Explainable artificial intelligence applications in cyber security: State-of-the-art in research

Z Zhang, H Al Hamadi, E Damiani, CY Yeun… - IEEE …, 2022 - ieeexplore.ieee.org
This survey presents a comprehensive review of current literature on Explainable Artificial
Intelligence (XAI) methods for cyber security applications. Due to the rapid development of …

Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges

M Faheem, SBH Shah, RA Butt, B Raza… - Computer Science …, 2018 - Elsevier
The fourth industrial revolution known as Industry 4.0 has paved the way for a systematical
deployment of the modernized power grid (PG) to manage continuously growing energy …

Adaptive neural self-triggered bipartite secure control for nonlinear MASs subject to DoS attacks

F Cheng, H Liang, B Niu, N Zhao, X Zhao - Information Sciences, 2023 - Elsevier
This paper studies the bipartite secure control design problem for nonlinear multi-agent
systems (MASs) subject to denial-of-service (DoS) attacks over a signed digraph. By …

EAACK—a secure intrusion-detection system for MANETs

EM Shakshuki, N Kang… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The migration to wireless network from wired network has been a global trend in the past
few decades. The mobility and scalability brought by wireless network made it possible in …

Anomaly-based intrusion detection system for IoT application

M Bhavsar, K Roy, J Kelly, O Olusola - Discover Internet of Things, 2023 - Springer
Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it
has a wide application, such as in transportation, military, healthcare, agriculture, and many …

An overview on denial-of-service attacks in control systems: Attack models and security analyses

A Cetinkaya, H Ishii, T Hayakawa - Entropy, 2019 - mdpi.com
In this paper, we provide an overview of recent research efforts on networked control
systems under denial-of-service attacks. Our goal is to discuss the utility of different attack …

A novel support vector machine based intrusion detection system for mobile ad hoc networks

EA Shams, A Rizaner - Wireless Networks, 2018 - Springer
The performance of mobile ad hoc networks (MANETs) is significantly affected by the
malicious nodes. One of the most common attacks in MANETs is denial of service (DoS); a …

Applications in security and evasions in machine learning: a survey

R Sagar, R Jhaveri, C Borrego - Electronics, 2020 - mdpi.com
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …

Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT

RH Jhaveri, NM Patel, Y Zhong, AK Sangaiah - IEEE Access, 2018 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) are pervasive autonomous networks that will play a vital
role in future Industrial Internet-of-Things communication, where smart devices will be …

Jamming detection at the edge of drone networks using multi-layer perceptrons and decision trees

C Greco, P Pace, S Basagni, G Fortino - Applied Soft Computing, 2021 - Elsevier
As wireless networks play an increasingly key role in everyday life, it is necessary to secure
them from radio frequency attacks, such as jamming, which are hard to detect, especially …