Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study

K Zarzycki, P Chaber, K Cabaj, M Ławryńczuk… - Sensors, 2023 - mdpi.com
This work is concerned with the vulnerability of a network industrial control system to cyber-
attacks, which is a critical issue nowadays. This is because an attack on a controlled process …

Polymorphic adversarial cyberattacks using WGAN

R Chauhan, U Sabeel, A Izaddoost… - Journal of Cybersecurity …, 2021 - mdpi.com
Intrusion Detection Systems (IDS) are essential components in preventing malicious traffic
from penetrating networks and systems. Recently, these systems have been enhancing their …

RADS: a real-time anomaly detection model for software-defined networks using machine learning

M Sneha, AK Kumar, NV Hegde, AS Anish… - International Journal of …, 2023 - Springer
Software-defined networks (SDN) are no more a new technology as many industries are
adopting it in a hybrid or full stack mode. SDN has already proved its technological …

Automated machine learning configuration to learn intrusion detectors on attack-free datasets

O Anser, J François, I Chrisment - 2024 IEEE 49th Conference …, 2024 - ieeexplore.ieee.org
Intrusion detection systems have benefited from Machine Learning (ML) to alleviate the
problem of building and maintaining accurate signatures. Nevertheless, ML solutions face …

A Preference-Driven Malicious Platform Detection Mechanism for Users in Mobile Crowdsensing

H Wang, J Tao, D Chi, Y Gao, Z Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Exploiting mobile crowdsensing to conduct data collection and analysis brings
unprecedented opportunities to promote the development of the Internet of Things (IoT) …

Efficient Cyberattack Detection Methods in Industrial Control Systems

P Marusak, R Nebeluk, A Wojtulewicz, K Cabaj… - Sensors, 2024 - mdpi.com
The article deals with the issue of detecting cyberattacks on control algorithms running in a
real Programmable Logic Controller (PLC) and controlling a real laboratory control plant …

A Filtering Model for Evidence Gathering in an SDN-oriented Digital Forensic and Incident Response Context

MB Jiménez, D Fernández, JE Rivadeneira… - IEEE …, 2024 - ieeexplore.ieee.org
Software-defined networking (SDN) architecture enables flexible and centralized network
management from the controller, making it increasingly attractive in deploying …

A Dynamic Threshold Based Approach forDetecting the Test Limits

C Landin, J Liu, S Tahvili - The Sixteenth International Conference on …, 2021 - diva-portal.org
Finding a balance between meeting the testing goals and testing resources is always a
challenging task. Therefore, employing Machine Learning (ML) techniques for test …

Convolution Neural Network-Based Efficient Development of Intrusion Detection Using Various Deep Learning Approaches

G Gowthami, SS Priscila - Explainable AI Applications for Human …, 2024 - igi-global.com
As internet usage has increased, firewalls and antiviruses are not alone enough to
overcome the attacks and assure the privacy of information in a computer network, which …