A threat hunting framework for industrial control systems

Z Jadidi, Y Lu - IEEE Access, 2021 - ieeexplore.ieee.org
An Industrial Control System (ICS) adversary often takes different actions to exploit
vulnerabilities, pass the border between Information Technology (IT) and Operational …

Cyber-attack detection in cyber-physical systems using supervised machine learning

P Semwal, A Handa - Handbook of Big Data Analytics and Forensics, 2022 - Springer
Abstract Cyber-Physical Systems (CPS) are where the physical processes are controlled by
computation and other technology components. Although, the collaboration of the computer …

Fuzzy Bayesian learning for cyber threat hunting in industrial control systems

K Marsh, SE Gharghasheh - Handbook of big data analytics and forensics, 2022 - Springer
Threat hunting involves actively searching for cybersecurity threats in a system or network,
as opposed to passively detecting threats based on previously seen data. This is most …

Machine learning for OSX malware detection

AC Chen, K Wulff - Handbook of Big Data Analytics and Forensics, 2022 - Springer
The number of users choosing Apple desktops and laptops has increased significantly over
the past recent years. Moreover, this trend is set to continue as Apple makes inroads into the …

An improved pre-exploitation detection model for Android malware attacks

HSA Al Besher, BAS Al-Rimy - … Technology and Applied …, 2024 - researchportal.port.ac.uk
This paper presents an innovative approach to the early detection of Android malware,
focusing on a dynamic pre-exploitation phase identification system. Traditional methods …