A Survey on Graph Neural Networks for Intrusion Detection Systems: Methods, Trends and Challenges

M Zhong, M Lin, C Zhang, Z Xu - Computers & Security, 2024 - Elsevier
Intrusion detection systems (IDS) play a crucial role in maintaining network security. With the
increasing sophistication of cyber attack methods, traditional detection approaches are …

[PDF][PDF] A Categorical Data Approach for Anomaly Detection in WebAssembly Applications.

T Heinrich, NC Will, RR Obelheiro, CA Maziero - ICISSP, 2024 - scitepress.org
The security of Web Services for users and developers is essential; since WebAssembly is a
new format that has gained attention in this type of environment over the years, new …

Process-aware intrusion detection in mqtt networks

P Empl, F Böhm, G Pernul - … of the Fourteenth ACM Conference on Data …, 2024 - dl.acm.org
Intrusion Detection Systems (IDS) allow for detecting malicious activities in organizational
networks and hosts. As the Industrial Internet of Things (Industrial IoT) has gained …

Standard specification-based intrusion detection for hierarchical industrial control systems

E Hotellier, F Sicard, J Francq, S Mocanu - Information Sciences, 2024 - Elsevier
In this paper, we develop a specification-based, process-aware, Intrusion Detection System
(IDS) for complex Industrial Control Systems (ICSs). Complex ICSs are distributed and …

Risk and threat mitigation techniques in internet of things (IoT) environments: a survey

M Salayma - Frontiers in The Internet of Things, 2024 - frontiersin.org
Security in the Internet of Things (IoT) remains a predominant area of concern. Although
several other surveys have been published on this topic in recent years, the broad spectrum …

A Novel Feature Encoding Scheme for Machine Learning Based Malware Detection Systems.

V Das, BB Nair, R Thiruvengadathan - IEEE Access, 2024 - ieeexplore.ieee.org
Malware detection is an ever-evolving area given that the strides in the detection capabilities
being matched by radical attempts to bypass the detection. As the sophistication of malware …

A model-based approach for self-adaptive security in CPS: Application to smart grids

S Chehida, E Rutten, G Giraud, S Mocanu - Journal of Systems …, 2024 - Elsevier
Security risk assessment is an important challenge in the design of Cyber Physical Systems
(CPS). Even more importantly, the intrinsically dynamical nature of these systems, due to …

Outlier based intrusion detection in databases for user behaviour analysis using weighted sequential pattern mining

I Singh, R Jindal - International Journal of Machine Learning and …, 2024 - Springer
With the rise of traffic over wide networks, particularly the internet, and the cloud-based
transactions and interactions, database security is important for any organisation. The …

A Quantum-Safe Software-Defined Deterministic Internet of Things (IoT) with Hardware-Enforced Cyber-security for Critical Infrastructures

TH Szymanski - Information, 2024 - mdpi.com
The next-generation “Industrial Internet of Things”(IIoT) will support “Machine-to-
Machine”(M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and …

Data Security Framework for Protecting Data in Transit and Data at Rest in the Cloud

PN Swanzy, AM Abukari… - Current Journal of …, 2024 - article.researchpromo.com
Data stored in the cloud is particularly vulnerable to attacks, especially when at rest or in
transit. This makes the security of data in the cloud in terms of its integrity, confidentiality and …