Application of meta-heuristic algorithms for training neural networks and deep learning architectures: A comprehensive review

M Kaveh, MS Mesgari - Neural Processing Letters, 2023 - Springer
The learning process and hyper-parameter optimization of artificial neural networks (ANNs)
and deep learning (DL) architectures is considered one of the most challenging machine …

A survey on industrial control system testbeds and datasets for security research

M Conti, D Donadel, F Turrin - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs)
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …

HML-IDS: A hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems

IA Khan, D Pi, ZU Khan, Y Hussain, A Nawaz - IEEE Access, 2019 - ieeexplore.ieee.org
Critical infrastructures, eg, electricity generation and dispersal networks, chemical
processing plants, and gas distribution, are governed and monitored by supervisory control …

[HTML][HTML] A novel hybrid ensemble learning for anomaly detection in industrial sensor networks and SCADA systems for smart city infrastructures

YK Saheed, OH Abdulganiyu, TA Tchakoucht - Journal of King Saud …, 2023 - Elsevier
Abstract Critical Infrastructures (CIs) use Supervisory Control and Data Acquisition (SCADA)
systems for monitoring and remote control. Sensor networks are being integrated into all …

Comparative evaluation of ai-based techniques for zero-day attacks detection

S Ali, SU Rehman, A Imran, G Adeem, Z Iqbal, KI Kim - Electronics, 2022 - mdpi.com
Many intrusion detection and prevention systems (IDPS) have been introduced to identify
suspicious activities. However, since attackers are exploiting new vulnerabilities in systems …

Defense against distributed DoS attack detection by using intelligent evolutionary algorithm

S Dwivedi, M Vardhan, S Tripathi - International Journal of …, 2022 - Taylor & Francis
Modern society is prominently dependent on information and communication technology
over the last few decades has carried it with more vulnerability to an enormous variety of …

[HTML][HTML] Optimising Multilayer Perceptron weights and biases through a Cellular Genetic Algorithm for medical data classification

MG Rojas, AC Olivera, PJ Vidal - Array, 2022 - Elsevier
In recent years, technology in medicine has shown a significant advance due to artificial
intelligence becoming a framework to make accurate medical diagnoses. Models like …

A hypergraph based Kohonen map for detecting intrusions over cyber–physical systems traffic

SS Jagtap, SS VS, V Subramaniyaswamy - Future Generation Computer …, 2021 - Elsevier
Abstract Cyber–Physical System acts as a cornerstone in Industry 4.0 by integrating
information-technology, electrical, and mechanical engineering under the same crown. This …

[PDF][PDF] A study on intrusion detection system in wireless sensor networks

S Godala, RPV Vaddella - International Journal of Communication …, 2020 - researchgate.net
The technology of Wireless Sensor Networks (WSNs) has become most significant in
present day. WSNs are extensively used in applications like military, industry, health, smart …

Anomaly Detection in a Smart Industrial Machinery Plant Using IoT and Machine Learning

A Jaramillo-Alcazar, J Govea, W Villegas-Ch - Sensors, 2023 - mdpi.com
In an increasingly technology-driven world, the security of Internet-of-Things systems has
become a top priority. This article presents a study on the implementation of security …