State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

Systematic literature review of security event correlation methods

I Kotenko, D Gaifulina, I Zelichenok - Ieee Access, 2022 - ieeexplore.ieee.org
Security event correlation approaches are necessary to detect and predict incremental
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …

An integrated cyber security risk management framework and risk predication for the critical infrastructure protection

HI Kure, S Islam, H Mouratidis - Neural Computing and Applications, 2022 - Springer
Cyber security risk management plays an important role for today's businesses due to the
rapidly changing threat landscape and the existence of evolving sophisticated cyber attacks …

GRU-based deep learning approach for network intrusion alert prediction

MS Ansari, V Bartoš, B Lee - Future Generation Computer Systems, 2022 - Elsevier
The exponential growth in the number of cyber attacks in the recent past has necessitated
active research on network intrusion detection, prediction and mitigation systems. While …

A holistic review on Cyber-Physical Power System (CPPS) testbeds for secure and sustainable electric power grid–Part–I: Background on CPPS and necessity of …

RV Yohanandhan, RM Elavarasan… - International Journal of …, 2022 - Elsevier
The integration of advanced Information and Communication Technologies (ICTs) in the
conventional electric power grid is evolving into a Cyber-Physical Power System (CPPS) …

Systematic literature review on cyber situational awareness visualizations

L Jiang, A Jayatilaka, M Nasim, M Grobler… - Ieee …, 2022 - ieeexplore.ieee.org
The dynamics of cyber threats are increasingly complex, making it more challenging than
ever for organizations to obtain in-depth insights into their cyber security status. Therefore …

A survey on cyber situation-awareness systems: Framework, techniques, and insights

H Alavizadeh, J Jang-Jaccard, SY Enoch… - ACM Computing …, 2022 - dl.acm.org
Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats that
are equipped with novel approaches to learn the system and propagate themselves, such as …

A cyber–physical–social perspective on future smart distribution systems

Y Wang, CF Chen, PY Kong, H Li… - Proceedings of the …, 2022 - ieeexplore.ieee.org
An increasing number of distributed energy resources (DERs), such as rooftop photovoltaic
(PV), electric vehicles (EVs), and distributed energy storage, are being integrated into the …

[图书][B] Social data analytics

A Beheshti, S Ghodratnama, M Elahi, H Farhood - 2022 - taylorfrancis.com
This book is an introduction to social data analytics along with its challenges and
opportunities in the age of Big Data and Artificial Intelligence. It focuses primarily on …

[HTML][HTML] Two decades of cyberattack simulations: A systematic literature review

V Engström, R Lagerström - Computers & Security, 2022 - Elsevier
Cyberattack simulations appear across multiple computer security domains and are
interpreted in many different but equally viable ways. However, this makes the topic appear …