Towards the deployment of machine learning solutions in network traffic classification: A systematic survey

F Pacheco, E Exposito, M Gineste… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Traffic analysis is a compound of strategies intended to find relationships, patterns,
anomalies, and misconfigurations, among others things, in Internet traffic. In particular, traffic …

[HTML][HTML] Cyber security training for critical infrastructure protection: A literature review

N Chowdhury, V Gkioulos - Computer Science Review, 2021 - Elsevier
Introduction: Today, cyber-security curricula are available across educational types and
levels, including a vast array of programs and modules tailored to specific sectors of industry …

[HTML][HTML] Security threats to critical infrastructure: the human factor

I Ghafir, J Saleem, M Hammoudeh, H Faour… - The Journal of …, 2018 - Springer
In the twenty-first century, globalisation made corporate boundaries invisible and difficult to
manage. This new macroeconomic transformation caused by globalisation introduced new …

[HTML][HTML] A survey on neural networks for (cyber-) security and (cyber-) security of neural networks

M Pawlicki, R Kozik, M Choraś - Neurocomputing, 2022 - Elsevier
The goal of this systematic and broad survey is to present and discuss the main challenges
that are posed by the implementation of Artificial Intelligence and Machine Learning in the …

[HTML][HTML] Chaotic salp swarm algorithm for SDN multi-controller networks

AA Ateya, A Muthanna, A Vybornova, AD Algarni… - … Science and Technology …, 2019 - Elsevier
Software-defined networking (SDN) is a novel network paradigm that enables flexible
management for networks. However, with the increase in network capacity, a single …

[HTML][HTML] On the detection capabilities of signature-based intrusion detection systems in the context of web attacks

J Díaz-Verdejo, J Muñoz-Calle, A Estepa Alonso… - Applied Sciences, 2022 - mdpi.com
Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of
security components of most organizations. They can find traces of known attacks in the …

[HTML][HTML] An overview of safety and security analysis frameworks for the internet of things

A Abdulhamid, S Kabir, I Ghafir, C Lei - Electronics, 2023 - mdpi.com
The rapid progress of the Internet of Things (IoT) has continued to offer humanity numerous
benefits, including many security and safety-critical applications. However, unlocking the full …

Key competencies for critical infrastructure cyber-security: a systematic literature review

N Chowdhury, V Gkioulos - Information & Computer Security, 2021 - emerald.com
Purpose The purpose of this paper can be encapsulated in the following points: identify the
research papers published on the topic: competencies and skills necessary for critical …

A survey on forensics and compliance auditing for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - IEEE Access, 2024 - ieeexplore.ieee.org
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …

Structural models for fog computing based internet of things architectures with insurance and risk management applications

X Zhang, M Xu, J Su, P Zhao - European Journal of Operational Research, 2023 - Elsevier
Cybersecurity risk modeling and pricing are becoming a spotlight in actuarial science and
operational research. This paper pertains to the analysis of the cybersecurity risks involved …