|
|
|
Emanuele Santonicola, Ennio Andrea Adinolfi, Simone Coppola and Francesco Pascale
Nowadays, a vehicle can contain from 20 to 100 ECUs, which are responsible for ordering, controlling and monitoring all the components of the vehicle itself. Each of these units can also send and receive information to other units on the network or exter...
ver más
|
|
|
|
|
|
|
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti...
ver más
|
|
|
|
|
|
|
Max Schrötter, Andreas Niemann and Bettina Schnor
Over the last few years, a plethora of papers presenting machine-learning-based approaches for intrusion detection have been published. However, the majority of those papers do not compare their results with a proper baseline of a signature-based intrusi...
ver más
|
|
|
|
|
|
|
Nikola Andelic and Sandi Baressi ?egota
This investigation underscores the paramount imperative of discerning network intrusions as a pivotal measure to fortify digital systems and shield sensitive data from unauthorized access, manipulation, and potential compromise. The principal aim of this...
ver más
|
|
|
|
|
|
|
Chinyang Henry Tseng, Woei-Jiunn Tsaur and Yueh-Mao Shen
In detecting large-scale attacks, deep neural networks (DNNs) are an effective approach based on high-quality training data samples. Feature selection and feature extraction are the primary approaches for data quality enhancement for high-accuracy intrus...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
The growth of the Internet of Things (IoT) has led to a significant rise in cyber attacks and an expanded attack surface for the average consumer. In order to protect consumers and infrastructure, research into detecting malicious IoT activity must be of...
ver más
|
|
|
|
|
|
|
Haedam Kim, Suhyun Park, Hyemin Hong, Jieun Park and Seongmin Kim
As the size of the IoT solutions and services market proliferates, industrial fields utilizing IoT devices are also diversifying. However, the proliferation of IoT devices, often intertwined with users? personal information and privacy, has led to a cont...
ver más
|
|
|
|
|
|
|
Yiming Mo, Lei Wang, Wenqing Hong, Congzhen Chu, Peigen Li and Haiting Xia
The intrusion of foreign objects on airport runways during aircraft takeoff and landing poses a significant safety threat to air transportation. Small-scale Foreign Object Debris (FOD) cannot be ruled out on time by traditional manual inspection, and the...
ver más
|
|
|
|
|
|
|
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p...
ver más
|
|
|
|
|
|
|
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani...
ver más
|
|
|
|