A Data Rate Monitoring Approach for Cyberattack Detection in Digital Twin Communication. [PDF]
Rodrigues C +3 more
europepmc +1 more source
Efficient detection of intrusions in TON-IoT dataset using hybrid feature selection approach. [PDF]
Dharini N, Janani VS, Katiravan J.
europepmc +1 more source
Explainable attention based few shot LSTM for intrusion detection in imbalanced cyber physical system networks. [PDF]
Abdulganiyu OH +6 more
europepmc +1 more source
MQTT_UAD: MQTT Under Attack Dataset. A public dataset for the detection of attacks in IoT networks using MQTT protocol. [PDF]
Aveleira-Mata J +5 more
europepmc +1 more source
CoAP_UAD: CoAP under attack dataset - A comprehensive dataset for CoAP-based IoT security research. [PDF]
Aveleira-Mata J +5 more
europepmc +1 more source
Securing e-governance against shadow attacks with blockchain technology. [PDF]
Mishra P, R G.
europepmc +1 more source
AI-driven cybersecurity framework for anomaly detection in power systems. [PDF]
V M V +4 more
europepmc +1 more source
MitM Attack to Electric Vehicle AC Chargers
Javier Jarauta Gastelu +4 more
openaire +1 more source
DA34FL: a robust dynamic accumulator-based authentication and key agreement with preserving model training data integrity for federated learning. [PDF]
Li S, Zhang Y, Bai J, Fan K.
europepmc +1 more source
Three-Basis Loop-Back QKD: A Passive Architecture for Secure and Scalable Quantum Mobile Networks. [PDF]
Lizama-Pérez LA, Morales-Calvo P.
europepmc +1 more source

