Intelligent fog computing surveillance system for crime and vulnerability identification and tracing

R Rawat, RK Chakrawarti, P Vyas… - International Journal of …, 2023 - igi-global.com
IoT devices generate enormous amounts of data, which deep learning algorithms can learn
from more effectively than shallow learning algorithms. The approach for threat detection …

Global digital convergence: Impact of cybersecurity, business transparency, economic transformation, and AML efficiency

A Kuzior, T Vasylieva, O Kuzmenko… - Journal of Open …, 2022 - mdpi.com
The article substantiates the existence of convergence processes in the field of digitization of
countries, taking into account the number of Internet users; people with advanced skills; and …

Securing smart healthcare cyber-physical systems against blackhole and greyhole attacks using a blockchain-enabled gini index framework

M Javed, N Tariq, M Ashraf, FA Khan, M Asim, M Imran - Sensors, 2023 - mdpi.com
The increasing reliance on cyber-physical systems (CPSs) in critical domains such as
healthcare, smart grids, and intelligent transportation systems necessitates robust security …

[HTML][HTML] Multi-labeling of complex, multi-behavioral malware samples

P García-Teodoro, JA Gómez-Hernández… - Computers & …, 2022 - Elsevier
The use of malware samples is usually required to test cyber security solutions. For that, the
correct typology of the samples is of interest to properly estimate the exhibited performance …

Introducing the CYSAS-S3 dataset for operationalizing a mission-oriented cyber situational awareness

RD Medenou Choumanof, S Llopis Sanchez… - Sensors, 2022 - mdpi.com
The digital transformation of the defence sector is not exempt from innovative requirements
and challenges, with the lack of availability of reliable, unbiased and consistent data for …

ReinforSec: an automatic generator of synthetic malware samples and denial-of-service attacks through reinforcement learning

A Hernandez-Suarez, G Sanchez-Perez… - Sensors, 2023 - mdpi.com
In recent years, cybersecurity has been strengthened through the adoption of processes,
mechanisms and rapid sources of indicators of compromise in critical areas. Among the …

Aiseckg: Knowledge graph dataset for cybersecurity education

G Agrawal - AAAI-MAKE 2023: Challenges Requiring the …, 2023 - par.nsf.gov
Cybersecurity education is exceptionally challenging as it involves learning the complex
attacks; tools and developing critical problem-solving skills to defend the systems. For a …

Network security AIOps for online stream data monitoring

G Nguyen, S Dlugolinsky, V Tran… - Neural Computing and …, 2024 - Springer
In cybersecurity, live production data for predictive analysis pose a significant challenge due
to the inherently secure nature of the domain. Although there are publicly available …

Supervised machine learning for false data injection detection: accuracy sensitivity

J Turanzas, M Alonso, H Amaris, J Gutierrez… - 2023 - IET
Digitalization paves the road for power networks to evolve towards smart grids, where new
intelligent devices are numerous and communication networks are closely interrelated with …

A Network-Based Intrusion Detection System Based on Widely Used Cybersecurity Datasets and State of the Art ML Techniques

E Chondrogiannis, E Karanastasis… - … Conference on Artificial …, 2024 - Springer
Contemporary software systems encompass a multitude of interconnected entities, often
accessible via the Web, making them susceptible to potential malicious activities. Intrusion …