[PDF][PDF] The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review

MM Mijwil, IE Salem, MM Ismaeel - Iraqi Journal For Computer Science and …, 2023 - iasj.net
People in the modern era spend most of their lives in virtual environments that offer a range
of public and private services and social platforms. Therefore, these environments need to …

A review of machine learning approaches to power system security and stability

OA Alimi, K Ouahada, AM Abu-Mahfouz - IEEE Access, 2020 - ieeexplore.ieee.org
Increasing use of renewable energy sources, liberalized energy markets and most
importantly, the integrations of various monitoring, measuring and communication …

Machine learning-based network vulnerability analysis of industrial Internet of Things

M Zolanvari, MA Teixeira, L Gupta… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially
devastating consequences in case of an attack. Machine learning (ML) and big data …

A survey on industrial control system testbeds and datasets for security research

M Conti, D Donadel, F Turrin - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs)
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …

[HTML][HTML] Adversarial attacks on machine learning cybersecurity defences in industrial control systems

E Anthi, L Williams, M Rhode, P Burnap… - Journal of Information …, 2021 - Elsevier
The proliferation and application of machine learning-based Intrusion Detection Systems
(IDS) have allowed for more flexibility and efficiency in the automated detection of cyber …

SCADA intrusion detection scheme exploiting the fusion of modified decision tree and Chi-square feature selection

LAC Ahakonye, CI Nwakanma, JM Lee, DS Kim - Internet of Things, 2023 - Elsevier
The industrial internet of things (IIoT) and supervisory control and data acquisition (SCADA)
have experienced ubiquitous growth recently. This growth comes with the challenge of an …

TRUST XAI: Model-agnostic explanations for AI with a case study on IIoT security

M Zolanvari, Z Yang, K Khan, R Jain… - IEEE internet of things …, 2021 - ieeexplore.ieee.org
Despite artificial intelligence (AI)'s significant growth, its “black box” nature creates
challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in …

A systematic review of the state of cyber-security in water systems

N Tuptuk, P Hazell, J Watson, S Hailes - Water, 2021 - mdpi.com
Critical infrastructure systems are evolving from isolated bespoke systems to those that use
general-purpose computing hosts, IoT sensors, edge computing, wireless networks and …

[PDF][PDF] The future of artificial intelligence in cybersecurity: A comprehensive survey.

F Tao, MS Akhtar, Z Jiayuan - EAI Endorsed Transactions on …, 2021 - researchgate.net
AI in Cybersecurity Market scheme helps organizations in observance, detecting, reporting,
and countering cyber threats to keep up information confidentiality. The increasing …

Cyber security for fog-based smart grid SCADA systems: Solutions and challenges

MA Ferrag, M Babaghayou, MA Yazici - Journal of Information Security and …, 2020 - Elsevier
This paper presents a comprehensive survey of existing cyber security solutions for fog-
based smart grid SCADA systems. We start by providing an overview of the architecture and …