Search
Search Results
-
Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
This paper, from the view of a defender, addresses the security problem of cyber-physical systems (CPSs) subject to stealthy false data injection...
-
Probabilistic state estimation for labeled continuous time Markov models with applications to attack detection
This paper is about state estimation in a timed probabilistic setting. The main contribution is a general procedure to design an observer for...
-
An Intelligent Intrusion Detection System Using a Novel Combination of PCA and MLP
Cyber threats are diversified in both volume and variety as most of the organizations develop and accept emerging technologies related to big data,... -
Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems
Deep learning has enabled network intrusion detection rates as high as 99.9% for malicious network packets without requiring feature engineering....
-
Congnitive Networks, Their Properties and Applications in Attack Detection and Prevention Systems
The paper considers real-time cyberattack detection methods based on an algebraic approach. The author has applied the algebraic matching method,...
-
Signatureless Anomalous Behavior Detection in Information Systems
The early detection of cyber threats with cyber-attacks adapted to the nature of information systems is a crucial cybersecurity problem. This problem...
-
A Reputation Game on Cyber-Security and Cyber-Risk Calibration
To analyze strategic interactions arising in the cyber-security context, we develop a new reputation game model in which an attacker can pretend to...
-
Survey: Intrusion Detection for IoT
Internet of Things (IoT) is a concept that has evolved into a wonderful technology in the creation of smart surroundings to improve the quality of... -
A Machine Learning Approach for DDoS Attack Detection in CIC-DDoS2019 Dataset Using Multiple Linear Regression Algorithm
In the context of cloud computing, distributed denial-of-service (DDoS) attacks are malicious attempts to overwhelm a cloud service, network, or an... -
Diagnosability and attack detection for discrete event systems under sensor attacks
This paper extends the theory of diagnosability by investigating fault diagnosis in discrete event systems under sensor attacks using finite-state...
-
An Optimal Group Decision-Making Approach for Cyber Security Using Improved Selection-Drift Dynamics
In cyber security, balancing investment and risk has always been a dilemmatic problem since the threats often lurk in the shadows. Thus, timely and...
-
An Interactive Dashboard for Intrusion Detection in Internet of Things
In this revolutionary era, the Internet of Things (IoT) has always been at the forefront of giving up its iconic image. It is getting linked day by... -
False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure
The concept of false data injection attack (FDIA) was introduced originally in the smart grid domain. While the term sounds common, it specifically...
-
Critical Infrastructure Detection During an Evacuation with Alternative Fuel Vehicles
Alternative fuel vehicles adoption is rapidly growing in many urban and suburban locations around the world. These new vehicle technologies require... -
Hack Investigation and Probing Using BEOS
Cybercrimes are increasing at a very rapid rate and becoming very heinous on account of the use of growing technological adoption in executing them.... -
Anomaly Classification to Enable Self-healing in Cyber Physical Systems Using Process Mining
Industrial Cyber Physical Systems (CPS) are large-scale critical infrastructures that are vulnerable to cyberattacks with wide-ranging consequences.... -
The critical node game
In this work, we introduce a game-theoretic model that assesses the cyber-security risk of cloud networks and informs security experts on the optimal...
-
Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies
This paper mainly investigates the security problem of a networked control system based on a Kalman filter. A false data injection attack scheme is...
-
Optimal Resource Allocation and Feasible Hexagonal Topology for Cyber-Physical Systems
Networked cyber-physical systems are facing serious security threats from malicious attacks. It is noted that the networked cyber-physical system...
-
Self-adaptive memetic firefly algorithm and CatBoost-based security framework for IoT healthcare environment
The Internet of Things (IoT), which has had a revolutionary influence on human existence, has become a topic of significant attention among the...