Explainable artificial intelligence applications in cyber security: State-of-the-art in research
This survey presents a comprehensive review of current literature on Explainable Artificial
Intelligence (XAI) methods for cyber security applications. Due to the rapid development of …
Intelligence (XAI) methods for cyber security applications. Due to the rapid development of …
Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges
The fourth industrial revolution known as Industry 4.0 has paved the way for a systematical
deployment of the modernized power grid (PG) to manage continuously growing energy …
deployment of the modernized power grid (PG) to manage continuously growing energy …
Adaptive neural self-triggered bipartite secure control for nonlinear MASs subject to DoS attacks
This paper studies the bipartite secure control design problem for nonlinear multi-agent
systems (MASs) subject to denial-of-service (DoS) attacks over a signed digraph. By …
systems (MASs) subject to denial-of-service (DoS) attacks over a signed digraph. By …
EAACK—a secure intrusion-detection system for MANETs
EM Shakshuki, N Kang… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The migration to wireless network from wired network has been a global trend in the past
few decades. The mobility and scalability brought by wireless network made it possible in …
few decades. The mobility and scalability brought by wireless network made it possible in …
Anomaly-based intrusion detection system for IoT application
Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it
has a wide application, such as in transportation, military, healthcare, agriculture, and many …
has a wide application, such as in transportation, military, healthcare, agriculture, and many …
An overview on denial-of-service attacks in control systems: Attack models and security analyses
In this paper, we provide an overview of recent research efforts on networked control
systems under denial-of-service attacks. Our goal is to discuss the utility of different attack …
systems under denial-of-service attacks. Our goal is to discuss the utility of different attack …
A novel support vector machine based intrusion detection system for mobile ad hoc networks
The performance of mobile ad hoc networks (MANETs) is significantly affected by the
malicious nodes. One of the most common attacks in MANETs is denial of service (DoS); a …
malicious nodes. One of the most common attacks in MANETs is denial of service (DoS); a …
Applications in security and evasions in machine learning: a survey
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …
privacy in various applications. ML is used to address serious issues such as real-time …
Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT
RH Jhaveri, NM Patel, Y Zhong, AK Sangaiah - IEEE Access, 2018 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) are pervasive autonomous networks that will play a vital
role in future Industrial Internet-of-Things communication, where smart devices will be …
role in future Industrial Internet-of-Things communication, where smart devices will be …
Jamming detection at the edge of drone networks using multi-layer perceptrons and decision trees
As wireless networks play an increasingly key role in everyday life, it is necessary to secure
them from radio frequency attacks, such as jamming, which are hard to detect, especially …
them from radio frequency attacks, such as jamming, which are hard to detect, especially …