A novel online Compromised Device Identification System (CDIS) is presented to identify IoT devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources …
IoT networks handle incoming packets from large numbers of IoT Devices (IoTDs) to IoT Gateways. This can lead to the IoT Massive Access Problem that causes buffer overflow …
In an era ruled by data and information, engineers need new tools to cope with the increased complexity of industrial operations. New architectural models for industry enable …
M Çağlayan - Infocommunications Journal, 2022 - avesis.yasar.edu.tr
This paper reviews research from several EU Projects that have addressed cybersecurity using techniques based on Machine Learning, including the security of Mobile Networks …
E Gelenbe, M Nakɩp - 2022 30th International Symposium on …, 2022 - ieeexplore.ieee.org
Malicious network attacks are a serious source of concern, and machine learning techniques are widely used to build Attack Detectors with off-line training with real attack and …
A Elhadeedy, J Daily - 2024 IEEE International Systems …, 2024 - ieeexplore.ieee.org
Driverless vehicles are complex to develop due to the number of systems required for safe and secure autonomous operation. Autonomous vehicles embody the definition of a system …
J Csatár, G Péter, T Holczer - Infocommunications Journal, 2023 - real.mtak.hu
IEC 60870-5-104 is a widely used protocol for telecontrol in European power systems. However, security was not a design goal when it was originally published: This protocol …
V K. Soman, V Natarajan - IET Information Security, 2024 - Wiley Online Library
The data transmission and data retrieval process from the cloud is a critical issue because of cyber‐attacks. The data in the cloud is highly vulnerable and may fall prey to hackers. The …
Mission-criticalal Internet of Things (IoT)-based networks are increasingly employed in daily and industrial infrastructures. The resilience of such networks is crucial. Given IoT networks' …