A survey on malware analysis and mitigation techniques

SS Chakkaravarthy, D Sangeetha, V Vaidehi - Computer Science Review, 2019 - Elsevier
In recent days, malwares are advanced, sophisticatedly engineered to attack the target. Most
of such advanced malwares are highly persistent and capable of escaping from the security …

A systematic survey on multi-step attack detection

J Navarro, A Deruyver, P Parrend - Computers & Security, 2018 - Elsevier
Since the beginning of the Internet, cyberattacks have threatened users and organisations.
They have become more complex concurrently with computer networks. Nowadays …

Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems

IA Khan, M Keshk, D Pi, N Khan, Y Hussain, H Soliman - Ad Hoc Networks, 2022 - Elsevier
Abstract Industrial Internet of Things (IIoT) networks involves heterogeneous technological
and manufacturing services and devices. The communication and data exchange …

Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks

C Feng, T Li, D Chana - 2017 47th Annual IEEE/IFIP …, 2017 - ieeexplore.ieee.org
We outline an anomaly detection method for industrial control systems (ICS) that combines
the analysis of network package contents that are transacted between ICS nodes and their …

Combating advanced persistent threats: From network event correlation to incident detection

I Friedberg, F Skopik, G Settanni, R Fiedler - Computers & Security, 2015 - Elsevier
An advanced persistent threat (also known as APT) is a deliberately slow-moving
cyberattack that is applied to quietly compromise interconnected information systems without …

Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model

Y Jia, Z Gu, L Du, Y Long, Y Wang, J Li… - Knowledge-Based …, 2023 - Elsevier
Smart cities have attracted a lot of attention from interdisciplinary research, and plenty of
artificial intelligence based solutions have been proposed. However, cyber security has …

HML-IDS: A hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems

IA Khan, D Pi, ZU Khan, Y Hussain, A Nawaz - IEEE Access, 2019 - ieeexplore.ieee.org
Critical infrastructures, eg, electricity generation and dispersal networks, chemical
processing plants, and gas distribution, are governed and monitored by supervisory control …

Time series anomaly detection for smart grids: A survey

JE Zhang, D Wu, B Boulet - 2021 IEEE electrical power and …, 2021 - ieeexplore.ieee.org
With the rapid increase in the integration of renewable energy generation and the wide
adoption of various electric appliances, power grids are now faced with more and more …

Making bertha see

U Franke, D Pfeiffer, C Rabe, C Knoeppel… - Proceedings of the …, 2013 - cv-foundation.org
With the market introduction of the 2014 Mercedes-Benz S-Class vehicle equipped with a
stereo camera system, autonomous driving has become a reality, at least in low speed …

Defending against advanced persistent threats using game-theory

S Rass, S König, S Schauer - PloS one, 2017 - journals.plos.org
Advanced persistent threats (APT) combine a variety of different attack forms ranging from
social engineering to technical exploits. The diversity and usual stealthiness of APT turns …