|
|
|
Carlos Blanco, Antonio Santos-Olmo and Luis Enrique Sánchez
As the Internet of Things (IoT) becomes more integral across diverse sectors, including healthcare, energy provision and industrial automation, the exposure to cyber vulnerabilities and potential attacks increases accordingly. Facing these challenges, th...
ver más
|
|
|
|
|
|
|
Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut and Marianne Azer
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations f...
ver más
|
|
|
|
|
|
|
Vita Santa Barletta, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera and Manuel Ángel Serrano Martín
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using...
ver más
|
|
|
|
|
|
|
Samuel Ndichu, Tao Ban, Takeshi Takahashi and Daisuke Inoue
Intrusion analysis is essential for cybersecurity, but oftentimes, the overwhelming number of false alerts issued by security appliances can prove to be a considerable hurdle. Machine learning algorithms can automate a task known as security alert data a...
ver más
|
|
|
|
|
|
|
Mohammed Imran Basheer Ahmed, Rim Zaghdoud, Mohammed Salih Ahmed, Razan Sendi, Sarah Alsharif, Jomana Alabdulkarim, Bashayr Adnan Albin Saad, Reema Alsabt, Atta Rahman and Gomathi Krishnasamy
To constructively ameliorate and enhance traffic safety measures in Saudi Arabia, a prolific number of AI (Artificial Intelligence) traffic surveillance technologies have emerged, including Saher, throughout the past years. However, rapidly detecting a v...
ver más
|
|
|
|
|
|
|
Eva Maia, Norberto Sousa, Nuno Oliveira, Sinan Wannous, Orlando Sousa and Isabel Praça
Critical infrastructures are an attractive target for attackers, mainly due to the catastrophic impact of these attacks on society. In addition, the cyber?physical nature of these infrastructures makes them more vulnerable to cyber?physical threats and m...
ver más
|
|
|
|
|
|
|
Julio Moreno, Manuel A. Serrano, Eduardo B. Fernandez and Eduardo Fernández-Medina
Big data ecosystems are increasingly important for the daily activities of any type of company. They are decisive elements in the organization, so any malfunction of this environment can have a great impact on the normal functioning of the company; secur...
ver más
|
|
|
|
|
|
|
Pawel Dymora and Miroslaw Mazurek
Fractal and multifractal analysis can help to discover the structure of the communication system, and in particular the pattern and characteristics of traffic, in order to understand the threats better and detect anomalies in network operation. The massi...
ver más
|
|
|
|
|
|
|
Francesco Bergadano, Fabio Carretto, Fabio Cogno and Dario Ragno
A novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modif...
ver más
|
|
|
|
|
|
|
Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis and Georgios Pangalos
The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the ever-changing threat landscape challenges have an adverse impact on the efficiency of information s...
ver más
|
|
|
|