A comprehensive deep learning benchmark for IoT IDS

R Ahmad, I Alsmadi, W Alhamdani, L Tawalbeh - Computers & Security, 2022 - Elsevier
The significance of an intrusion detection system (IDS) in networks security cannot be
overstated in detecting and responding to malicious attacks. Failure to detect large-scale …

[HTML][HTML] Securing real-time internet-of-things

CY Chen, M Hasan, S Mohan - Sensors, 2018 - mdpi.com
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …

A deep learning ensemble approach to detecting unknown network attacks

R Ahmad, I Alsmadi, W Alhamdani… - Journal of Information …, 2022 - Elsevier
The majority of the intrusion detection solutions proposed using machine learning and deep
learning approaches are based on known attack classes only. Comprehensive threat …

Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems

MK Yoon, S Mohan, CY Chen… - 2016 IEEE Real-Time and …, 2016 - ieeexplore.ieee.org
The high degree of predictability in real-time systems makes it possible for adversaries to
launch timing inference attacks such as those based on side-channels and covert-channels …

On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks

M Nasri, T Chantem, G Bloom… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …

Vulnerability of controller area network to schedule-based attacks

S Hounsinou, M Stidd, U Ezeobi… - 2021 IEEE Real …, 2021 - ieeexplore.ieee.org
The secure functioning of automotive systems is vital to the safety of their passengers and
other roadway users. One of the critical functions for safety is the controller area network …

Vulnerability assessment of cyber security for SCADA systems

K Coffey, LA Maglaras, R Smith, H Janicke… - Guide to Vulnerability …, 2018 - Springer
Supervisory control and data acquisition (SCADA) systems use programmable logic
controllers (PLC) or other intelligent electronic devices (IED), remote terminal units (RTU) …

System auditing for real-time systems

A Bansal, A Kandikuppa, M Hasan, CY Chen… - ACM Transactions on …, 2023 - dl.acm.org
System auditing is an essential tool for detecting malicious events and conducting forensic
analysis. Although used extensively on general-purpose systems, auditing frameworks have …

Security and reliability of safety-critical rtos

R Luna, SA Islam - SN Computer Science, 2021 - Springer
Abstract Real-Time Operating System (RTOS) presents a computing environment with the
ability to react to events within a strictly-defined period. Modern domain-specific (eg …

A taxonomy of side channel attacks on critical infrastructures and relevant systems

N Tsalis, E Vasilellis, D Mentzelioti… - … Security and Resilience …, 2019 - Springer
Abstract Information disclosure leads to serious exploits, disruption or damage of critical
operations and privacy breaches, both in Critical Infrastructures (CIs) and Industrial Control …