Results 191 to 200 of about 45,766 (284)
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source
A deep reinforcement based echo state network for network intrusion classification. [PDF]
Alam K, Bhuiyan MH, Farid DM.
europepmc +1 more source
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
Quantum-Resilient Federated Learning for Multi-Layer Cyber Anomaly Detection in UAV Systems. [PDF]
Şahin CB.
europepmc +1 more source
From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang +5 more
wiley +1 more source
BigFlow-NIDS: A large-scale dataset for network intrusion detection in big data environment. [PDF]
Uddin MB, Arefin MS, Hussain MMM.
europepmc +1 more source
ABSTRACT This paper proposes a boundary control method for nonlinear distributed parameter systems (DPSs) with limited boundary measurements (BMs), as typically encountered in networked cyber‐physical processes with spatially distributed dynamics such as thermal and biomedical diffusion systems.
Yanlin Li +5 more
wiley +1 more source
Adaptive Evolution-Inspired Algorithm for Intrusion Detection in Bioinformatics Systems. [PDF]
Alam M, Samal CK, Ali A, Alourani A.
europepmc +1 more source
This study combines replicated experimental manipulation, social network analysis, network permutations and meta‐analysis to disentangle active from spatially‐induced changes in animal network structure in the wild. It reveals that short‐term environmental changes primarily alter space use, with limited effects on social structure.
Camille N. M. Bordes +6 more
wiley +1 more source

