Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

Edge intelligence: Empowering intelligence to the edge of network

D Xu, T Li, Y Li, X Su, S Tarkoma, T Jiang… - Proceedings of the …, 2021 - ieeexplore.ieee.org
Edge intelligence refers to a set of connected systems and devices for data collection,
caching, processing, and analysis proximity to where data are captured based on artificial …

Efficient cyber attack detection in industrial control systems using lightweight neural networks and pca

M Kravchik, A Shabtai - IEEE transactions on dependable and …, 2021 - ieeexplore.ieee.org
Industrial control systems (ICSs) are widely used and vital to industry and society. Their
failure can have severe impact on both the economy and human life. Hence, these systems …

CNN based method for the development of cyber-attacks detection algorithms in industrial control systems

D Nedeljkovic, Z Jakovljevic - Computers & Security, 2022 - Elsevier
Extensive communication between smart devices in contemporary Industrial Control
Systems (ICS) opens up a vast area for different cyber-attacks and malicious threats. The …

{SAVIOR}: Securing autonomous vehicles with robust physical invariants

R Quinonez, J Giraldo, L Salazar, E Bauman… - 29th USENIX security …, 2020 - usenix.org
Autonomous Vehicles (AVs), including aerial, sea, and ground vehicles, assess their
environment with a variety of sensors and actuators that allow them to perform specific tasks …

A dual-isolation-forests-based attack detection framework for industrial control systems

M Elnour, N Meskin, K Khan, R Jain - IEEE Access, 2020 - ieeexplore.ieee.org
The cybersecurity of industrial control systems (ICSs) is becoming increasingly critical under
the current advancement in the cyber activity and the Internet of Things (IoT) technologies …

[PDF][PDF] Evasion attacks and defenses on smart home physical event verification

MO Ozmen, R Song, H Farrukh, ZB Celik - Network and Distributed …, 2023 - par.nsf.gov
In smart homes, when an actuator's state changes, it sends an event notification to the IoT
hub to report this change (eg, the door is unlocked). Prior works have shown that event …

Log-based anomaly detection with robust feature extraction and online learning

S Han, Q Wu, H Zhang, B Qin, J Hu… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Cloud technology has brought great convenience to enterprises as well as customers.
System logs record notable events and are becoming valuable resources to track and …

Rapp: Novelty detection with reconstruction along projection pathway

KH Kim, S Shim, Y Lim, J Jeon, J Choi… - International …, 2019 - openreview.net
We propose RaPP, a new methodology for novelty detection by utilizing hidden space
activation values obtained from a deep autoencoder. Precisely, RaPP compares input and …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …