Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study
This work is concerned with the vulnerability of a network industrial control system to cyber-
attacks, which is a critical issue nowadays. This is because an attack on a controlled process …
attacks, which is a critical issue nowadays. This is because an attack on a controlled process …
Polymorphic adversarial cyberattacks using WGAN
R Chauhan, U Sabeel, A Izaddoost… - Journal of Cybersecurity …, 2021 - mdpi.com
Intrusion Detection Systems (IDS) are essential components in preventing malicious traffic
from penetrating networks and systems. Recently, these systems have been enhancing their …
from penetrating networks and systems. Recently, these systems have been enhancing their …
RADS: a real-time anomaly detection model for software-defined networks using machine learning
M Sneha, AK Kumar, NV Hegde, AS Anish… - International Journal of …, 2023 - Springer
Software-defined networks (SDN) are no more a new technology as many industries are
adopting it in a hybrid or full stack mode. SDN has already proved its technological …
adopting it in a hybrid or full stack mode. SDN has already proved its technological …
Automated machine learning configuration to learn intrusion detectors on attack-free datasets
Intrusion detection systems have benefited from Machine Learning (ML) to alleviate the
problem of building and maintaining accurate signatures. Nevertheless, ML solutions face …
problem of building and maintaining accurate signatures. Nevertheless, ML solutions face …
A Preference-Driven Malicious Platform Detection Mechanism for Users in Mobile Crowdsensing
H Wang, J Tao, D Chi, Y Gao, Z Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Exploiting mobile crowdsensing to conduct data collection and analysis brings
unprecedented opportunities to promote the development of the Internet of Things (IoT) …
unprecedented opportunities to promote the development of the Internet of Things (IoT) …
Efficient Cyberattack Detection Methods in Industrial Control Systems
The article deals with the issue of detecting cyberattacks on control algorithms running in a
real Programmable Logic Controller (PLC) and controlling a real laboratory control plant …
real Programmable Logic Controller (PLC) and controlling a real laboratory control plant …
A Filtering Model for Evidence Gathering in an SDN-oriented Digital Forensic and Incident Response Context
Software-defined networking (SDN) architecture enables flexible and centralized network
management from the controller, making it increasingly attractive in deploying …
management from the controller, making it increasingly attractive in deploying …
A Dynamic Threshold Based Approach forDetecting the Test Limits
Finding a balance between meeting the testing goals and testing resources is always a
challenging task. Therefore, employing Machine Learning (ML) techniques for test …
challenging task. Therefore, employing Machine Learning (ML) techniques for test …
Convolution Neural Network-Based Efficient Development of Intrusion Detection Using Various Deep Learning Approaches
As internet usage has increased, firewalls and antiviruses are not alone enough to
overcome the attacks and assure the privacy of information in a computer network, which …
overcome the attacks and assure the privacy of information in a computer network, which …