R Sun, Y Zhu, J Fei, X Chen - Applied Sciences, 2023 - mdpi.com
Represented by reactive security defense mechanisms, cyber defense possesses a static, reactive, and deterministic nature, with overwhelmingly high costs to defend against ever …
Abstract The Distributed Denial of Service (DDoS) coordinates synchronized attacks on systems on the Internet using a set of infected hosts (bots). Bots are programmed to attack a …
N Abdi, A Albaseer, M Abdallah - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
As smart grids (SGs) increasingly rely on advanced technologies like sensors and communication systems for efficient energy generation, distribution, and consumption, they …
M Mittal, K Kumar, S Behal - Journal of Information Security and …, 2023 - Elsevier
In today's tech-driven world, while Internet-based applications drive social progress, their architectural weaknesses, inadequate security measures, lack of network segmentation …
Ensuring the security and reliability of cooperative vehicle-to-vehicle (V2V) communications is an extremely challenging task due to the dynamic nature of vehicular networks as well as …
C Zhang, S Yang, L Mao, H Ning - Artificial Intelligence Review, 2024 - Springer
In recent years, deep learning methods based on a large amount of data have achieved substantial success in numerous fields. However, with increases in regulations for protecting …
Concerns for the resilience of Cyber-Physical Systems (CPS) s in critical infrastructure are growing. CPS integrate sensing, computation, control, and networking into physical objects …
Concerns for the resilience of Cyber-Physical Systems (CPS) in critical infrastructure are growing. CPS integrate sensing, computation, control and networking into physical objects …
Moving target defense (MTD) and decoy strategies, measures of active defense, were introduced to secure both the proactive security and reactive adaptability of internet-of-things …