Smart anomaly detection in sensor systems: A multi-perspective review

L Erhan, M Ndubuaku, M Di Mauro, W Song, M Chen… - Information …, 2021 - Elsevier
Anomaly detection is concerned with identifying data patterns that deviate remarkably from
the expected behavior. This is an important research problem, due to its broad set of …

Supervised feature selection techniques in network intrusion detection: A critical review

M Di Mauro, G Galatro, G Fortino, A Liotta - Engineering Applications of …, 2021 - Elsevier
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …

[HTML][HTML] A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks

JF Balarezo, S Wang, KG Chavez, A Al-Hourani… - … Science and Technology …, 2022 - Elsevier
Abstract Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks have been
one of the biggest threats against communication networks and applications throughout the …

Honeypot detection strategy against advanced persistent threats in industrial internet of things: A prospect theoretic game

W Tian, M Du, X Ji, G Liu, Y Dai… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Software-defined networking (SDN) has become a promising trend for managing the
Industrial Internet of Things (IIoT) devices. As the core of sensitive data storage and …

A game-theoretic method for defending against advanced persistent threats in cyber systems

L Zhang, T Zhu, FK Hussain, D Ye… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Advanced persistent threats (APTs) are one of today's major threats to cyber security. Highly
determined attackers along with novel and evasive exfiltration techniques mean APT attacks …

Modeling, Critical Threshold, and Lowest-Cost Patching Strategy of Malware Propagation in Heterogeneous IoT Networks

X Wang, X Zhang, S Wang, J Xiao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In heterogeneous Internet of Things (IoT) networks, various communication technologies
lead to different transmission ranges of nodes, and they can cooperatively provide seamless …

Adversarial Kendall's model towards containment of distributed cyber-threats

P Addesso, M Barni, M Di Mauro… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This work examines propagation of cyber-threats over networks under an adversarial
formulation. Exploiting Kendall's birth-death-immigration model, we propose an analytical …

Asymptotic Nash Equilibrium for the M-Ary Sequential Adversarial Hypothesis Testing Game

J Pan, Y Li, VYF Tan - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
In this paper, we consider a novel-ary sequential hypothesis testing problem in which an
adversary is present and perturbs the distributions of the samples before the decision maker …

Design and Analysis of an Individual-Based Model for Malware Propagation on IoT Networks

A Martín del Rey - Mathematics, 2023 - mdpi.com
The main goal of this work is to propose a novel compartmental SEA (Susceptible–Exposed–
Attacked) model to simulate malware spreading on an IoT (Internet of Things) network. This …

Sensitivity analysis for vulnerability mitigation in hybrid networks

A Ur-Rehman, I Gondal, J Kamruzzaman, A Jolfaei - Electronics, 2022 - mdpi.com
The development of cyber-assured systems is a challenging task, particularly due to the cost
and complexities associated with the modern hybrid networks architectures, as well as the …