Browsing by Subject "Attacks"
Now showing items 1-5 of 5
-
A risk mitigation approach for autonomous cloud intrusion response system
( Springer-Verlag Wien , 2016 , Article)Cloud computing delivers on-demand resources over the Internet on a pay-for-use basis, intruders may exploit clouds for their advantage. This paper presents Autonomous Cloud Intrusion Response System (ACIRS), a proper ... -
A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques
( Elsevier B.V. , 2021 , Other)Unmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier delivery, and a lot more. A lot of research is happening ... -
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous ... -
Cyber Risks Assessment for Intelligent and Non-Intelligent Attacks in Power System
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Smart power grid is a perfect model of Cyber Physical System (CPS) which is an important component for a comfortable life. The major concern of the electrical network is safety and reliable operation. A cyber attacker in ... -
IoT malicious traffic identification using wrapper-based feature selection mechanisms
( Elsevier Ltd , 2020 , Article)Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...