A detailed investigation and analysis of using machine learning techniques for intrusion detection

P Mishra, V Varadharajan… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …

Cybersecurity in power grids: Challenges and opportunities

T Krause, R Ernst, B Klaer, I Hacker, M Henze - Sensors, 2021 - mdpi.com
Increasing volatilities within power transmission and distribution force power grid operators
to amplify their use of communication infrastructure to monitor and control their grid. The …

Smart electricity meter data intelligence for future energy systems: A survey

D Alahakoon, X Yu - IEEE transactions on industrial informatics, 2015 - ieeexplore.ieee.org
Smart meters have been deployed in many countries across the world since early 2000s.
The smart meter as a key element for the smart grid is expected to provide economic, social …

Gradient boosting feature selection with machine learning classifiers for intrusion detection on power grids

D Upadhyay, J Manero, M Zaman… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Smart grids rely on SCADA (Supervisory Control and Data Acquisition) systems to monitor
and control complex electrical networks in order to provide reliable energy to homes and …

Intrusion detection techniques in cloud environment: A survey

P Mishra, ES Pilli, V Varadharajan… - Journal of Network and …, 2017 - Elsevier
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …

A holistic review of cybersecurity and reliability perspectives in smart airports

N Koroniotis, N Moustafa, F Schiliro… - IEEE …, 2020 - ieeexplore.ieee.org
Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence
of smart airports. Services and systems powered by the IoT enable smart airports to have …

[PDF][PDF] A survey on honeypot software and data analysis

M Nawrocki, M Wählisch, TC Schmidt, C Keil… - arXiv preprint arXiv …, 2016 - arxiv.org
A Survey on Honeypot Software and Data Analysis Page 1 A Survey on Honeypot Software and
Data Analysis Marcin Nawrocki ∗ , Matthias Wählisch ∗ , Thomas C. Schmidt † , Christian Keil ‡ …

Intrusion detection in SCADA based power grids: Recursive feature elimination model with majority vote ensemble algorithm

D Upadhyay, J Manero, M Zaman… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We propose an integrated framework for an intrusion detection system for SCADA
(Supervisory Control and Data Acquisition)-based power grids. Our scheme combines RFE …

An ensemble of prediction and learning mechanism for improving accuracy of anomaly detection in network intrusion environments

Imran, F Jamil, D Kim - Sustainability, 2021 - mdpi.com
The connectivity of our surrounding objects to the internet plays a tremendous role in our
daily lives. Many network applications have been developed in every domain of life …

An enhanced J48 classification algorithm for the anomaly intrusion detection systems

S Aljawarneh, MB Yassein, M Aljundi - Cluster Computing, 2019 - Springer
In this paper, we have developed an enhanced J48 algorithm, which uses the J48 algorithm
for improving the detection accuracy and the performance of the novel IDS technique. This …