• A risk mitigation approach for autonomous cloud intrusion response system 

      Kholidy, Hisham A.; Erradi, Abdelkarim; Abdelwahed, Sherif; Baiardi , Fabrizio ( Springer-Verlag Wien , 2016 , Article)
      Cloud computing delivers on-demand resources over the Internet on a pay-for-use basis, intruders may exploit clouds for their advantage. This paper presents Autonomous Cloud Intrusion Response System (ACIRS), a proper ...
    • A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques 

      Chamola, V.; Pavan, Kotesh; Aayush, Agarwal; Naren, Naren; Navneet, Gupta; ... more authors ( Elsevier B.V. , 2021 , Article)
      Unmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier delivery, and a lot more. A lot of research is happening ...
    • CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques 

      Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous ...
    • Cyber Risks Assessment for Intelligent and Non-Intelligent Attacks in Power System 

      Sheela, A.; Revathi, S.; Iqbal, Atif ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)
      Smart power grid is a perfect model of Cyber Physical System (CPS) which is an important component for a comfortable life. The major concern of the electrical network is safety and reliable operation. A cyber attacker in ...
    • Edge intelligence for network intrusion prevention in IoT ecosystem 

      Mansura, Habiba; Islam, Md. Rafiqul; Muyeen, S.M.; Ali, A.B.M. Shawkat ( Elsevier , 2023 , Article)
      The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. As a ...
    • IoT malicious traffic identification using wrapper-based feature selection mechanisms 

      Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif; Du, Xiaojiang; Guizani, Mohsen ( Elsevier Ltd , 2020 , Article)
      Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...