[PDF][PDF] Automated Machine Learning Enabled Cybersecurity Threat Detection in Internet of Things Environment.

F Alrowais, S Althahabi, SS Alotaibi… - … Systems Science & …, 2023 - academia.edu
Recently, Internet of Things (IoT) devices produces massive quantity of data from distinct
sources that get transmitted over public networks. Cybersecurity becomes a challenging …

机器学习算法与应用

张磊, 陈东, 王建新, 高献伟, 段晓毅 - 北京电子科技学院学报, 2017 - cqvip.com
本文从三个方面介绍了机器学习. 首先简单介绍5 种典型的机器学习算法,
以及典型算法之间结合的集成算法. 其次, 在典型算法基础上介绍了结合其他学科的量子机器 …

基于深度残差神经网络的AES 密码芯片电磁攻击研究

罗漫, 张洪欣 - 电波科学学报, 2019 - cqvip.com
基于“分而治之” 方法提出了一种在完全未知明文, 密文及泄露中间值情况下的电磁泄漏攻击方法.
设计深度残差神经网络模型, 对基于现场可编程逻辑门阵列(field programmable gate array …

Chronic poisoning against machine learning based IDSs using edge pattern detection

P Li, Q Liu, W Zhao, D Wang… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
In big data era, machine learning is one of fundamental techniques in intrusion detection
systems (IDSs). Poisoning attack, which is one of the most recognized security threats …

Learning-based attacks in cyber-physical systems

MJ Khojasteh, A Khina… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We introduce the problem of learning-based attacks in a simple abstraction of cyber-physical
systems—the case of a discrete-time, linear, time-invariant plant that may be subject to an …

[PDF][PDF] A Novel Approach ForUnknown Attack Detection In Computer Network

K Ahmad, A Zafar, K Roshan - NeuroQuantology, 2022 - researchgate.net
Machine Learning (ML) and Deep Learning (DL) technologies are gaining prominence,
particularly in computer network security. Cutting-edge technologies, such as fraud detection …

Deep learning poison data attack detection

H Chacon, S Silva, P Rad - 2019 IEEE 31st International …, 2019 - ieeexplore.ieee.org
Deep neural networks are widely used in many walks of life. Techniques such as transfer
learning enable neural networks pre-trained on certain tasks to be retrained for a new duty …

Markov game for securing wide-area damping control against false data injection attacks

S Liu, I Zenelis, Y Li, X Wang, Q Li… - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
While wide-area communication networks facilitate the exchange of measurements and
control signals for wide-area damping controllers, they bring in new threats of cyberattacks …

基于鸟群神经网络入侵检测的研究

李旭 - 网络安全技术与应用, 2008 - cqvip.com
入侵检测作为一种主动的信息安全保障措施, 有效地弥补了传统安全防护技术的缺陷.
本文利用鸟群特性和神经网络对任意非线性函数的逼近能力, 提出了一种基于鸟群神经网络的 …

Assessment of Network Security Situation of Industrial Control System Based on CG-ELM

H Quan, J Zhang, Y Sun, F Bu… - 2023 2nd Conference on …, 2023 - ieeexplore.ieee.org
This paper proposes a network security situation assessment model of the industrial control
system, and the model divides the industrial control network security situation assessment …