Multi-cloud cooperative intrusion detection system: trust and fairness assurance

A Abusitta, M Bellaiche, M Dagenais - Annals of Telecommunications, 2019 - Springer
The sophistication of the recent cloud computing systems has made them more vulnerable
to intelligent cyber attacks. Moreover, it is becoming very difficult for a single intrusion …

Intrusion detection for industrial control systems by machine learning using privileged information

M Pordelkhaki, S Fouad… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
The continuous operation of an industrial process, such as water treatment or power
generation, is governed by an Industrial Control System (ICS). Cyber-attacks on industrial …

Intrusion Detection System in Smart Grid-A Review

S Banik, T Banik, S Banik - 2023 - preprints.org
The smart grid system, an improvised form of the traditional grid, is considered a critical
cyber-physical system. Due to its complex combination of smart and legacy technologies …

VCIDS: Collaborative intrusion detection of sensor and actuator attacks on connected vehicles

P Guo, H Kim, L Guan, M Zhu, P Liu - … Falls, ON, Canada, October 22–25 …, 2018 - Springer
Modern urban vehicles adopt sensing, communication and computing modules into almost
every functioning aspect to assist humans in driving. However, the advanced technologies …

A proposal for curriculum development of educating and training Brazilian police officers in digital forensics investigation and cybercrime prosecution

I Cunha, J Cavalcante, A Patel - International Journal of …, 2017 - inderscienceonline.com
The internet and computer systems are infested by cybercrimes. Like any other crime, it
needs investigations and analysis to prosecute the criminal. It is against this backdrop that it …

Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment

Y Chen, J Li, N Guo - International Journal of Information Security, 2023 - Springer
While digital application infrastructure services are becoming increasingly abundant and the
scale of the network continues to expand, many new network vulnerabilities and attacks …

Intrusion detection systems in smart grid

SB Rakas, V Timčenko, M Kabović… - 2022 21st International …, 2022 - ieeexplore.ieee.org
This paper describes smart grid with a hierarchical communication architecture consisting of
three layers. Such a network faces various cyber security challenges, which can lead to …

[PDF][PDF] WSNs 多阶段入侵检测博弈最优策略研究

周伟伟, 郁滨 - 电子与信息学报, 2018 - edit.jeit.ac.cn
针对无线传感器网络中资源受限的入侵检测系统策略优化问题, 该文提出一种多阶段动态入侵
检测博弈模型. 该模型利用贝叶斯规则修正下一阶段外部节点为恶意节点的后验概率 …

Collaborative intrusion detection in the era of IoT: Recent advances and challenges

W Li, W Meng - Security and Privacy in the Internet of Things …, 2021 - Wiley Online Library
Summary Internet of Things (IoT) is currently transferring the conventional networks by
allowing various devices to connect with each other, and the continued growth of IoT …

An ontology-based modelling and reasoning for alerts correlation

T Kenaza - International Journal of Data Mining, Modelling …, 2021 - inderscienceonline.com
SIEM is a modern and powerful security tool thanks to several functions that it provides to
take benefit of collected data, such as normalisation and aggregation. The main important …