Articles with "attack detection" as a keyword



Adaptive FDI Attack Detection in Nonlinear Cyber‐Physical Systems With Uncertain Parameters

Sign Up to like & get
recommendations!
Published in 2025 at "International Journal of Robust and Nonlinear Control"

DOI: 10.1002/rnc.70160

Abstract: This article focuses on the detection of false data injection (FDI) attacks in nonlinear cyber‐physical systems with uncertain parameters, aiming to improve both the speed and accuracy of actuator detection affected by FDI attacks. First,… read more here.

Keywords: detection; nonlinear cyber; physical systems; attack detection ... See more keywords

Observer‐Based Attack Detection and Data‐Driven Resilient Control for Heterogeneous Nonlinear Nonaffine Mass Under FDI Attacks

Sign Up to like & get
recommendations!
Published in 2024 at "International Journal of Robust and Nonlinear Control"

DOI: 10.1002/rnc.7699

Abstract: The attack detection and data‐driven resilient control problem for heterogeneous nonlinear nonaffine multi‐agent systems (MASs) in the presence of intermittent false data injection (FDI) attacks is investigated in this article. First, an attack detection and… read more here.

Keywords: driven resilient; attack; control; attack detection ... See more keywords

Clustering-based attack detection for adversarial reinforcement learning

Sign Up to like & get
recommendations!
Published in 2024 at "Applied Intelligence"

DOI: 10.1007/s10489-024-05275-7

Abstract: Detecting malicious attacks presents a major challenge in the field of reinforcement learning (RL), as such attacks can force the victim to perform abnormal actions, with potentially severe consequences. To mitigate these risks, current research… read more here.

Keywords: detection; clustering based; attack; attack detection ... See more keywords

Cyber-attack detection via non-linear prediction of IP addresses: an innovative big data analytics approach

Sign Up to like & get
recommendations!
Published in 2021 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-021-11390-1

Abstract: Computer network systems are often subject to several types of attacks. For example, an excessive traffic load sent to a web server for making it unusable is the main technique introduced by the Distributed Denial… read more here.

Keywords: cyber attack; address; attack detection; non linear ... See more keywords

Trust Based DoS Attack Detection in Wireless Sensor Networks for Reliable Data Transmission

Sign Up to like & get
recommendations!
Published in 2021 at "Wireless Personal Communications"

DOI: 10.1007/s11277-021-08855-9

Abstract: Wireless sensor network occupies an inevitable role in various applications that requires data collection and transmission. The tiny wireless sensor nodes are responsible for data collection and transmission. However, these randomly deployed nodes are vulnerable… read more here.

Keywords: attack detection; detection; wireless sensor;
Photo from wikipedia

A novel centralized cloud information accountability integrity with ensemble neural network based attack detection approach for cloud data

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-01916-0

Abstract: Highly scalable services are enabled by cloud computing and easily consumed over the Internet. User data is normally stored remotely in cloud services. Users do not own or operate the machines. This is a key… read more here.

Keywords: information; attack detection; centralized cloud; cloud ... See more keywords

Swift Detection of XSS Attacks: Enhancing XSS Attack Detection by Leveraging Hybrid Semantic Embeddings and AI Techniques

Sign Up to like & get
recommendations!
Published in 2024 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-024-09140-0

Abstract: Cross-Site Scripting (XSS) attacks continue to be a significant threat to web application security, necessitating robust detection mechanisms to safeguard user data and ensure system integrity. In this study, we present a novel approach for… read more here.

Keywords: detection; xss attack; xss attacks; attack detection ... See more keywords

A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs

Sign Up to like & get
recommendations!
Published in 2019 at "Ad Hoc Networks"

DOI: 10.1016/j.adhoc.2019.01.010

Abstract: Abstract Vehicular Ad Hoc Networks (VANETs) are expected to play an important role in our lives. They will improve traffic safety and bring a revolution on the driving experience. However, these benefits are counterbalanced by… read more here.

Keywords: model; sybil attack; traffic; attack detection ... See more keywords

DDoS attack detection in intelligent transport systems using adaptive neuro-fuzzy inference system

Sign Up to like & get
recommendations!
Published in 2025 at "Scientific Reports"

DOI: 10.1038/s41598-025-06719-x

Abstract: An intelligent transportation system consists of a variety of applications that analyze and exchange information to reduce traffic, enhance traffic management, lessen the impact on the environment, and boost the advantages of transportation for both… read more here.

Keywords: system; attack detection; transportation; intelligent transportation ... See more keywords

GraphFedAI framework for DDoS attack detection in IoT systems using federated learning and graph based artificial intelligence

Sign Up to like & get
recommendations!
Published in 2025 at "Scientific Reports"

DOI: 10.1038/s41598-025-10826-0

Abstract: The Internet of Things (IoT) consists of physical objects and devices embedded with network connectivity, software, and sensors to collect and transmit data. The development of the Internet of Things (IoT) has led to various… read more here.

Keywords: detection; attack detection; privacy; federated learning ... See more keywords

An attack detection method based on deep learning for internet of things

Sign Up to like & get
recommendations!
Published in 2025 at "Scientific Reports"

DOI: 10.1038/s41598-025-14808-0

Abstract: With the rapid development of Internet of Things (IoT) technology, the number of network attack methods it faces is also increasing, and the malicious network traffic generated is growing exponentially. To identify attack traffic for… read more here.

Keywords: attack; attack detection; internet things; iot ... See more keywords