A survey on ai/ml-driven intrusion and misbehavior detection in networked autonomous systems: Techniques, challenges and opportunities

O Ajibuwa, B Hamdaoui, AA Yavuz - arXiv preprint arXiv:2305.05040, 2023 - arxiv.org
AI/ML-based intrusion detection systems (IDSs) and misbehavior detection systems (MDSs)
have shown great potential in identifying anomalies in the network traffic of networked …

Botnet detection employing a dilated convolutional autoencoder classifier with the aid of hybrid shark and bear smell optimization algorithm-based feature selection in …

NF Abdulsattar, F Abedi, HMA Ghanimi… - Big Data and Cognitive …, 2022 - mdpi.com
Flying ad hoc networks (FANETs) or drone technologies have attracted great focus recently
because of their crucial implementations. Hence, diverse research has been performed on …

A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networks

M Hosseinzadeh, S Ali, HJ Ahmad, F Alanazi… - Vehicular …, 2024 - Elsevier
Nowadays, unmanned aerial vehicles (UAVs) organized in a flying ad hoc network (FANET)
can successfully carry out complex missions. Due to the limitations of these networks …

A Study on Enhancing the Information Security of Urban Traffic Control Systems Using Evolutionary Game Theory

K Pan, L Wang, L Zhang - Electronics, 2023 - mdpi.com
In recent years, there has been significant development in intelligent technologies for urban
traffic control, such as smart city and vehicle-to-everything (V2X) communication. These …

Transmission Scheduling for Remote State Estimation in CPSs With Two-Hop Networks Subject to DoS Attacks

W Xing, X Zhao - IEEE/ACM Transactions on Networking, 2024 - ieeexplore.ieee.org
In this paper, a dynamic zero-sum game is formulated to describe the power decision-
making process of the sensor/relay and the DoS attacker in cyber-physical systems. The …

Cybersecurity Threat Analysis And Attack Simulations For Unmanned Aerial Vehicle Networks

C Abdulrazak - arXiv preprint arXiv:2404.16842, 2024 - arxiv.org
Drones, also known as unmanned air vehicles (UAVs), have revolutionised various
industries, from farming to national security.(Wexler., Lesley. 2016) However, their broad use …

Cluster Detection Method of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network.

R Jia, J Zhang, Y Lin, Y Han… - Computers, Materials & …, 2024 - search.ebscohost.com
In order to enhance the accuracy of Air Traffic Control (ATC) cybersecurity attack detection,
in this paper, a new clustering detection method is designed for air traffic control network …

[PDF][PDF] AI/ML-Driven Intrusion and Misbehavior Detection in Networked Autonomous Systems: A Survey of Common Practices

O Ajibuwa, B Hamdaoui, AA Yavuz - 2023 - ir.library.oregonstate.edu
AI/ML-based intrusion detection systems (IDSs) and misbehavior detection systems (MDSs)
have shown great potential in identifying anomalies in network traffic of networked …

Research on Clustering Detection Method for Security Attack Behaviors Based on Air Traffic Control Network

R Jia, J Zhang, Z Jiang - … on E-health Networking, Application & …, 2023 - ieeexplore.ieee.org
The problem of high similarity in attack data leading to unsatisfactory detection results of air
traffic control network security attack behavior is addressed. This article designs a new …

A lightweight security defense algorithm for multimodal attack blocking in industrial control networks based on momentum enhanced feature graphs

Z Yang, C Gao, Y Wang, H Meng, S Han - Security and Privacy - Wiley Online Library
As the infrastructure of modern industry, the safe and stable operation of lightweight
industrial control network is crucial for industrial production. Multi‐mode attack is a kind of …