A survey on space-air-ground-sea integrated network security in 6G

H Guo, J Li, J Liu, N Tian, N Kato - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Space-air-ground-sea integrated network (SAGSIN), which integrates satellite
communication networks, aerial networks, terrestrial networks, and marine communication …

IoT security: Review, blockchain solutions, and open challenges

MA Khan, K Salah - Future generation computer systems, 2018 - Elsevier
With the advent of smart homes, smart cities, and smart everything, the Internet of Things
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …

Learning k for kNN Classification

S Zhang, X Li, M Zong, X Zhu, D Cheng - ACM Transactions on …, 2017 - dl.acm.org
The K Nearest Neighbor (kNN) method has widely been used in the applications of data
mining and machine learning due to its simple implementation and distinguished …

How machine learning changes the nature of cyberattacks on IoT networks: A survey

E Bout, V Loscri, A Gallais - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has continued gaining in popularity and importance in everyday
life in recent years. However, this development does not only present advantages. Indeed …

Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks

S Hu, D Yue, QL Han, X Xie, X Chen… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
This paper is concerned with the observer-based event-triggered control for a continuous
networked linear system subject to denial-of-service (DoS) attacks, where the attacks are …

A survey of physical layer techniques for secure wireless communications in industry

P Angueira, I Val, J Montalban, Ó Seijo… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y Xiao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …

Input-to-state stabilizing control under denial-of-service

C De Persis, P Tesi - IEEE Transactions on Automatic Control, 2015 - ieeexplore.ieee.org
The issue of cyber-security has become ever more prevalent in the analysis and design of
networked systems. In this paper, we analyze networked control systems in the presence of …

Machine learning-based intrusion detection for smart grid computing: A survey

N Sahani, R Zhu, JH Cho, CC Liu - ACM Transactions on Cyber-Physical …, 2023 - dl.acm.org
Machine learning (ML)-based intrusion detection system (IDS) approaches have been
significantly applied and advanced the state-of-the-art system security and defense …