M Keshk, E Sitnikova, N Moustafa… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Protecting Cyber-physical Systems (CPSs) is highly important for preserving sensitive information and detecting cyber threats. Developing a robust privacy-preserving anomaly …
A Binbusayyis, T Vaiyapuri - IEEE Access, 2019 - ieeexplore.ieee.org
In today's interconnected era, intrusion detection system (IDS) has the potential to be the frontier of defense against cyberattacks and plays an essential role in achieving security of …
Current anomaly detection systems (ADSs) apply statistical and machine learning algorithms to discover zero-day attacks, but such algorithms are vulnerable to advanced …
F Gottwalt, E Chang, T Dillon - Computers & Security, 2019 - Elsevier
Recent research on network intrusion detection has focused on correlation-based techniques, which allow one to adapt to continuously changing environments such as the …
A Nagisetty, GP Gupta - 2019 3rd international conference on …, 2019 - ieeexplore.ieee.org
Secure and reliable services of the smart cities are generally depend on the reliable services provided by different devices of the Internet of Things ecosystem and Internet of …
AH Qureshi, H Larijani, J Ahmad, N Mtetwa - … Computing: Proceedings of …, 2019 - Springer
Today, digitally connected devices are involved in every aspect of life due to the advancements in Internet-of-Things (IoT) paradigm. Recently, it has been a driving force for …
We present a method for autonomic intrusion detection and response to optimize processes of cybersecurity in large distributed systems. These environments are characterized by …
TO Oladimeji, CK Ayo… - Journal of Physics …, 2019 - iopscience.iop.org
An insider, also regarded as an employee of a company, becomes a threat when the intention or action can affect the company negatively. Insider threat has been an eminent …
J Zhang, YT Jou, X Li - 2019 - scholarspace.manoa.hawaii.edu
Abstract As Cross-Site Scripting (XSS) remains one of the top web security risks, people keep exploring ways to detect such attacks efficiently. So far, existing solutions only focus on …