Results 61 to 70 of about 1,405 (158)
Guardians of ICS: A Comparative Analysis of Anomaly Detection Techniques
This study presents a comparative evaluation of supervised and unsupervised learning models for anomaly detection in industrial control systems (ICS), using data from the SWaT testbed. Results show that although supervised models offer higher precision, they miss more unknown attacks, whereas unsupervised models achieve better recall but with increased
Zequn Wang +4 more
wiley +1 more source
A Design‐Driven Machine Learning Approach for Invariant Mining in a Smart Grid
An ICS is vulnerable to cyber‐attacks arising from within its communication network or directly from the SCADA and devices such as PLCs. The study reported here presents a scenario‐specific invariant mining approach to detect anomalies in plant behaviour.
Danish Hudani +5 more
wiley +1 more source
Efficient Malware Classification using Transfer Learning and Stacked Ensemble Techniques [PDF]
The exponential growth of internet usage and communication devices has led to heightened security vulnerabilities, including the proliferation of malware such as viruses, ransomware, trojans, and spyware. These increasingly sophisticated malware variants
Krishna Kumar +2 more
doaj +1 more source
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley +1 more source
Anomaly detection in distributed environments poses significant challenges, particularly in balancing privacy, communication overhead, and detection accuracy. This paper presents FedAnomDetect, a novel federated learning (FL‐based framework designed for anomaly detection across large‐scale, distributed systems.
Abeer Abdullah Alsadhan, Peican Zhu
wiley +1 more source
Robust Intelligent Malware Detection Using Deep Learning
Security breaches due to attacks by malicious software (malware) continue to escalate posing a major security concern in this digital age. With many computer users, corporations, and governments affected due to an exponential growth in malware attacks ...
R. Vinayakumar +4 more
doaj +1 more source
GRASE: Granulometry Analysis With Semi Eager Classifier to Detect Malware.
Technological advancement in communication leading to 5G, motivates everyone to get connected to the internet including ‘Devices’, a technology named Web of Things (WoT).
Mahendra Deore +3 more
doaj +1 more source
Profiling and Visualizing Android Malware Datasets
Mobile devices are ubiquitous: nowadays most people own a mobile telephone.Because of this, it is a target of interest for attackers.Researchers in malware analysis put their effort to recognize these types of programs before they are installed on a user device.To do this, they perform experiments to automatically detect malware, for example with ...
openaire +1 more source
Through the static: Demystifying malware visualization via explainability
Security researchers grapple with the surge of malicious files, necessitating swift identification and classification of malware strains for effective protection. Visual classifiers and in particular Convolutional Neural Networks (CNNs) have emerged as vital tools for this task.
Brosolo, Matteo, P., Vinod, Conti, Mauro
openaire +2 more sources
Deep visualization classification method for malicious code based on Ngram-TFIDF
With the continuous increase in the scale and variety of malware, traditional malware analysis methods, which relied on manual feature extraction, become time-consuming and error-prone, rendering them unsuitable.
WANG Jinwei +4 more
doaj +2 more sources

