Survey on intrusion detection systems based on machine learning techniques for the protection of critical infrastructure

A Pinto, LC Herrera, Y Donoso, JA Gutierrez - Sensors, 2023 - mdpi.com
Industrial control systems (ICSs), supervisory control and data acquisition (SCADA) systems,
and distributed control systems (DCSs) are fundamental components of critical infrastructure …

A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

[PDF][PDF] Auto Encoders and Decoders Techniques of Convolutional Neural Network Approach for Image Denoising In Deep Learning

P Chilukuri, JRA Kumar, R Anusuya… - Journal of …, 2022 - pnrjournal.com
Image Denaoising (ID) is the process of eliminating noise from the Images. The noise
present in the images may be caused by various conditions which are practically hard to …

Detection of TCP, UDP and ICMP DDOS attacks in SDN Using Machine Learning approach

R Anusuya, MR Prabhu, C Prathima… - Journal of Survey in …, 2023 - sifisheriessciences.com
Abstract Software Defined Networking (SDN) is an architecture for the network to control
centrally through programmed software applications. SDN enables the programming …

[PDF][PDF] Stacking Dilated CNN Authorized Secured Protocol for IoT Security

DR Anusuya - Journal of Science, Computing and Engineering …, 2022 - jscer.org
In IoT arrange is the technique for transferring new code or modifying the reasonableness of
existing code. For security reasons, each code update ought to be authenticated to ignore …

[PDF][PDF] Study Analysis of Cloud Security Chanllenges and Issues in Cloud Computing Technologies

JR Arunkumar - Journal of Science, Computing and Engineering …, 2023 - jscer.org
Cloud computing describes effective computing services provided by a third-party
organization known as cloud service provider for organizations to perform different tasks …

Multi-label scene classification on remote sensing imagery using modified Dingo optimizer with deep learning

M Ragab - IEEE Access, 2023 - ieeexplore.ieee.org
Multi-label scene classification on remote sensing imagery (RSI) includes the classification
of images into multiple categories or labels, where each image belongs to more than one …

[PDF][PDF] Design and Study Analysis Automated Recognition system of Fake Currency Notes

SR Krishna Veni, R Anusuya - Journal of Science, Computing and …, 2023 - jscer.org
Fake Currency has always been a drag which has created plenty of problems within the
market. The increasing technological advancements have made the likelihood for creating …

[PDF][PDF] Computer-Aided Design for skin disease Identification and Categorization Using Image Processing

G Charulatha, R Dineskkumar, B Kaleeswari… - Journal of Science …, 2023 - jscer.org
One of the many significant prevalent illnesses is skin disease. Features extraction is
essential for supporting the categorization of skin illnesses in skin disease detection. The …

[PDF][PDF] Network Intrusion Traffic Detection Based on Feature Extraction.

X Yu, Y Huang, Y Zhang, M Song… - Computers, Materials & …, 2024 - cdn.techscience.cn
With the increasing dimensionality of network traffic, extracting effective traffic features and
improving the identification accuracy of different intrusion traffic have become critical in …