We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 131 results
  1. Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme

    This paper, from the view of a defender, addresses the security problem of cyber-physical systems (CPSs) subject to stealthy false data injection...

    Haibin Guo, Zhonghua Pang, ... Jun Li in Journal of Systems Science and Complexity
    Article 03 August 2022
  2. Probabilistic state estimation for labeled continuous time Markov models with applications to attack detection

    This paper is about state estimation in a timed probabilistic setting. The main contribution is a general procedure to design an observer for...

    Dimitri Lefebvre, Carla Seatzu, ... Alessandro Giua in Discrete Event Dynamic Systems
    Article 08 September 2021
  3. An Intelligent Intrusion Detection System Using a Novel Combination of PCA and MLP

    Cyber threats are diversified in both volume and variety as most of the organizations develop and accept emerging technologies related to big data,...
    Ratul Chowdhury, Arindam Roy, ... Samir Kumar Bandyopadhyay in Engineering Mathematics and Computing
    Chapter 2023
  4. Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems

    Deep learning has enabled network intrusion detection rates as high as 99.9% for malicious network packets without requiring feature engineering....

    Marc Chalé, Bruce Cox, ... Nathaniel D. Bastian in Optimization Letters
    Article 23 May 2023
  5. Congnitive Networks, Their Properties and Applications in Attack Detection and Prevention Systems

    The paper considers real-time cyberattack detection methods based on an algebraic approach. The author has applied the algebraic matching method,...

    Article 01 September 2023
  6. Signatureless Anomalous Behavior Detection in Information Systems

    The early detection of cyber threats with cyber-attacks adapted to the nature of information systems is a crucial cybersecurity problem. This problem...

    V. Tkach, A. Kudin, ... I. Shvidchenko in Cybernetics and Systems Analysis
    Article 01 September 2023
  7. A Reputation Game on Cyber-Security and Cyber-Risk Calibration

    To analyze strategic interactions arising in the cyber-security context, we develop a new reputation game model in which an attacker can pretend to...

    Kookyoung Han, ** Hyuk Choi in Applied Mathematics & Optimization
    Article 13 April 2022
  8. Survey: Intrusion Detection for IoT

    Internet of Things (IoT) is a concept that has evolved into a wonderful technology in the creation of smart surroundings to improve the quality of...
    B R Chandavarkar, Joshitha Reddy D., ... Reshma Tresa Antony in Advances in Data Science and Artificial Intelligence
    Conference paper 2023
  9. A Machine Learning Approach for DDoS Attack Detection in CIC-DDoS2019 Dataset Using Multiple Linear Regression Algorithm

    In the context of cloud computing, distributed denial-of-service (DDoS) attacks are malicious attempts to overwhelm a cloud service, network, or an...
    Lakshmeeswari Gondi, Swathi Sambangi, ... S. Sharika Anjum in Accelerating Discoveries in Data Science and Artificial Intelligence I
    Conference paper 2024
  10. Diagnosability and attack detection for discrete event systems under sensor attacks

    This paper extends the theory of diagnosability by investigating fault diagnosis in discrete event systems under sensor attacks using finite-state...

    Feng Lin, Stéphane Lafortune, Caisheng Wang in Discrete Event Dynamic Systems
    Article 12 July 2024
  11. An Optimal Group Decision-Making Approach for Cyber Security Using Improved Selection-Drift Dynamics

    In cyber security, balancing investment and risk has always been a dilemmatic problem since the threats often lurk in the shadows. Thus, timely and...

    Enning Zhang, Gang Wang, ... Juan Li in Dynamic Games and Applications
    Article 27 September 2022
  12. An Interactive Dashboard for Intrusion Detection in Internet of Things

    In this revolutionary era, the Internet of Things (IoT) has always been at the forefront of giving up its iconic image. It is getting linked day by...
    Monika Vishwakarma, Nishtha Kesswani in Advances in Data Science and Artificial Intelligence
    Conference paper 2023
  13. False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure

    The concept of false data injection attack (FDIA) was introduced originally in the smart grid domain. While the term sounds common, it specifically...

    Mohiuddin Ahmed, Al-Sakib Khan Pathan in Complex Adaptive Systems Modeling
    Article Open access 23 April 2020
  14. Critical Infrastructure Detection During an Evacuation with Alternative Fuel Vehicles

    Alternative fuel vehicles adoption is rapidly growing in many urban and suburban locations around the world. These new vehicle technologies require...
    Chrysafis Vogiatzis, Eleftheria Kontou in Handbook for Management of Threats
    Chapter 2023
  15. Hack Investigation and Probing Using BEOS

    Cybercrimes are increasing at a very rapid rate and becoming very heinous on account of the use of growing technological adoption in executing them....
    Sridevi Kotari, Saroja Roy Grandhi, ... Fahmina Taranum in Accelerating Discoveries in Data Science and Artificial Intelligence II
    Conference paper 2024
  16. Anomaly Classification to Enable Self-healing in Cyber Physical Systems Using Process Mining

    Industrial Cyber Physical Systems (CPS) are large-scale critical infrastructures that are vulnerable to cyberattacks with wide-ranging consequences....
    Uphar Singh, Deepak Gajjala, ... O. P. Vyas in Learning and Intelligent Optimization
    Conference paper 2023
  17. The critical node game

    In this work, we introduce a game-theoretic model that assesses the cyber-security risk of cloud networks and informs security experts on the optimal...

    Gabriele Dragotto, Amine Boukhtouta, ... Mehdi Taobane in Journal of Combinatorial Optimization
    Article 18 May 2024
  18. Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies

    This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is...

    Zhonghua Pang, Yuan Fu, ... Jian Sun in Journal of Systems Science and Complexity
    Article 02 April 2023
  19. Optimal Resource Allocation and Feasible Hexagonal Topology for Cyber-Physical Systems

    Networked cyber-physical systems are facing serious security threats from malicious attacks. It is noted that the networked cyber-physical system...

    Article 12 June 2023
  20. Self-adaptive memetic firefly algorithm and CatBoost-based security framework for IoT healthcare environment

    The Internet of Things (IoT), which has had a revolutionary influence on human existence, has become a topic of significant attention among the...

    Pandit Byomokesha Dash, Manas Ranjan Senapati, ... S. Vimal in Journal of Engineering Mathematics
    Article 18 December 2023
Did you find what you were looking for? Share feedback.