Search
Now showing items 11-20 of 25
Deep learning models for predictive maintenance: a survey, comparison, challenges and prospects
(Springer Science+Business Media, LLC, 2022)
Given the growing amount of industrial data in the 4th industrial revolution, deep learning solutions have become popular for predictive maintenance (PdM) tasks, which involve monitoring assets to anticipate their requirements ...
Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems
(Springer, 2023)
Industrial Control Systems are used in a wide variety of industrial facilities, including critical infrastructures, becoming the main target of multiple security attacks. A malicious and successful attack against these ...
Different approaches for the detection of SSH anomalous connections
(Oxford Academic, 2016)
The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has been an ...
Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks
(Elsevier, 2023)
There is a growing trend of cyberattacks against Internet of Things (IoT) devices; moreover, the sophistication and motivation of those attacks is increasing. The vast scale of IoT, diverse hardware and software, and being ...
Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey
(Elsevier, 2023)
Industrial Control Systems (ICSs) are a key technology for life-sustainability, social development and economic progress used in a wide range of industrial solutions, including Critical Infrastructures (CIs), becoming the ...
On the use of MiniCPS for conducting rigorous security experiments in Software-Defined Industrial Control Systems
(Springer, 2024)
Software-Defined Networking (SDN) offers a global view over the network and the ability of centrally and dynamically managing network flows, making them ideal for creating security threat detection and mitigation solutions. ...
Novel email spam detection method using sentiment analysis and personality recognition
(Oxford Academic, 2020)
Unsolicited email campaigns remain as one of the biggest threats affecting millions of users per day. During the past years several techniques to detect unsolicited emails have been developed. This work provides means to ...
Methodology for data-driven predictive maintenance models design, development and implementation on manufacturing guided by domain knowledge
(Taylor and Francis, 2022)
The 4th industrial revolution has connected machines and industrial plants, facilitating process monitoring and the implementation of predictive maintenance (PdM) systems that can save up to 60% of maintenance costs. ...
Detection and Visualization of Android Malware Behavior
(Hindawi Publishing Corporation, 2016)
Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious ...
Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept
(Oxford Academic, 2020)
Specifically tailored industrial control systems (ICSs) attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not ...