Edge intelligence in Smart Grids: A survey on architectures, offloading models, cyber security measures, and challenges

DN Molokomme, AJ Onumanyi… - Journal of Sensor and …, 2022 - mdpi.com
The rapid development of new information and communication technologies (ICTs) and the
deployment of advanced Internet of Things (IoT)-based devices has led to the study and …

Chaining Zscore and feature scaling methods to improve neural networks for classification

C Nkikabahizi, W Cheruiyot, A Kibe - Applied Soft Computing, 2022 - Elsevier
Neural networks for classification aim at identifying the class label of new observation based
training data containing instances whose category memberships are known. Therefore the …

[HTML][HTML] Leveraging explainable artificial intelligence in real-time cyberattack identification: Intrusion detection system approach

X Larriva-Novo, C Sánchez-Zas, VA Villagrá… - Applied Sciences, 2023 - mdpi.com
Cyberattacks are part of the continuous race, where research in computer science both
contributes to discovering new threats and vulnerabilities and also mitigates them. When …

Emergency Evaluation in Connected and Automated Vehicles

E Eziama - 2021 - search.proquest.com
An intelligent transportation system (ITS) provides improved transport efficiency and safety
based on vehicle communication. Connected and automated vehicles (CAVs) as part of an …

Prepare for trouble and make it double! Supervised–Unsupervised stacking for anomaly-based intrusion detection

T Zoppi, A Ceccarelli - Journal of Network and Computer Applications, 2021 - Elsevier
In the last decades, researchers, practitioners and companies struggled in devising
mechanisms to detect malicious activities originating security threats. Amongst the many …

[PDF][PDF] ATTACKS DETECTION IN INTERNET OF THINGS USING MACHINE LEARNING TECHNIQUES: A REVIEW

AAAAD Saleem, AA Abdulrahman - Journal of Applied …, 2024 - researchgate.net
The proliferation of IoT devices across sectors such as home automation, business,
healthcare, and transportation has led to the generation of vast amounts of sensitive data …