A comprehensive deep learning benchmark for IoT IDS
The significance of an intrusion detection system (IDS) in networks security cannot be
overstated in detecting and responding to malicious attacks. Failure to detect large-scale …
overstated in detecting and responding to malicious attacks. Failure to detect large-scale …
[HTML][HTML] Securing real-time internet-of-things
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
A deep learning ensemble approach to detecting unknown network attacks
The majority of the intrusion detection solutions proposed using machine learning and deep
learning approaches are based on known attack classes only. Comprehensive threat …
learning approaches are based on known attack classes only. Comprehensive threat …
Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems
The high degree of predictability in real-time systems makes it possible for adversaries to
launch timing inference attacks such as those based on side-channels and covert-channels …
launch timing inference attacks such as those based on side-channels and covert-channels …
On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
Vulnerability of controller area network to schedule-based attacks
S Hounsinou, M Stidd, U Ezeobi… - 2021 IEEE Real …, 2021 - ieeexplore.ieee.org
The secure functioning of automotive systems is vital to the safety of their passengers and
other roadway users. One of the critical functions for safety is the controller area network …
other roadway users. One of the critical functions for safety is the controller area network …
Vulnerability assessment of cyber security for SCADA systems
Supervisory control and data acquisition (SCADA) systems use programmable logic
controllers (PLC) or other intelligent electronic devices (IED), remote terminal units (RTU) …
controllers (PLC) or other intelligent electronic devices (IED), remote terminal units (RTU) …
System auditing for real-time systems
System auditing is an essential tool for detecting malicious events and conducting forensic
analysis. Although used extensively on general-purpose systems, auditing frameworks have …
analysis. Although used extensively on general-purpose systems, auditing frameworks have …
Security and reliability of safety-critical rtos
R Luna, SA Islam - SN Computer Science, 2021 - Springer
Abstract Real-Time Operating System (RTOS) presents a computing environment with the
ability to react to events within a strictly-defined period. Modern domain-specific (eg …
ability to react to events within a strictly-defined period. Modern domain-specific (eg …
A taxonomy of side channel attacks on critical infrastructures and relevant systems
N Tsalis, E Vasilellis, D Mentzelioti… - … Security and Resilience …, 2019 - Springer
Abstract Information disclosure leads to serious exploits, disruption or damage of critical
operations and privacy breaches, both in Critical Infrastructures (CIs) and Industrial Control …
operations and privacy breaches, both in Critical Infrastructures (CIs) and Industrial Control …