SHARKS: Smart hacking approaches for risk scanning in Internet-of-Things and cyber-physical systems based on machine learning

T Saha, N Aaraj, N Ajjarapu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cyber-physical systems (CPS) and Internet-of-Things (IoT) devices are increasingly being
deployed across multiple functionalities, ranging from healthcare devices and wearables to …

Overview of security for smart cyber-physical systems

F Khalid, S Rehman, M Shafique - Security of Cyber-Physical Systems …, 2020 - Springer
The tremendous growth of interconnectivity and dependencies of physical and cyber
domains in cyber-physical systems (CPS) makes them vulnerable to several security threats …

GRAVITAS: Graphical reticulated attack vectors for Internet-of-Things aggregate security

J Brown, T Saha, NK Jha - IEEE Transactions on Emerging …, 2021 - ieeexplore.ieee.org
Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist of thousands of
devices connected in a complex network topology. The diversity and complexity of these …

Machine learning for security and the internet of things: the good, the bad, and the ugly

F Liang, WG Hatcher, W Liao, W Gao, W Yu - Ieee Access, 2019 - ieeexplore.ieee.org
The advancement of the Internet of Things (IoT) has allowed for unprecedented data
collection, automation, and remote sensing and actuation, transforming autonomous …

Deep learning based attack detection for cyber-physical system cybersecurity: A survey

J Zhang, L Pan, QL Han, C Chen… - IEEE/CAA Journal of …, 2021 - ieeexplore.ieee.org
With the booming of cyber attacks and cyber criminals against cyber-physical systems
(CPSs), detecting these attacks remains challenging. It might be the worst of times, but it …

IoT network security: Threats, risks, and a data-driven defense framework

C Wheelus, X Zhu - IoT, 2020 - mdpi.com
The recent surge in Internet of Things (IoT) deployment has increased the pace of
integration and extended the reach of the Internet from computers, tablets and phones to a …

MEML: Resource-aware MQTT-based machine learning for network attacks detection on IoT edge devices

A Shalaginov, O Semeniuta, M Alazab - Proceedings of the 12th IEEE …, 2019 - dl.acm.org
Growing number of Smart Applications in recent years bring a completely new landscape of
cyber-attacks and exploitation scenario that have not been seen in wild before. Devices in …

Threatzoom: neural network for automated vulnerability mitigation

E Aghaei, E Al-Shaer - Proceedings of the 6th Annual Symposium on Hot …, 2019 - dl.acm.org
Increasing the variety and quantity of cyber threats becoming the evident that traditional
human-in-loop approaches are no longer sufficient to keep systems safe. To address this …

Threat hunting architecture using a machine learning approach for critical infrastructures protection

M Aragonés Lozano, I Pérez Llopis… - Big data and cognitive …, 2023 - mdpi.com
The number and the diversity in nature of daily cyber-attacks have increased in the last few
years, and trends show that both will grow exponentially in the near future. Critical …

Machine learning-based network vulnerability analysis of industrial Internet of Things

M Zolanvari, MA Teixeira, L Gupta… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially
devastating consequences in case of an attack. Machine learning (ML) and big data …