A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets

PMS Sánchez, JMJ Valero, AH Celdrán… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …

A survey on observability of distributed edge & container-based microservices

M Usman, S Ferlin, A Brunstrom, J Taheri - IEEE Access, 2022 - ieeexplore.ieee.org
Edge computing is proposed as a technical enabler for meeting emerging network
technologies (such as 5G and Industrial Internet of Things), stringent application …

Siamese neural network based few-shot learning for anomaly detection in industrial cyber-physical systems

X Zhou, W Liang, S Shimizu, J Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the increasing population of Industry 4.0, both AI and smart techniques have been
applied and become hotly discussed topics in industrial cyber-physical systems (CPS) …

Detection of low-frequency and multi-stage attacks in industrial internet of things

X Li, M Xu, P Vijayakumar, N Kumar… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The increasingly sophisticated cyber attacks have become a serious challenge for Industrial
Internet of Things (IIoT), which presents two new characteristics: low frequency and multi …

Adversarial training of LSTM-ED based anomaly detection for complex time-series in cyber-physical-social systems

H Zhu, S Liu, F Jiang - Pattern Recognition Letters, 2022 - Elsevier
With the development and maturity of smart cities, more and more Cyber-Physical-Social
Systems (CPSSs) need to monitor a variety of time-series data from sensors and network …

Accurate Anomaly Detection with Energy-Efficiency in IoT-Edge-Cloud Collaborative Networks

Y Li, Z Zhou, X Xue, D Zhao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the applicability of edge intelligence in various domains, anomaly detection, which
aims to identify unusual and infrequent circumstances, is regarded as a regularly performed …

[PDF][PDF] A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster System.

A Samir, HD Johansen - ICISSP, 2023 - scitepress.org
Misconfiguration of IoT edge devices and containerized backend components can lead to
various complications like performance degradation, non-compliant data flows, and external …

A systematic review on anomaly detection for cloud computing environments

T Hagemann, K Katsarou - Proceedings of the 2020 3rd Artificial …, 2020 - dl.acm.org
The detection of anomalies in data is a far-reaching field of research which also applies to
the field of cloud computing in several different ways: from the detection of various types of …

Oppositional tunicate fuzzy C‐means algorithm and logistic regression for intrusion detection on cloud

P Kanimozhi… - … : Practice and Experience, 2022 - Wiley Online Library
Cloud computing is the most popular emerging computational model in information
technology. The data communication security requirement is increased day by day with the …

A real-time adaptive network intrusion detection for streaming data: a hybrid approach

MM Saeed - Neural Computing and Applications, 2022 - Springer
This study aimed at improving the performance of classifiers when trained to identify
signatures of unknown attacks. Furthermore, this paper addresses the following …