The evolution of quality assurance and service improvement in satellite telecommunications through analytics: a review of initiatives and their impacts

NA Ochuba, DO Olutimehin, OG Odunaiya… - Engineering Science & …, 2024 - fepbl.com
Satellite telecommunications have undergone significant evolution, driven by the need for
enhanced quality assurance and service improvement. This paper provides a …

Leveraging AI/ML for anomaly detection, threat prediction, and automated response.

OA Ajala - 2024 - preprints.org
The rapid evolution of information and communication technologies, notably the Internet,
has yielded substantial benefits while posing challenges to information system security. With …

Using Ensemble Learning for Anomaly Detection in Cyber–Physical Systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2024 - mdpi.com
The swift embrace of Industry 4.0 paradigms has led to the growing convergence of
Information Technology (IT) networks and Operational Technology (OT) networks …

Unveiling the dynamic landscape of malware sandboxing: A comprehensive review

E Debas, N Alhumam, K Riad - 2023 - preprints.org
In contemporary times, the landscape of malware analysis has advanced into an era of
sophisticated threat detection. Today's malware sandboxes not only conduct rudimentary …

[PDF][PDF] Enhancing Real-Time Malware Analysis with Quantum Neural Networks

T Bikku, SB Chandolu, SP Praveen… - Journal of Intelligent …, 2024 - researchgate.net
Abstract The proposed Quantum Neural Networks (QNN) perform better than traditional
machine learning models. The escalating complexity of malware poses a significant …

Enabling secure and efficient industry 4.0 transformation through trust-authorized anomaly detection in cloud environments with a hybrid AI approach

N Prakash, J Vignesh, M Ashwin, S Ramadass… - Optical and Quantum …, 2024 - Springer
The swift advancement of next-generation technologies for wireless communication has led
to the cloud computing model becoming a more effective technique of data processing. In …

Training neural networks in cyber-physical systems using design space exploration and co-simulation

C Bernardeschi, M Cococcioni… - 2023 International …, 2023 - ieeexplore.ieee.org
In this paper we present our ongoing research aimed at providing methodologies and tools
for reasoning about behavioural properties of AI models in cyber-physical systems. In …

[PDF][PDF] A Study on Cyber security: Analyzing Current Threats, Navigating Complexities, and Implementing Prevention Strategies

A Goni, MUF Jahangir… - International Journal of …, 2024 - researchgate.net
In the intricate landscape of modern cyber threats, encompassing everything from
sophisticated malware to targeted phishing tactics, this scholarly discussion emerges as a …

Securing the IoT Cyber Environment: Enhancing Intrusion Anomaly Detection with Vision Transformers

L Sana, MM Nazir, J Yang, L Hussain, YL Chen… - IEEE …, 2024 - ieeexplore.ieee.org
ABSTRACT Background and Motivation: The ever-expanding Internet of Things (IoT)
landscape presents a double-edged sword. While it fosters interconnectedness, the vast …

Machine Learning-Based Anomaly Detection on Seawater Temperature Data with Oversampling

H Kang, D Kim, S Lim - Journal of Marine Science and Engineering, 2024 - mdpi.com
This study deals with a method for anomaly detection in seawater temperature data using
machine learning methods with oversampling techniques. Data were acquired from 2017 to …