173 related articles for article (PubMed ID: 34777966)
1. A robust intelligent zero-day cyber-attack detection technique.
Kumar V; Sinha D
Complex Intell Systems; 2021; 7(5):2211-2234. PubMed ID: 34777966
[TBL] [Abstract][Full Text] [Related]
2. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS
Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626
[TBL] [Abstract][Full Text] [Related]
3. A Survey of Machine Learning-Based Zero-Day Attack Detection: Challenges and Future Directions.
Guo Y
Comput Commun; 2023 Jan; 198():. PubMed ID: 36741076
[TBL] [Abstract][Full Text] [Related]
4. IDAC: Federated Learning-Based Intrusion Detection Using Autonomously Extracted Anomalies in IoT.
Ohtani T; Yamamoto R; Ohzahata S
Sensors (Basel); 2024 May; 24(10):. PubMed ID: 38794075
[TBL] [Abstract][Full Text] [Related]
5. A Lightweight Intelligent Network Intrusion Detection System Using One-Class Autoencoder and Ensemble Learning for IoT.
Yao W; Hu L; Hou Y; Li X
Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112482
[TBL] [Abstract][Full Text] [Related]
6. Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles.
Elsisi M; Tran MQ
Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960561
[TBL] [Abstract][Full Text] [Related]
7. Cyber-attack method and perpetrator prediction using machine learning algorithms.
Bilen A; Özer AB
PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
[TBL] [Abstract][Full Text] [Related]
8. Personalized insulin dose manipulation attack and its detection using interval-based temporal patterns and machine learning algorithms.
Levy-Loboda T; Sheetrit E; Liberty IF; Haim A; Nissim N
J Biomed Inform; 2022 Aug; 132():104129. PubMed ID: 35781036
[TBL] [Abstract][Full Text] [Related]
9. Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power Systems.
Lu KD; Zhou L; Wu ZG
IEEE Trans Neural Netw Learn Syst; 2024 May; 35(5):6145-6155. PubMed ID: 37030822
[TBL] [Abstract][Full Text] [Related]
10. Correlation-Based Anomaly Detection in Industrial Control Systems.
Jadidi Z; Pal S; Hussain M; Nguyen Thanh K
Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772600
[TBL] [Abstract][Full Text] [Related]
11. A Novel Cyber Attack Detection Method in Networked Control Systems.
Mousavinejad E; Yang F; Han QL; Vlacic L
IEEE Trans Cybern; 2018 Nov; 48(11):3254-3264. PubMed ID: 29994687
[TBL] [Abstract][Full Text] [Related]
12. Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression.
Lee JH; Ji IH; Jeon SH; Seo JT
Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139701
[TBL] [Abstract][Full Text] [Related]
13. D4I - Digital forensics framework for reviewing and investigating cyber attacks.
Dimitriadis A; Ivezic N; Kulvatunyou B; Mavridis I
Array (N Y); 2020; 5():. PubMed ID: 35531088
[TBL] [Abstract][Full Text] [Related]
14. When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time.
Miller D; Wang Y; Kesidis G
Neural Comput; 2019 Aug; 31(8):1624-1670. PubMed ID: 31260390
[TBL] [Abstract][Full Text] [Related]
15. A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection.
Dutta V; Choraś M; Pawlicki M; Kozik R
Sensors (Basel); 2020 Aug; 20(16):. PubMed ID: 32824187
[TBL] [Abstract][Full Text] [Related]
16. Utilising Flow Aggregation to Classify Benign Imitating Attacks.
Hindy H; Atkinson R; Tachtatzis C; Bayne E; Bures M; Bellekens X
Sensors (Basel); 2021 Mar; 21(5):. PubMed ID: 33806363
[TBL] [Abstract][Full Text] [Related]
17. Network intrusion detection using oversampling technique and machine learning algorithms.
Ahmed HA; Hameed A; Bawany NZ
PeerJ Comput Sci; 2022; 8():e820. PubMed ID: 35111914
[TBL] [Abstract][Full Text] [Related]
18. Data-Driven Network Analysis for Anomaly Traffic Detection.
Alam S; Alam Y; Cui S; Akujuobi C
Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37837004
[TBL] [Abstract][Full Text] [Related]
19. Detection and Identification of Cyber and Physical Attacks on Distribution Power Grids with PVs: An Online High-Dimensional Data-driven Approach.
Li F; Xie R; Yang B; Guo L; Ma P; Shi J; Ye J; Song W
IEEE J Emerg Sel Top Power Electron; 2022 Feb; 10(1):1282-1291. PubMed ID: 36090809
[TBL] [Abstract][Full Text] [Related]
20. Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways.
Ashraf S; Shawon MH; Khalid HM; Muyeen SM
Sensors (Basel); 2021 Sep; 21(19):. PubMed ID: 34640735
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]