Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods

YL Khaleel, MA Habeeb, AS Albahri… - Journal of Intelligent …, 2024 - degruyter.com
This study aims to perform a thorough systematic review investigating and synthesizing
existing research on defense strategies and methodologies in adversarial attacks using …

Multiple Intrusion Detection Using Shapley Additive Explanations and a Heterogeneous Ensemble Model in an Unmanned Aerial Vehicle's Controller Area Network

YW Hong, DY Yoo - Applied Sciences, 2024 - mdpi.com
Recently, methods to detect DoS and spoofing attacks on In-Vehicle Networks via the CAN
protocol have been studied using deep learning models, such as CNN, RNN, and LSTM …

SIDiLDNG: A similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN

J Song, G Qin, Y Liang, J Yan, M Sun - Computers & Security, 2024 - Elsevier
Due to the absence of encryption and authentication mechanisms in the Controller Area
Network (CAN), it is highly susceptible to attacks, especially with the increasing connectivity …

Meta-IDS: Meta-Learning Based Smart Intrusion Detection System for Internet of Medical Things (IoMT) Network

U Zukaib, X Cui, C Zheng, M Hassan… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) plays a crucial role in advancing smart healthcare by
facilitating the real-time collection and processing of medical data. These interconnected …

Intrusion Detection System for Vehicular Networks Based on MobileNetV3

S Wang, Y Wang, B Zheng, J Cheng, Y Su… - IEEE Access, 2024 - ieeexplore.ieee.org
With the advancement and refinement of intelligence and connectivity, intelligent connected
vehicles have emerged as a prominent trend in contemporary development. Consequently …

Enhancing CAN-FD Security with an Ensemble Learning Approach for Intrusion Detection

MS Sreelekshmi, S Aji - 2023 4th International Conference on …, 2024 - ieeexplore.ieee.org
As the integration of advanced technologies in vehicular systems continues to rise, the risk
of cyber threats to in-vehicle networks is also becoming a critical concern. Intrusion detection …

Multiple Attack Detection Using SHAP and Heterogeneous Ensemble Model in the UAV's Controller Area Network

YW Hong, DY Yoo - 2024 - preprints.org
Recently, methods to detect DoS and spoofing attacks that occur on in-vehicle networks
using CAN Protocol are being studied through deep learning models such as CNN, RNN …

Real-time intrusion detection in CAN-bus networks: Addressing zero-day attacks through feature engineering

J Rendel, W Balte - 2024 - diva-portal.org
The introduction of modern connected vehicles has led to increased safety and comfort. It
also introduces new attack surfaces that could be exploited by malicious actors during an …

Design and Verification Test of T-Box Based on Lightweight Dynamic Heterogeneous Redundant Environment

Y Peng - papers.ssrn.com
Abstract Telematics BOX (T-BOX) is the core component for connecting intra-vehicle and
inter-vehicle networks, which is also the component extremely vulnerable to cyber attacks …