Flood control: TCP-SYN flood detection for software-defined networks using OpenFlow port statistics
T. Das, O. Abuhamdan, S. Sengupta, E. Arslan
LSTM-based anomalous behavior detection in multi-agent reinforcement learning
C. Lischke, T. Liu, J. Mccalmon, M. Rahman, T. Halabi, S. Alqahtani
ML-based anomaly detection for intra-vehicular CAN-bus networks
S. Purohit, M. Govindarasu
ETHERLED: Sending covert morse signals from air-gapped devices via network card (NIC) leds
M. Guri
How to build a SOC on a budget
R. Vaarandi, S. Mases
A stable generative adversarial network architecture for network intrusion detection
R. Soleymanzadeh, R. Kashef
SENTINEL: Approachable, tailor-made cybersecurity and data protection for small enterprises
T. Trantidou, G. Bravos, P. Valoggia, I. Skourtis, M. Falelakis, K. Poulios, I. Spais, S. Ioannidis, T. Oudin, R. Costa, C. Konialis, D. Holkham, Z. Kasapi, A. Karantjias
On the (in)security of memory protection units
M. Grisafi, M. Ammar, B. Crispo
H4rm0ny: a competitive zero-sum two-player Markov game for multi-agent learning on evasive malware generation and detection
C. Molloy, S. Ding, B. Fung, P. Charland
SoK: Demystifying cyber resilience quantification in cyber-physical systems
H. Lee, S. Kim, H. K. Kim
Auditing a software-defined cross domain solution architecture
N. Daughety, M. Pendleton, R. Perez, S. Xu, J. Franco
Moving target defense routing for SDN-enabled smart grid
M. Abdelkhalek, B. Hyder, M. Govindarasu, C. Rieger
BLEND: Efficient and blended iot data storage and communication with application layer security
J. Hoglund, S. Raza
A comparative overview of automotive radar spoofing countermeasures
M. Vu, W. Headley, K. Heaslip
Ensemble of random and isolation forests for graph-based intrusion detection in containers
A. Iacovazzi, S. Raza
ML-based anomaly detection system for DER DNP3 communication in smart grid
M. Abdelkhalek, M. Govindarasu
ICT in healthcare: The role of IoT and the SECANT solution
M. Caballero, D. Kavallieros, A. Spyros, A. Tavernarakis, A. Tziouvaras, S. Bonacina, K. Chandrarmouli, M. Coroiu, L. Chen, T. Dounia, I. Giannoulakis, N. Gligoric, E. Kafetzakis, T. Kasig, V. Koumaras, T. Krousarlis, K. Lapidaki, A. Markakis, S. Marin, M. Manulis, S. Menesidou, S. Nifakos, L. Meng, S. Mhiri, M. Nati, K. Ntafloukas, D. Oniga, D. Papamartzivanos, S. Papastergiou, K. Sanchez, C. Sakkas, K. Stelliou, L. Trujillo, T. Tsikrika, E. Venegas, S. Vrochidis, D. Xydias
OGMA: Visualisation for software container security analysis and automated remediation
A. Mills, J. White, P. Legg
Android device incident response: Viber analysis
A. Vasilaras, D. Dosis, M. Kotsis, P. Rizomiliotis
An approach to address risk management challenges focused on IT governance framework
H. Alessa, R. Boodai, A. Alanazi
On usability of hash fingerprinting for endpoint application identification
J. Heino, A. Gupta, A. Hakkala, S. Virtanen
Blockchain-enabled digital forensics for the IoT: Challenges, features, and current frameworks
S. Brotsis, N. Kolokotronis
Neural network based temporal point processes for attack detection in industrial control systems
G. Fortino, C. Greco, A. Guzzo, M. Ianni
SeeShells: An optimized solution for utilizing shellbags in a digital forensic investigation
E. Amoruso, R. Leinecker, C. Zou
CoReTM: An approach enabling cross-functional collaborative threat modeling
J. Von der Assen, M. Figueredo Franco, C. Killer
Evaluating perceptual hashing algorithms in detecting image manipulation over social media platforms
M. Alkhowaiter, K. Almubarak, C. Zou
Data volume reduction for deep packet inspection by multi-layer application determination
M. Vogel, F. Schuster, F. Kopp, H. Konig
Improving resilience in cyber-physical systems based on transfer learning
M. Saman Azari, F. Flammini, S. Santini
Modelling and assessing the risk of cascading effects with resilblockly
I. Bicchierai, E. Schiavone, F. Brancati
Enhancing the aggregation of the federated learning for the industrial cyber physical systems
S. Guendouzi, S. Ouchani, M. Malki
Host-based cyber attack pattern identification on honeypot logs using association rule learning
A. Papoutsis, C. Iliou, D. Kavallieros, T. Tsikrika, S. Vrochidis, I. Kompatsiaris
Configuration vulnerability in SNORT for Windows operating systems
S. Guarino, M. Grassi, R. Setola, L. Faramondi, C. Alcaraz
An approach to improve the robustness of machine learning based intrusion detection system models against the Carlini-Wagner attack
M. Pujari, B. Cherukuri, A. Javaid, W. Sun
Control logic obfuscation attack in industrial control systems
N. Zubair, A. Ayub, H. Yoo, I. Ahmed
Semantic-aware vulnerability detection
Z. Huang, M. White
Powertrace-based fuzzing of CAN connected hardware
M. Dunne, S. Fischmeister
Using cyberscore for network traffic monitoring
L. Deri, A. Cardigliano
A blockchain-based trustworthy cloud services digital ecosystem
E. Bellini, S. Cimato, A. Esposito, I. Aversa
IPASS: A novel open-source intelligence password scoring system
J. Hubbard, G. Bendiab, S. Shiaeles
CIDS: Collaborative intrusion detection system using blockchain technology
G. Gurung, G. Bendiab, M. Shiaele, S. Shiaeles