Assessing aircraft security: A comprehensive survey and methodology for evaluation

E Habler, R Bitton, A Shabtai - ACM Computing Surveys, 2023 - dl.acm.org
The sophistication and complexity of cyber attacks and the variety of targeted platforms have
grown in recent years. Adversaries are targeting a wide range of platforms, eg, enterprise …

Dynamic multi-scale topological representation for enhancing network intrusion detection

M Zhong, M Lin, Z He - Computers & Security, 2023 - Elsevier
Network intrusion detection systems (NIDS) play a crucial role in maintaining network
security. However, current NIDS techniques tend to neglect the topological structures of …

An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection

MA Khan, N Iqbal, H Jamil, DH Kim - Journal of Network and Computer …, 2023 - Elsevier
Traditional ML based IDS cannot handle high-speed and ever-evolving attacks.
Furthermore, these traditional IDS face several common challenges, such as processing …

Intrusion detection for maritime transportation systems with batch federated aggregation

W Liu, X Xu, L Wu, L Qi, A Jolfaei… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
As a fast-growing and promising technology, Internet of Things (IoT) significantly promotes
the informationization and intelligentization of Maritime Transportation System (MTS). The …

The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?

F Teichmann, SR Boticiu, BS Sergi - International Cybersecurity Law …, 2023 - Springer
This article aims to analyze the current unpredictable cyber climate. In particular, Russia's
invasion of Ukraine has heightened concerns about security incidents, and ransomware …

Evaluating the cybersecurity risk of real-world, machine learning production systems

R Bitton, N Maman, I Singh, S Momiyama… - ACM Computing …, 2023 - dl.acm.org
Although cyberattacks on machine learning (ML) production systems can be harmful, today,
security practitioners are ill-equipped, lacking methodologies and tactical tools that would …

An enhanced intrusion detection system for IoT networks based on deep learning and knowledge graph

X Yang, G Peng, D Zhang, Y Lv - Security and Communication …, 2022 - Wiley Online Library
Nowadays, the intrusion detection system (IDS) plays a crucial role in the Internet of Things
(IoT) networks, which could effectively protect sensitive data from various attacks. However …

Anomaly detection in operating system logs with deep learning-based sentiment analysis

H Studiawan, F Sohel, C Payne - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The purpose of sentiment analysis is to detect an opinion or polarity in text data. We can
apply such an analysis to detect negative sentiment, which represents the anomalous …

Ada: Adaptive deep log anomaly detector

Y Yuan, SS Adhatarao, M Lin, Y Yuan… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
Large private and government networks are often subjected to attacks like data extrusion
and service disruption. Existing anomaly detection systems use offline supervised learning …

An efficient Sheep Flock Optimization-based hybrid deep RaNN for secure and enhanced video transmission quality

RB Benisha - Neural Computing and Applications, 2023 - Springer
Video communication gained wide popularity since it offers a more real-time mode of face-to-
face interaction. This paper mainly aims to enhance the video transmission quality of …