AI-enabled cybersecurity framework for future 5G wireless infrastructures. [PDF]
Alam A, Umer A, Ullah I, Alsayat A.
europepmc +1 more source
Deep learning-based HTTP TRACE flood detection in wireless sensor network using deep spectral multi-layer convolutional neural network. [PDF]
Tamilselvi S +3 more
europepmc +1 more source
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source
RFID-ExSim: A multi-scenario experimental dataset for collision timing, tag cloning, replay injection, and flooding stress in passive RFID systems. [PDF]
Hmimou Y +4 more
europepmc +1 more source
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
Nature-inspired swarm optimization paradigms for securing semantic web frameworks against DDoS attacks: a computational approach. [PDF]
Ganguli C +3 more
europepmc +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
Optimized CatBoost machine learning (OCML) for DDoS detection in cloud virtual machines with time-series and adversarial robustness. [PDF]
Samy H, Bahaa-Eldin AM, Sobh MA, Taha A.
europepmc +1 more source
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
A Data Rate Monitoring Approach for Cyberattack Detection in Digital Twin Communication. [PDF]
Rodrigues C +3 more
europepmc +1 more source

