[HTML][HTML] Analysis of cyber security attacks and its solutions for the smart grid using machine learning and blockchain methods

T Mazhar, HM Irfan, S Khan, I Haq, I Ullah, M Iqbal… - Future Internet, 2023 - mdpi.com
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid
has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the …

Byzantine machine learning: A primer

R Guerraoui, N Gupta, R Pinot - ACM Computing Surveys, 2023 - dl.acm.org
The problem of Byzantine resilience in distributed machine learning, aka, Byzantine
machine learning, consists in designing distributed algorithms that can train an accurate …

[HTML][HTML] Global digital convergence: Impact of cybersecurity, business transparency, economic transformation, and AML efficiency

A Kuzior, T Vasylieva, O Kuzmenko… - Journal of Open …, 2022 - mdpi.com
The article substantiates the existence of convergence processes in the field of digitization of
countries, taking into account the number of Internet users; people with advanced skills; and …

[HTML][HTML] Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies

M Nankya, R Chataut, R Akl - Sensors, 2023 - mdpi.com
Industrial Control Systems (ICS), which include Supervisory Control and Data Acquisition
(SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers …

[HTML][HTML] An intelligent context-aware threat detection and response model for smart cyber-physical systems

Z Noor, S Hina, F Hayat, GA Shah - Internet of Things, 2023 - Elsevier
Smart cities, businesses, workplaces, and even residences have all been converged by the
Internet of Things (IoT). The types and characteristics of these devices vary depending on …

Siber Güvenlikte Yapay Zekanın Rolü ve Önemi: Bir Derleme

MM Mıjwıl, E Sadıkoğlu, E Cengiz, H Candan - Veri Bilimi, 2022 - dergipark.org.tr
Yapay zeka teknolojileri, siber güvenlik de dahil olmak üzere birçok alanı kapsamaktadır.
Siber güvenliğin temel amacı; bilişim sistemlerini bilgisayar korsanları tarafından …

[HTML][HTML] Combining Markov and Semi-Markov modelling for assessing availability and cybersecurity of cloud and IoT systems

V Kharchenko, Y Ponochovnyi, O Ivanchenko… - Cryptography, 2022 - mdpi.com
This paper suggests a strategy (C5) for assessing cloud and IoT system (CIS) dependability,
availability, and cybersecurity based on the continuous collection, comparison, choice, and …

Deep learning technology of computer network security detection based on artificial intelligence

Q Liu, T Zhang - Computers and Electrical Engineering, 2023 - Elsevier
With the continuous progress of the information age and science and technology, how to
combine complex and changeable data with self-protection ability has become an urgent …

[HTML][HTML] CybAttT: A Dataset of Cyberattack News Tweets for Enhanced Threat Intelligence

H Lughbi, M Mars, K Almotairi - Data, 2024 - mdpi.com
The continuous developments in information technologies have resulted in a significant rise
in security concerns, including cybercrimes, unauthorized access, and cyberattacks …

Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation

MA Khatun, SF Memon, C Eising, LL Dhirani - IEEE Access, 2023 - ieeexplore.ieee.org
The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-
driven infrastructure that highly relies on smart sensing devices (ie, blood pressure monitors …