Research on Clustering Detection Method for Security Attack Behaviors Based on Air Traffic Control Network

R Jia, J Zhang, Z Jiang - … on E-health Networking, Application & …, 2023 - ieeexplore.ieee.org
The problem of high similarity in attack data leading to unsatisfactory detection results of air
traffic control network security attack behavior is addressed. This article designs a new …

[HTML][HTML] An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training

Y Tian, W Wang, J He - … Journal of Information Security and Privacy …, 2024 - igi-global.com
Abstract The existing Industrial Internet of Things (IIoT) temporal data analysis methods often
suffer from issues such as information loss, difficulty balancing spatial and temporal features …

Assessment of multilevel intransitive non-interference for Discrete Event Systems

F Basile, G De Tommasi - IEEE Control Systems Letters, 2021 - ieeexplore.ieee.org
Privacy of distributed cyber-physical systems can be compromised by the presence of
information leaks which permit to external intruders to infer the state of the system itself …

A Cyber-Attack Detection System Using Late Fusion Aggregation Enabled Cyber-Net.

PS Prabha, SM Kumar - Intelligent Automation & Soft …, 2023 - search.ebscohost.com
Today, securing devices connected to the internet is challenging as security threats are
generated through various sources. The protection of cyber-physical systems from external …

Robust Anomaly Detection via Radio Fingerprinting in LoRa-Enabled IIoT

S Halder, T Newe - … Conference on Information Security Practice and …, 2022 - Springer
Abstract Long Range (LoRa) communications are gaining popularity in the Industrial Internet
of Things (IIoT) domain due to their large coverage and high energy efficiency. However …

A Novel Approach of BRELU RESNET Based Cyber Attack Detection System with BAIT Based Approach for Mitigation

S Prabhu, PS Nethravathi - International Journal of Applied …, 2022 - supublication.com
Purpose: Industrial Control Systems become more vulnerable to digital attacks by merging
communication groups and the Internet of Things, which could have severe implications. An …

Collaborative Learning for Cyberattack Detection in Blockchain Networks

TV Khoa, DH Son, DT Hoang, NL Trung… - … on Systems, Man …, 2024 - ieeexplore.ieee.org
This article aims to study intrusion attacks and then develop a novel cyberattack detection
framework to detect cyberattacks at the network layer (eg, brute password and flooding of …

6 IoT attack detection using quantum deep learning in large-scale networks

D Virmani, TN Ravishankar… - … and Approaches: Impacts …, 2023 - degruyter.com
The probability of a cyberattack rises at an exponential pace in direct proportion to the size
of the network-connected device population. Cybercriminals will concentrate their efforts on …

[PDF][PDF] A new Intrusion Detection System for Secured IoT/IIoT Networks based on LGBM

İF KILINÇER, O KATAR - Gazi University Journal of Science Part C …, 2023 - dergipark.org.tr
The Internet of Things (IoT) is one of the technologies used in many fields today. Cyber
attacks against IoT/Industrial IoT (IIoT) networks, which are increasingly used thanks to the …

[HTML][HTML] Intrusion detection framework for the Internet of Things using a dense random neural network

S Latif, ZE Huma, SS Jamal… - IEEE …, 2021 - uwe-repository.worktribe.com
The Internet of Things (IoT) devices, networks, and applications have become an integral
part of modern societies. Despite their social, economic, and industrial benefits, these …