Multi‐aspects AI‐based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview

IH Sarker - Security and Privacy, 2023 - Wiley Online Library
Due to the rising dependency on digital technology, cybersecurity has emerged as a more
prominent field of research and application that typically focuses on securing devices …

[HTML][HTML] A new two-phase intrusion detection system with Naïve Bayes machine learning for data classification and elliptic envelop method for anomaly detection

M Vishwakarma, N Kesswani - Decision Analytics Journal, 2023 - Elsevier
Technology is pivotal in the rapid growth of services and intensifying the quality of life.
Recent technology, like the Internet of Things (IoT), demonstrates an impressive …

Combining multi-agent systems and Artificial Intelligence of Things: Technical challenges and gains

PH Luzolo, Z Elrawashdeh, I Tchappi, S Galland… - Internet of Things, 2024 - Elsevier
Abstract A Multi-Agent System (MAS) usually refers to a network of autonomous agents that
interact with each other to achieve a common objective. This system is therefore composed …

[HTML][HTML] Smart home anomaly-based IDS: Architecture proposal and case study

A Lara, V Mayor, R Estepa, A Estepa, JE Díaz-Verdejo - Internet of Things, 2023 - Elsevier
The complexity and diversity of the technologies involved in the Internet of Things (IoT)
challenge the generalization of security solutions based on anomaly detection, which should …

Integration of IoT and Blockchain for Smart and Secured Supply Chain Management: Case Studies of China

P Yu, Z Liu, E Hanes, J Mumtaz - Utilizing Blockchain Technologies …, 2022 - igi-global.com
This chapter will focus on the combination of supply chain management and digital
technology. Starting from the popular digital terms in the current market, the authors examine …

Oblivious network intrusion detection systems

MAH Sayed, M Taha - Scientific Reports, 2023 - nature.com
A main function of network intrusion detection systems (NIDSs) is to monitor network traffic
and match it against rules. Oblivious NIDSs (O-NIDS) perform the same tasks of NIDSs but …

On the way to automatic exploitation of vulnerabilities and validation of systems security through security chaos engineering

S Palacios Chavarro, P Nespoli, D Díaz-López… - Big Data and Cognitive …, 2022 - mdpi.com
Software is behind the technological solutions that deliver many services to our society,
which means that software security should not be considered a desirable feature anymore …

Machine Learning Based Intrusion Detection System

R Udayakumar, D Balakrishnan… - 2023 3rd …, 2023 - ieeexplore.ieee.org
In today's digital landscape, the increasing frequency and sophistication of cyberattacks
have highlighted the necessity for robust intrusion detection systems (IDS) to safe-guard …

On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT

MWP Shuvo, MN Hoq, S Majumdar… - … Conference on Research …, 2023 - Springer
Even though there exist a number of security guidelines and recommendations from various
worldwide standardization authorities (eg, NIST, ISO, ENISA), it is evident from many of the …

MalSEIRS: Forecasting malware spread based on compartmental models in epidemiology

I Martínez Martínez, A Florián Quitián… - …, 2021 - Wiley Online Library
Over the last few decades, the Internet has brought about a myriad of benefits to almost
every aspect of our daily lives. However, malware attacks have also widely proliferated …