Intrusion Detection in Industrial Internet of Things Network‐Based on Deep Learning Model with Rule‐Based Feature Selection
JB Awotunde, C Chakraborty… - … and mobile computing, 2021 - Wiley Online Library
The Industrial Internet of Things (IIoT) is a recent research area that links digital equipment
and services to physical systems. The IIoT has been used to generate large quantities of …
and services to physical systems. The IIoT has been used to generate large quantities of …
Identification of malicious activities in industrial internet of things based on deep learning models
Abstract Internet Industrial Control Systems (IICSs) that connect technological appliances
and services with physical systems have become a new direction of research as they face …
and services with physical systems have become a new direction of research as they face …
Game‐based learning: A review of tabletop exercises for cybersecurity incident response training
The surge in cyber security breaches including the shortage of skilled cyber incident
response (CSIR) professionals and the ever‐changing cyber threat landscape is a big …
response (CSIR) professionals and the ever‐changing cyber threat landscape is a big …
[HTML][HTML] XGBoost for imbalanced multiclass classification-based industrial internet of things intrusion detection systems
The Industrial Internet of Things (IIoT) has advanced digital technology and the fastest
interconnection, which creates opportunities to substantially grow industrial businesses …
interconnection, which creates opportunities to substantially grow industrial businesses …
Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems
Abstract Industrial Internet of Things (IIoT) networks involves heterogeneous technological
and manufacturing services and devices. The communication and data exchange …
and manufacturing services and devices. The communication and data exchange …
Bridging the cyber security skills gap: Using tabletop exercises to solve the CSSG crisis
Recent breaches like the WannaCry ransomware attack in 2017 are evidence of the rapidly
evolving cyber security threat landscape. They demonstrate the ability of cybercriminals to …
evolving cyber security threat landscape. They demonstrate the ability of cybercriminals to …
Learning analytics perspective: Evidencing learning from digital datasets in cybersecurity exercises
K Maennel - 2020 IEEE European symposium on security and …, 2020 - ieeexplore.ieee.org
Cybersecurity exercises are gaining in popularity in university curricula and professional
training paths and are seen as an effective teaching method. Such exercises provide digital …
training paths and are seen as an effective teaching method. Such exercises provide digital …
SCADA testbed for vulnerability assessments, penetration testing and incident forensics
S Krishnan, M Wei - … on Digital Forensics and Security (ISDFS), 2019 - ieeexplore.ieee.org
Industrial control systems are critical assets as they interact with real-life aspects of our daily
life. These systems often run 24/7 to control and monitor critical industrial and infrastructure …
life. These systems often run 24/7 to control and monitor critical industrial and infrastructure …
Design of deep learning models for the identifications of harmful attack activities in IIOT
IICSs, which connect technical systems with physical systems to deliver services to
businesses, have become a new field of study since they are susceptible to various cyber …
businesses, have become a new field of study since they are susceptible to various cyber …
Hardware-in-the-loop labs for SCADA cybersecurity awareness and training
In this paper, we present a SCADA cybersecurity awareness and training program based on
a Hands-On training using two twin cyber-ranges named WonderICS and G-ICS. These labs …
a Hands-On training using two twin cyber-ranges named WonderICS and G-ICS. These labs …