[HTML][HTML] Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey
Abstract Industrial Control Systems (ICSs) are a key technology for life-sustainability, social
development and economic progress used in a wide range of industrial solutions, including …
development and economic progress used in a wide range of industrial solutions, including …
Intrusion detection for Industrial Internet of Things based on deep learning
Y Lu, S Chai, Y Suo, F Yao, C Zhang - Neurocomputing, 2024 - Elsevier
Intrusion detection technology can actively detect abnormal behaviors in the network and is
important to the security of Industrial Internet of Things (IIOT). However, there are some …
important to the security of Industrial Internet of Things (IIOT). However, there are some …
A comprehensive survey on deep packet inspection for advanced network traffic analysis: issues and challenges
Deep Packet Inspection (DPI) provides full visibility into network traffic by performing
detailed analysis on both packet header and packet payload. Accordingly, DPI has critical …
detailed analysis on both packet header and packet payload. Accordingly, DPI has critical …
Towards autonomous defense of sdn networks using muzero based intelligent agents
The Software Defined Networking (SDN) paradigm enables the development of systems that
centrally monitor and manage network traffic, providing support for the deployment of …
centrally monitor and manage network traffic, providing support for the deployment of …
A Few‐Shot Malicious Encrypted Traffic Detection Approach Based on Model‐Agnostic Meta‐Learning
Z Wang, M Li, H Ou, S Pang… - Security and …, 2023 - Wiley Online Library
Existing malicious encrypted traffic detection approaches need to be trained with many
samples to achieve effective detection of a specified class of encrypted traffic data. With the …
samples to achieve effective detection of a specified class of encrypted traffic data. With the …
On aggregation and prediction of cybersecurity incident reports
The study of cybersecurity incidents is an active research field. The purpose of this work is to
determine accurate measures of cybersecurity incidents. An effective method to aggregate …
determine accurate measures of cybersecurity incidents. An effective method to aggregate …
Pratd: A phased remote access trojan detection method with double-sided features
C Guo, Z Song, Y **, G Shen, Y Cui, C Jiang - Electronics, 2020 - mdpi.com
Remote Access Trojan (RAT) is one of the most terrible security threats that organizations
face today. At present, two major RAT detection methods are host-based and network-based …
face today. At present, two major RAT detection methods are host-based and network-based …
Parallel-SWSA: Automated Extraction for Feature Sequences from Remote Access Trojan Attack Packets
X Li, H Yan, B Lang, Y Zhang - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Remote Access Trojans (RATs) are malware that allow attackers to remotely control infected
systems and steal sensitive user data via the internet. Although current detection methods …
systems and steal sensitive user data via the internet. Although current detection methods …
Towards forecasting time-series of cyber-security data aggregates
MV Carriegos, RÁ Fernández-Díaz - Computational Intelligence in …, 2019 - Springer
Cybersecurity aggregates are defined as relevant numerical data describing a database of
cybersecurity reports of activity. It is shown how to obtain time-series of aggregates from a …
cybersecurity reports of activity. It is shown how to obtain time-series of aggregates from a …
[PDF][PDF] Proposed New SD-WAN Architecture to Facilitate Dynamic Load Balancing
ID EMMANUEL - 2023 - salford-repository.worktribe.com
One of the greatest joy in my academic journey is reaching this academic level. This
achievement is not just a personal milestone for me and my entire family; but for everyone …
achievement is not just a personal milestone for me and my entire family; but for everyone …