Results 101 to 110 of about 14,082 (218)
Intrusion detection systems are essential for detecting network cyberattacks. As the sophistication of cyberattacks increases, it is critical that defense technologies adapt to counter them.
Jowaria Khan +6 more
doaj +1 more source
Datasheets for machine learning sensors
Abstract Machine learning (ML) is becoming prevalent in embedded AI sensing systems. These “ML sensors” enable context‐sensitive, real‐time data collection and decision‐making across diverse applications ranging from anomaly detection in industrial settings to wildlife tracking for conservation efforts.
Matthew Stewart +14 more
wiley +1 more source
Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks
Intrusion detection systems (IDSs) are crucial for identifying cyberattacks on in-vehicle networks. To enhance IDS robustness and preserve user data privacy, researchers are increasingly adopting federated learning (FL).
Muzun Althunayyan +3 more
doaj +1 more source
Beyond the European Army Illusion: A Prudent Strategy for the Real European Zeitenwende
JCMS: Journal of Common Market Studies, EarlyView.
Benjamin Daßler, Moritz Weiss
wiley +1 more source
Edge‐Oriented DoS/DDoS Intrusion Detection and Supervision Platform
ABSTRACT This work presents an Edge Node‐Oriented DoS/DDoS Intrusion Detection and Monitoring Platform, a novel anomaly detection system based on temporal analysis with machine learning (ML) and deep learning (DL) algorithms, specifically designed to operate on edge servers with limited resources.
Geraldo Eufrazio Martins Júnior +3 more
wiley +1 more source
Responding to cyberattacks: Prospects for the EU Cyber Diplomacy Toolbox. EPC Discussion paper, 18 March 2019 [PDF]
Malicious cyber activities have become a growing threat, a fact that has become more visible in recent years through several massive cyberattacks. While the European Union (EU) has been active in the field of cybersecurity for a number of years, it has ...
Ivan, Paul
core
Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool +7 more
wiley +1 more source
Efficient Cyberattack Detection Methods in Industrial Control Systems
The article deals with the issue of detecting cyberattacks on control algorithms running in a real Programmable Logic Controller (PLC) and controlling a real laboratory control plant. The vulnerability of the widely used Proportional–Integral–Derivative (
Piotr Marusak +7 more
doaj +1 more source
ABSTRACT Geopolitical uncertainties and the resurgence of security and defence needs present both opportunities and challenges for creativity and innovation management. At both the organizational and the individual levels, we are confronted with multiple ethically challenging choices. Given the changing global security and defence realities, we outline
Mette Præst Knudsen +4 more
wiley +1 more source
Securing CPS Through Simultaneous Analog Side-Channel Monitoring of Cyber and Physical Domains
The continuing proliferation of Cyber Physical Systems (CPSs), those that integrate electronic control circuitry with a mechanical system allowing software commands to affect the physical world, while allowing for new efficiencies and convenience, also ...
Andrew Kacmarcik, Milos Prvulovic
doaj +1 more source

