Symmetrical simulation scheme for anomaly detection in autonomous vehicles based on LSTM model
Technological advancement has transformed traditional vehicles into autonomous vehicles.
Autonomous vehicles play an important role since they are considered an essential …
Autonomous vehicles play an important role since they are considered an essential …
Intrusion detection based on machine learning in the internet of things, attacks and counter measures
E Rehman, M Haseeb-ud-Din, AJ Malik… - The Journal of …, 2022 - Springer
Globally, data security and privacy over the Internet of Things (IoT) are necessary due to its
emergence in daily life. As the IoT will soon invade each part of our lives, attention to IoT …
emergence in daily life. As the IoT will soon invade each part of our lives, attention to IoT …
Threats, Attacks, and cryptography frameworks of cybersecurity in critical infrastructures
K Tsantikidou, N Sklavos - Cryptography, 2024 - mdpi.com
Critical Infrastructures (CIs), such as healthcare facilities, power grids, transportation
systems, and financial institutions, are vital components of a functioning society, with the …
systems, and financial institutions, are vital components of a functioning society, with the …
Protection schemes for DDoS, ARP spoofing, and IP fragmentation attacks in smart factory
TU Chai, HG Goh, SY Liew, V Ponnusamy - Systems, 2023 - mdpi.com
Industry Revolution 4.0 connects the Internet of Things (IoT) resource-constrained devices to
Smart Factory solutions and delivers insights. As a result, a complex and dynamic network …
Smart Factory solutions and delivers insights. As a result, a complex and dynamic network …
[PDF][PDF] Network Forensics Against Address Resolution Protocol Spoofing Attacks Using Trigger, Acquire, Analysis, Report, Action Method
This study aims to obtain attack evidence and reconstruct commonly used address
resolution protocol attacks as a first step to launch a moderately malicious attack. MiTM and …
resolution protocol attacks as a first step to launch a moderately malicious attack. MiTM and …
Contemporary Cyber Threats to Critical Infrastructures: Management and Countermeasures
K Mitsarakis - 2023 - repository.ihu.edu.gr
This dissertation was written as a part of the MSc in Cybersecurity at the International
Hellenic University. Nowadays, the unobstructed functioning of society is increasingly …
Hellenic University. Nowadays, the unobstructed functioning of society is increasingly …
Layered management approach to cyber security of IoT solutions
The Internet of Things consists of devices, each with its own vulnerabilities and
interconnected by various technologies. This broad spectrum, a combination of old and new …
interconnected by various technologies. This broad spectrum, a combination of old and new …
Detection optimization of rare attacks in software-defined network using ensemble learning
AM El-Shamy, NA El-Fishawy… - Mansoura …, 2023 - mej.researchcommons.org
Software-defined networking (SDN) is a highly flexible architecture that automates and
facilitates network configuration and management. Intrusion detection systems (IDS) are …
facilitates network configuration and management. Intrusion detection systems (IDS) are …
Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT
The inclusion of mobility-based Internet-of-Things (IoT) devices accelerates the data
transmission process, thereby catering to IoT users' demands; however, securing the data …
transmission process, thereby catering to IoT users' demands; however, securing the data …
Efficient and Effective Anomaly Detection in Autonomous Vehicles: A Combination of Gradient Boosting and ANFIS Algorithms
MA Quran - International Journal of Fuzzy Systems, 2024 - Springer
The rise of autonomous vehicles has become a key indicator of smart city development.
Unlike traditional cars, which are fully operated by humans, autonomous vehicles rely on …
Unlike traditional cars, which are fully operated by humans, autonomous vehicles rely on …