A survey on deep learning for cybersecurity: Progress, challenges, and opportunities

M Macas, C Wu, W Fuertes - Computer Networks, 2022 - Elsevier
As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …

A review on cybersecurity analysis, attack detection, and attack defense methods in cyber-physical power systems

D Du, M Zhu, X Li, M Fei, S Bu, L Wu… - Journal of Modern …, 2022 - ieeexplore.ieee.org
Potential malicious cyber-attacks to power systems which are connected to a wide range of
stakeholders from the top to tail will impose significant societal risks and challenges. The …

A comprehensive review of cybersecurity in inverter-based smart power system amid the boom of renewable energy

ND Tuyen, NS Quan, VB Linh, V Van Tuyen… - IEEE …, 2022 - ieeexplore.ieee.org
The blossom of renewable energy worldwide and its uncertain nature have driven the need
for a more intelligent power system with the deep integration of smart power electronics. The …

[HTML][HTML] DRaNN_PSO: A deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things

J Ahmad, SA Shah, S Latif, F Ahmed, Z Zou… - Journal of King Saud …, 2022 - Elsevier
Abstract The Industrial Internet of Things (IIoT) is a rapidly emerging technology that
increases the efficiency and productivity of industrial environments by integrating smart …

Attack detection and prevention in IoT-SCADA networks using NK-classifier

Y Justindhas, P Jeyanthi - Soft Computing, 2022 - Springer
Supervisory control and data acquisition (SCADA) stands as a control system consisting of
computers and networked data communications. At present, many industries use SCADA to …

Research on variable pitch control strategy of direct-driven offshore wind turbine using KELM wind speed soft sensor

L Pan, Y Xiong, Z Zhu, L Wang - Renewable Energy, 2022 - Elsevier
This study proposes a modeling method of soft measurement of offshore wind speed using
Kernal Extreme Learning Machine (KELM). The soft measurement model of offshore wind …

Fractional-order convolutional neural networks with population extremal optimization

BP Chen, Y Chen, GQ Zeng, Q She - Neurocomputing, 2022 - Elsevier
This article is devoted to the intelligent optimization issue by means of PEO-FOCNN, ie, the
fractional-order convolutional neural networks (FOCNNs) with population extremal …

A Stable generative adversarial network architecture for network intrusion detection

R Soleymanzadeh, R Kashef - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Many approaches have been proposed for detecting and categorizing malicious activities
over the years. The adversarial training process has recently been applied to solve this task …

A probing signal-based replay attack detection method avoiding control performance degradation

G Na, Y Eun - International Journal of Control, Automation and …, 2022 - Springer
This paper proposes a probing signal-based replay attack detection method that avoids
control performance degradation. Employing probing signals in actuators to detect replay …

Collaborative learning for cyberattack detection in blockchain networks

TV Khoa, DH Son, DT Hoang, NL Trung… - arXiv preprint arXiv …, 2022 - arxiv.org
This article aims to study intrusion attacks and then develop a novel cyberattack detection
framework for blockchain networks. Specifically, we first design and implement a blockchain …