Cybersecurity in intelligent transportation systems

T Mecheva, N Kakanakov - Computers, 2020 - mdpi.com
Intelligent Transportation Systems (ITS) are emerging field characterized by complex data
model, dynamics and strict time requirements. Ensuring cybersecurity in ITS is a complex …

[PDF][PDF] A Survey on Network Security Monitoring: Tools and Functionalities

ZS Younus, M Alanezi - Mustansiriyah Journal of Pure and Applied Sciences, 2023 - iasj.net
Recently, cybersecurity breaches have become more common, with varying levels of impact
ranging from simple to major losses of financial resources or data. The network …

A mathematical analysis about the geo-temporal characterization of the multi-class maliciousness of an IP address

N DeCastro-García, D Escudero García… - Wireless Networks, 2022 - Springer
The degree of severity of a cybersecurity event of potentially malicious activity is crucial to
determine an appropriate response. Machine learning techniques are used to obtain models …

Limiting the size of a predictive blacklist while maintaining sufficient accuracy

S Šuľan, M Husák - Proceedings of the 17th International Conference on …, 2022 - dl.acm.org
Blacklists (blocklists, denylists) of network entities (eg, IP addresses, domain names) are
popular approaches to preventing cyber attacks. However, the limited capacity of active …

Cyber Attacks Against Intelligent Transportation Systems

M Usama, U Ullah, A Sajid - Cyber Security for Next-Generation …, 2024 - taylorfrancis.com
Intelligent transportation systems (ITSs) are becoming increasingly prevalent in modern
transportation infrastructure, providing efficient and safe transportation solutions for cities …

Towards Supercomputing Categorizing the Maliciousness upon Cybersecurity Blacklists with Concept Drift

MV Carriegos, N DeCastro-García… - Computational and …, 2023 - Wiley Online Library
In this article, we have carried out a case study to optimize the classification of the
maliciousness of cybersecurity events by IP addresses using machine learning techniques …

Privacy-enhancing data aggregation and data analytics in wireless networks for a large class of distributed queries

X Yang, A Kelarev, X Yi - Wireless Networks, 2022 - Springer
Privacy-enhancing techniques and protocols for data aggregation and analytics in wireless
networks require the development of novel methods for efficient and privacy-preserving …

Classification of firewall logs actions using machine learning techniques and deep neural network

BA AL-Tarawneh, H Bani-Salameh - AIP Conference Proceedings, 2023 - pubs.aip.org
The analysis of firewall logs is one of the most significant practices considered while
monitoring network traffic to assess their impact. The log records of the Turkish Firat …

Guest Editorial: Special issue on Cognitive computing for web applications

H Lu - Wireless Networks, 2022 - Springer
Cognitive Computing breaks the boundary between two separate fields, neuroscience and
computer science. It paves the way for machines to have reasoning abilities which is …

[PDF][PDF] Research Article Towards Supercomputing Categorizing the Maliciousness upon Cybersecurity Blacklists with Concept Drift

MV Carriegos, N DeCastro-García, D Escudero - 2023 - academia.edu
In this article, we have carried out a case study to optimize the classification of the
maliciousness of cybersecurity events by IP addresses using machine learning techniques …