A survey on ai/ml-driven intrusion and misbehavior detection in networked autonomous systems: Techniques, challenges and opportunities
AI/ML-based intrusion detection systems (IDSs) and misbehavior detection systems (MDSs)
have shown great potential in identifying anomalies in the network traffic of networked …
have shown great potential in identifying anomalies in the network traffic of networked …
Botnet detection employing a dilated convolutional autoencoder classifier with the aid of hybrid shark and bear smell optimization algorithm-based feature selection in …
NF Abdulsattar, F Abedi, HMA Ghanimi… - Big Data and Cognitive …, 2022 - mdpi.com
Flying ad hoc networks (FANETs) or drone technologies have attracted great focus recently
because of their crucial implementations. Hence, diverse research has been performed on …
because of their crucial implementations. Hence, diverse research has been performed on …
A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networks
Nowadays, unmanned aerial vehicles (UAVs) organized in a flying ad hoc network (FANET)
can successfully carry out complex missions. Due to the limitations of these networks …
can successfully carry out complex missions. Due to the limitations of these networks …
A Study on Enhancing the Information Security of Urban Traffic Control Systems Using Evolutionary Game Theory
K Pan, L Wang, L Zhang - Electronics, 2023 - mdpi.com
In recent years, there has been significant development in intelligent technologies for urban
traffic control, such as smart city and vehicle-to-everything (V2X) communication. These …
traffic control, such as smart city and vehicle-to-everything (V2X) communication. These …
Transmission Scheduling for Remote State Estimation in CPSs With Two-Hop Networks Subject to DoS Attacks
W Xing, X Zhao - IEEE/ACM Transactions on Networking, 2024 - ieeexplore.ieee.org
In this paper, a dynamic zero-sum game is formulated to describe the power decision-
making process of the sensor/relay and the DoS attacker in cyber-physical systems. The …
making process of the sensor/relay and the DoS attacker in cyber-physical systems. The …
Cybersecurity Threat Analysis And Attack Simulations For Unmanned Aerial Vehicle Networks
C Abdulrazak - arXiv preprint arXiv:2404.16842, 2024 - arxiv.org
Drones, also known as unmanned air vehicles (UAVs), have revolutionised various
industries, from farming to national security.(Wexler., Lesley. 2016) However, their broad use …
industries, from farming to national security.(Wexler., Lesley. 2016) However, their broad use …
Cluster Detection Method of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network.
In order to enhance the accuracy of Air Traffic Control (ATC) cybersecurity attack detection,
in this paper, a new clustering detection method is designed for air traffic control network …
in this paper, a new clustering detection method is designed for air traffic control network …
[PDF][PDF] AI/ML-Driven Intrusion and Misbehavior Detection in Networked Autonomous Systems: A Survey of Common Practices
O Ajibuwa, B Hamdaoui, AA Yavuz - 2023 - ir.library.oregonstate.edu
AI/ML-based intrusion detection systems (IDSs) and misbehavior detection systems (MDSs)
have shown great potential in identifying anomalies in network traffic of networked …
have shown great potential in identifying anomalies in network traffic of networked …
Research on Clustering Detection Method for Security Attack Behaviors Based on Air Traffic Control Network
The problem of high similarity in attack data leading to unsatisfactory detection results of air
traffic control network security attack behavior is addressed. This article designs a new …
traffic control network security attack behavior is addressed. This article designs a new …
A lightweight security defense algorithm for multimodal attack blocking in industrial control networks based on momentum enhanced feature graphs
Z Yang, C Gao, Y Wang, H Meng, S Han - Security and Privacy - Wiley Online Library
As the infrastructure of modern industry, the safe and stable operation of lightweight
industrial control network is crucial for industrial production. Multi‐mode attack is a kind of …
industrial control network is crucial for industrial production. Multi‐mode attack is a kind of …