A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

SCADA intrusion detection scheme exploiting the fusion of modified decision tree and Chi-square feature selection

LAC Ahakonye, CI Nwakanma, JM Lee, DS Kim - Internet of Things, 2023 - Elsevier
The industrial internet of things (IIoT) and supervisory control and data acquisition (SCADA)
have experienced ubiquitous growth recently. This growth comes with the challenge of an …

Agnostic CH-DT technique for SCADA network high-dimensional data-aware intrusion detection system

LAC Ahakonye, CI Nwakanma… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The pervasiveness in the Industrial Internet of Things (IIoT) due to the application of
supervisory control and data acquisition (SCADA) has led to the growth of heterogeneous …

A holistic assessment of spatiotemporal variation, driving factors, and risks influencing river water quality in the northeastern Qinghai-Tibet Plateau

X Wang, X Liu, L Wang, J Yang, X Wan… - Science of The Total …, 2022 - Elsevier
Abstract The Qinghai-Tibet Plateau (QTP) is the source for many of the most important rivers
in Asia. It is also an essential ecological barrier in China and has the characteristic of …

[HTML][HTML] Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security

NO Aljehane, HA Mengash, MM Eltahir… - Alexandria Engineering …, 2024 - Elsevier
Network security is essential to our daily communications and networks. Cybersecurity
researchers initiate the significance of emerging proficient network intrusion detection …

Landscape of learning techniques for intrusion detection system in IoT: A systematic literature review

A Khacha, Z Aliouat, Y Harbi, C Gherbi… - Computers and …, 2024 - Elsevier
The IoT has interconnected devices that collaborate via the Internet. Yet, its widespread
connectivity and data generation pose cybersecurity risks. Integrating robust intrusion …

Nested ensemble selection: An effective hybrid feature selection method

F Kamalov, H Sulieman, S Moussa, JA Reyes… - Heliyon, 2023 - cell.com
It has been shown that while feature selection algorithms are able to distinguish between
relevant and irrelevant features, they fail to differentiate between relevant and redundant …

Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network

B Meenakshi, D Karunkuzhali - Computer Standards & Interfaces, 2024 - Elsevier
Wireless sensor network (WSN) is a multi-hop and self-organizing wireless network consists
of fixed or moving sensors, this is one of the key components of the cyber physical system. It …

Intelligent IDS in wireless sensor networks using deep fuzzy convolutional neural network

S Subramani, M Selvi - Neural Computing and Applications, 2023 - Springer
The intrusion detection systems (IDSs) developed based on classification algorithms for
securing wireless sensor networks (WSNs) are unable to attain the required detection …

Hierarchical intrusion detection system for secured military drone network: A perspicacious approach

VU Ihekoronye, SO Ajakwe, DS Kim… - MILCOM 2022-2022 …, 2022 - ieeexplore.ieee.org
The significant proliferation of the Internet of drone (IoD) network due to its enormous
benefits in adverse terrains has become crucial in military operations, especially for swift …