A review of digital twins and their application in cybersecurity based on artificial intelligence

M Homaei, Ó Mogollón-Gutiérrez, JC Sancho… - Artificial Intelligence …, 2024 - Springer
The potential of digital twin technology is yet to be fully realised due to its diversity and
untapped potential. Digital twins enable systems' analysis, design, optimisation, and …

The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users

K Dietz, M Mühlhauser, J Kögel, S Schwinger… - IEEE …, 2024 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) tackle the challenging task of detecting network attacks as
fast as possible. As this is getting more complex in modern enterprise networks, Artificial …

Evaluating Port Emissions Prediction Model Resilience Against Cyberthreats

VSS Vennam, CD Paternina-Arboleda… - International Conference …, 2024 - Springer
The port sector is evolving, influencing areas such as operations, infrastructure, governance,
technology, partnerships, and commercial strategies. AI can significantly improve the …

Explore Patterns to Detect Sybil Attack during Federated Learning in Mobile Digital Twin Network

W Zhang, C Yu, Z Meng, S Shen… - ICC 2024-IEEE …, 2024 - ieeexplore.ieee.org
Digital twins represent users in the cyber world and interact between users and network
controllers to better manage the mobile network. Due to communications and other resource …

Blockchain-aided Collaborative Threat Detection for Securing Digital Twin-based IIoT Networks

A Zainudin, MAP Putra, RN Alief… - ICC 2024-IEEE …, 2024 - ieeexplore.ieee.org
The distributed and heterogeneous connections in the digital twin (DT)-based industrial
Internet of Things (IIoT) are vulnerable to cyber-attacks and malicious activities. This study …

Poisoning Attack in Machine Learning Based Invalid Ad Traffic Detection

L Yu, S Li, Y Meng, X Wang, H Zhu - International Conference on Network …, 2023 - Springer
Along with the growing market of mobile advertising, click farm that leverages large-scale
fake devices to conduct ad fraud is becoming a major threats against mobile advertising …

[PDF][PDF] The Missing Link in Network Intrusion Detection: Taking AI/ML Research Efforts to Users

J KÖGEL, S SCHWINGER, M SICHERMANN - 2024 - opus.bibliothek.uni-augsburg.de
ABSTRACT Intrusion Detection Systems (IDS) tackle the challenging task of detecting
network attacks as fast as possible. As this is getting more complex in modern enterprise …

[引用][C] Data Poisoning-Robust Decentralized Digital Twin-based Network Intrusion Detection in IIoT

A Zainudin, MAP Putra, DS Kim, JM Lee - 한국통신학회학술대회논문집, 2023 - dbpia.co.kr
This study introduces a data poisoning-robust decentralized digital twin (DT)-based cyber
threat detection in industrial Internet of Things (IIoT) networks. We first model the data …