Mathematical modeling of adaptive information security strategies using composite behavior models. [PDF]
Nuaim AA, Nuaim AA, Nadeem M, Agrawal A.
europepmc +1 more source
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source
Machine learning-based detection and mitigation of cyberattacks in adaptive cruise control systems. [PDF]
Zhang YT +6 more
europepmc +1 more source
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
PromptGuard a structured framework for injection resilient language models. [PDF]
Alzahrani A.
europepmc +1 more source
From Distributed Noisy Data to Event‐Triggered Pinning Observer‐Based Control
ABSTRACT This paper presents an event‐triggered pinning observer‐based control of unknown large‐scale interconnected systems under false data injection attacks using distributed noisy data without any system identification step. An exogenous system is used to model the false data injection attack.
Xuan Jia +3 more
wiley +1 more source
TopoSleuth, a decoy-based multi-layered defense framework for securing SDN topology discovery. [PDF]
Shoaib M +4 more
europepmc +1 more source
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source
Cybersecure Intelligent Sensor Framework for Smart Buildings: AI-Based Intrusion Detection and Resilience Against IoT Attacks. [PDF]
Siam MA +6 more
europepmc +1 more source
ABSTRACT Smart energy management systems (EMS) are entering a phase of rapid transformation. Artificial intelligence (AI)—including machine learning (ML), deep learning (DL), and reinforcement learning (RL)—has become the computational backbone for real‐time forecasting, scheduling, and control of renewable‐rich power systems.
Sihai An +5 more
wiley +1 more source

