Intrusion detection is vital to cybersecurity and involves examining and identifying security breaches in an information system. Machine learning (ML) techniques offer generic solutions and continuously improve their performance (Praveen Kumar et al., Citation2019). In WSNs, ML finds applications in ...
Most recently, he has been studying ways to promote legislation that would prevent cyber-stalking, cyber-harassment, and cyber-bullying. Dr. Arabnia is Editor-in-Chief of The Journal of Supercomputing (one of the oldest journals in Computer Science) published by Springer and has been Associate ...
cyber securityA recent class of threats, known as Advanced Persistent Threats (APTs), has drawn increasing attention from researchers, primarily from the industrial security sector. APTs are cyber attacks executed by sophisticated and well-resourced adversaries targeting specific information in high-...
Advanced Persistent Threat (APT) principally steal data once the attacker gains unauthorized access to network resources. In this paper, we propose a detection and defense technique based on SecMonet framework to avoid this sophisticated attack. SecMonet
HTTP/HPPTS procedures support the security section. Adult with diabetes Robot Not revealed No information on data set size. The model is purely theoretical. [99] Charlie: A robot friend for children with diabetes providing social, cognitive, and affective assistance for self-management of diabetes....
In ROBOT2022: Fifth Iberian Robotics Conference; Tardioli, D., Matellán, V., Heredia, G., Silva, M.F., Marques, L., Eds.; ROBOT 2022; Lecture Notes in Networks and Systems; Springer: Cham, Switzerland, 2023; Volume 589. [Google Scholar] Hemavathi, S.; Shinisha, A. A Study on...
The Future of Cybersecurity: Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cyberspace. In Lecture Notes on Data Engineering and Communications Technologies; Springer Singapore: Singapore, 2019; Volume 15, pp. 739–747._67. [CrossRef] 51. Mohanty, S.; Vyas, S....
Versions Notes Abstract Extensive digitization and interconnection through networks have ushered in a number of new paradigms over the last years: Internet of Things, cyber–physical systems, Industry 4.0, etc. These challenging systems rely on an effective information communication between distributed comp...
• Cyber-security issues in OPC UA. Data communication networks are vulnerable to cyber-attacks and malware; thus, aspects like confidentiality, integrity, availability, reliability, and safety of the process are under real risk. The UA specification enhances the security features of the previous ...
The growing complexity of production systems requires appropriate control architectures that allow flexible adaptation during their runtime. Although cyber