Hybrid Optimization Algorithm for Detection of Security Attacks in IoT-Enabled Cyber-Physical Systems

A Sagu, NS Gill, P Gulia, I Priyadarshini… - … Transactions on Big …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is being prominently used in smart cities and a wide range of
applications in society. The benefits of IoT are evident, but cyber terrorism and security …

Design of an Iterative Method for Malware Detection Using Autoencoders and Hybrid Machine Learning Models

R Beg, RK Pateriya, DS Tomar - IEEE Access, 2024 - ieeexplore.ieee.org
In the evolving cyber threat landscape, one of the most visible and pernicious challenges is
malware activity detection and analysis. Traditional detection and analysis methods face …

A Few to Unveil Them All: Leveraging Mixture of Experts on Minimal Data for Detecting Covert Channels in Containerized Cloud Infrastructures

L Caviglione, M Guarascio, FS Pisani… - 2024 IEEE European …, 2024 - ieeexplore.ieee.org
Containers are fundamental to pursue the vision of cloud-native applications and implement
frameworks taking advantage of the microservice paradigm. Owing to their rapid diffusion …

LC-IPL: locating covert data in the IPv4 header using LSTM

A Dua, V Jindal, P Bedi - International Journal of Information Technology, 2024 - Springer
Abstract Internet Protocol version 4 (IPv4) is the most used Network Layer protocol, thus,
ensuring the security aspect of this protocol is a vital concern. One such aspect includes …

Special issue on intelligent systems: ISMIS 2022 selected papers

M Ceci, S Flesca, G Manco, E Masciari - Journal of Intelligent Information …, 2024 - Springer
Welcome to the special issue on “Intelligent Systems, ISMIS 2022 selected papers”. This
issue contains extended papers from the 2022 edition of the International Symposium on …

[PDF][PDF] Dawn of LLM4Cyber: Current Solutions, Challenges, and New Perspectives in Harnessing LLMs for Cybersecurity

L Caviglione, C Comito, E Coppolillo, D Gallo… - CEUR WORKSHOP …, 2024 - iris.cnr.it
Abstract Large Language Models (LLMs) are now a relevant part of the daily experience of
many individuals. For instance, they can be used to generate text or to support working …

Deep Learning-Based Steganography for Smart Agriculture

CL Chowdhary, S Vijayan - Enhancing Steganography Through …, 2025 - igi-global.com
This chapter explores integrating deep learning-based steganography with machine
learning to enhance crop disease detection and secure data transmission in smart …