Anomaly detection based on tiny machine learning: A review

YY Siang, MR Ahamd, MSZ Abidin - Open International Journal of …, 2021 - oiji.utm.my
Anomaly detection (AD) is the detection of patterns in data under expected behavior. In an
industrial environment, any equipment or system that breaks down will affect productivity …

Probabilistic threat detection for risk management in cyber-physical medical systems

A Rao, N Carreón, R Lysecky, J Rozenblit - IEEE Software, 2017 - ieeexplore.ieee.org
Medical devices are complex cyber-physical systems incorporating emergent hardware and
software components. However, this complexity leads to a wide attack surface posing …

Detecting payload attacks on programmable logic controllers (plcs)

H Yang, L Cheng, MC Chuah - 2018 IEEE Conference on …, 2018 - ieeexplore.ieee.org
Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS).
Providing hardware peripherals and firmware support for control programs (ie, a PLC's …

Prediction of abnormal temporal behavior in real-time systems

M Hamad, ZAH Hammadeh, S Saidi… - Proceedings of the 33rd …, 2018 - dl.acm.org
Ensuring security in real-time and safety-critical systems is becoming extremely challenging,
in particular due to the increasingly connectivity of these systems, such as in emerging …

Time and sequence integrated runtime anomaly detection for embedded systems

S Lu, R Lysecky - ACM Transactions on Embedded Computing Systems …, 2017 - dl.acm.org
Network-connected embedded systems grow on a large scale as a critical part of Internet of
Things, and these systems are under the risk of increasing malware. Anomaly-based …

Justification of a neuron-adaptive activation function

S Xu, M Zhang - Proceedings of the IEEE-INNS-ENNS …, 2000 - ieeexplore.ieee.org
An empirical justification of a neuron-adaptive activation function for feedforward neural
networks has been proposed in this paper. Simulation results reveal that feedforward neural …

Context-aware security modes for medical devices

M Riegler, J Sametinger… - 2022 Annual Modeling …, 2022 - ieeexplore.ieee.org
Medical devices require the provision of life-critical functionality even under adverse
conditions. We imagine to model (at design time) and to switch (at run-time) security modes …

Using hardware performance counters to detect control hijacking attacks

M Yu, B Halak, M Zwolinski - 2019 IEEE 4th International …, 2019 - ieeexplore.ieee.org
Code reuse techniques can circumvent existing security measures. For example, attacks
such as Return Oriented Programming (ROP) use fragments of the existing code base to …

[PDF][PDF] A multilayer secure framework for vehicular systems

M Hamad - 2020 - leopard.tu-braunschweig.de
In recent years, significant developments were introduced within the vehicular domain,
evolving the vehicles to become a network of many embedded systems distributed …

Resilient context-aware medical device security

J Sametinger, C Steinwender - 2017 International Conference …, 2017 - ieeexplore.ieee.org
Medical devices have become indispensable for millions of patients worldwide. They
increasingly depend on software and interoperate with other devices wirelessly and through …