How physicality enables trust: A new era of trust-centered cyberphysical systems

S Gil, M Yemini, A Chorti, A Nedić, HV Poor… - arXiv preprint arXiv …, 2023 - arxiv.org
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and
security. The unique characteristics of these systems prompt a reevaluation of their security …

A novel hybrid optimization enabled robust CNN algorithm for an IoT network intrusion detection approach

A Bahaa, A Sayed, L Elfangary, H Fahmy - Plos one, 2022 - journals.plos.org
Due to the huge number of connected Internet of Things (IoT) devices within a network,
denial of service and flooding attacks on networks are on the rise. IoT devices are disrupted …

Hierarchical Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks

T Eghtesad, S Li, Y Vorobeychik, A Laszka - arXiv preprint arXiv …, 2023 - arxiv.org
The increasing reliance of drivers on navigation applications has made transportation
networks more susceptible to data-manipulation attacks by malicious actors. Adversaries …

Jamming Detection in Low-BER Mobile Indoor Scenarios via Deep Learning

S Sciancalepore, F Kusters… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The current state of the art on jamming detection relies on link-layer metrics. A few examples
are the bit-error rate (BER), the packet delivery ratio, the throughput, and the signal-to-noise …

[PDF][PDF] Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks

T Eghtesad, S Li, Y Vorobeychik… - Proceedings of the 23rd …, 2024 - aamas.csc.liv.ac.uk
The increasing reliance of drivers on navigation applications has made transportation
networks more susceptible to data-manipulation attacks by malicious actors. Adversaries …

David and Goliath: Asymmetric Advantage in MIoT

G Oligeri, S Sciancalepore… - 2023 6th International …, 2023 - ieeexplore.ieee.org
Modern battlefields are experiencing an increased dependency on smart devices that can
sense, process, and communicate data, also known as the Military Internet of Things (MIoT) …

FadePrint-Satellite Spoofing Detection via Fading Fingerprinting

G Oligeri, S Sciancalepore… - 2024 IEEE 21st …, 2024 - ieeexplore.ieee.org
While various methods exist to implement message authentication in different
communication layers, the physical layer offers some unique and beneficial features for this …

An edge decentralized security architecture for industrial iot applications

G Portal, E de Matos, F Hessel - 2020 IEEE 6th World Forum on …, 2020 - ieeexplore.ieee.org
The deployment of Industrial IoT Applications are quickly spreading around companies and
organizations, mainly involving the use of edge computing. At the same time these …

[PDF][PDF] ADVERSARIAL REINFORCEMENT LEARNING FOR CYBER-ATTACK

T Eghtesad - 2024 - taahaaa.ir
This doctoral dissertation proposal addresses the evolving challenges in computer and
network security, emphasizing a need for a comprehensive framework that integrates …

AI-Driven Detection of Cybersecurity-Related Patterns

S Raponi - 2021 - search.proquest.com
The considerable increase in the number of attacks and online violations in recent years
highlighted how security is more often considered a feature than a necessity. Indeed, most of …