Mobile charging stations for electric vehicles—A review

S Afshar, P Macedo, F Mohamed, V Disfani - Renewable and Sustainable …, 2021 - Elsevier
Electric vehicle (EV) penetration is accelerating in an unprecedented way, but the
insufficient charging infrastructure to cover all locations hinders the improvement of the EV …

Comparative research on network intrusion detection methods based on machine learning

C Zhang, D Jia, L Wang, W Wang, F Liu, A Yang - Computers & Security, 2022 - Elsevier
Network intrusion detection system is an essential part of network security research. It
detects intrusion behaviors through active defense technology and takes emergency …

The role of machine learning in network anomaly detection for cybersecurity

A Yaseen - Sage Science Review of Applied Machine …, 2023 - journals.sagescience.org
This research introduces a theoretical framework for network anomaly detection in
cybersecurity, emphasizing the integration of adaptive machine learning models, ensemble …

Light-weight federated learning-based anomaly detection for time-series data in industrial control systems

HT Truong, BP Ta, QA Le, DM Nguyen, CT Le… - Computers in …, 2022 - Elsevier
With the emergence of the Industrial Internet of Things (IIoT), potential threats to smart
manufacturing systems are increasingly becoming challenging, causing severe damage to …

[HTML][HTML] CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders

M Catillo, A Pecchia, U Villano - Computers & Security, 2023 - Elsevier
Abstract Detecting attacks to Cyber-Physical Systems (CPSs) is of utmost importance, due to
their increasingly frequent use in many critical assets. Intrusion detection in CPSs and other …

Zero-day attack detection: a systematic literature review

R Ahmad, I Alsmadi, W Alhamdani… - Artificial Intelligence …, 2023 - Springer
With the continuous increase in cyberattacks over the past few decades, the quest to
develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …

[HTML][HTML] An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0

O Chakir, A Rehaimi, Y Sadqi, M Krichen… - Journal of King Saud …, 2023 - Elsevier
Cybersecurity attacks that target software have become profitable and popular targets for
cybercriminals who consciously take advantage of web-based vulnerabilities and execute …

Anomaly detection in 6G networks using machine learning methods

MM Saeed, RA Saeed, M Abdelhaq, R Alsaqour… - Electronics, 2023 - mdpi.com
While the cloudification of networks with a micro-services-oriented design is a well-known
feature of 5G, the 6G era of networks is closely related to intelligent network orchestration …

An ensemble framework with improved hybrid breeding optimization-based feature selection for intrusion detection

Z Ye, J Luo, W Zhou, M Wang, Q He - Future Generation Computer Systems, 2024 - Elsevier
Intrusion detection is a proactive means to detect network attacks and has been a hot point
in network security. To address the curse of dimensionality and improve the Intrusion …

A comprehensive survey of deep transfer learning for anomaly detection in industrial time series: Methods, applications, and directions

P Yan, A Abdulkadir, PP Luley, M Rosenthal… - IEEE …, 2024 - ieeexplore.ieee.org
Automating the monitoring of industrial processes has the potential to enhance efficiency
and optimize quality by promptly detecting abnormal events and thus facilitating timely …