Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Machine Learning for Automated Industrial IoT Attack Detection: An Efficiency-Complexity Trade-off

Published: 22 October 2021 Publication History

Abstract

Critical city infrastructures that depend on smart Industrial Internet of Things (IoT) devices have been increasingly becoming a target of cyberterrorist or hacker attacks. Although this has led to multiple studies in the recent past, there exists a paucity of literature concerning real-time Industrial IoT attack detection. The goal of this article is to build a machine-learning approach using Industrial IoT sensor readings for accurately tracking down Industrial IoT attacks in real time. We analyze IoT system behavior under a lab-controlled series of attacks on a Secure Water Treatment (SWaT) system. The system is analytically challenging in that it results in sensor readings that resemble waveforms. To that end, we develop a novel early detection method using functional shape analysis (FSA) to extract features from the data that can capture the profile of the waveform. Our results show an efficiency-complexity trade-off between functional and non-functional methods in predicting IoT attacks.

References

[1]
Wan Siti Ahmad, Halimatul Munirah Wan, and Mohammad Faizal Ahmad Fauzi. 2008. Comparison of different feature extraction techniques in content-based image retrieval for CT brain images. In IEEE 10th Workshop on Multimedia Signal Processing, Cairns. IEEE, 503–508.
[2]
Mansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov, and Giorgio Giacinto. 2016. Novel feature extraction, selection and fusion for effective malware family classification. In Proceedings of the 6th ACM Conference on Data and Application Security and Privacy New Orleans. ACM, 183–194.
[3]
Abdulmohsen Almalawi, Xinghuo Yu, Zahir Tari, Adil Fahad, and Ibrahim Khalil. 2014. An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Computers & Security 46 (2014), 94–110.
[4]
Simon Duque Anton, Lia Ahrens, Daniel Fraunholz, and Hans Dieter Schotten. 2018. Time is of the essence: Machine learning-based intrusion detection in industrial time series data. In IEEE International Conference on Data Mining Workshops (ICDMW’18), Singapore. IEEE, 1–6.
[5]
Tahereh Babaie, Sanjay Chawla, Sebastien Ardon, and Yue Yu. 2014. A unified approach to network anomaly detection. In IEEE International Conference on Big Data (Big Data’14), Washington DC. IEEE, 650–655.
[6]
Ravi Bapna, Wolfgang Jank, and Galit Shmueli. 2008. Price formation and its dynamics in online auctions. Decision Support Systems 44, 3 (2008), 641–656.
[7]
Konstantin Bauman, Alexander Tuzhilin, and Ryan Zaczynski. 2017. Using social sensors for detecting emergency events: A case of power outages in the electrical utility industry. ACM Transactions on Management Information Systems 8, 2–3 (2017), 1–20.
[8]
Cesar Cerrudo. 2015. An emerging US (and world) threat: Cities wide open to cyber-attacks. Securing Smart Cities 17 (2015), 137–151.
[9]
Christian Cervantes, Diego Poplade, Michele Nogueira, and Aldri Santos. 2015. Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In IFIP/IEEE International Symposium on Integrated Network Management (IM’15), Ottawa. IEEE, 606–611.
[10]
Tsan-Ming Choi, Chi-Leung Hui, Na Liu, Sau-Fun Ng, and Yong Yu. 2014. Fast fashion sales forecasting with limited data and time. Decision Support Systems 59 (2014), 84–92.
[11]
Christophe Croux and Anne Ruiz-Gazen. 2005. High breakdown estimators for principal components: The projection-pursuit approach revisited. Journal of Multivariate Analysis 95, 1 (2005), 206–226.
[12]
Sérgio Francisco Da Silva, Marcela Xavier Ribeiro, João do ES Batista Neto, Caetano Traina-Jr, and Agma J. M. Traina. 2011. Improving the ranking quality of medical image retrieval using a genetic feature selection method. Decision Support Systems 51, 4 (2011), 810–820.
[13]
Menachem Domb, Elisheva Bonchek-Dokow, and Guy Leshem. 2017. Lightweight adaptive random-forest for IoT rule generation and execution. Journal of Information Security and Applications 34 (2017), 218–224.
[14]
Dhanapal Durai Dominic, and Aiman Moyaid Said. 2014. Network anomaly detection approach based on frequent pattern mining technique. In International Conference on Computational Science and Technology (ICCST’14), Malaysia. IEEE, 1–6.
[15]
Sarah M. Erfani, Sutharshan Rajasegarar, Shanika Karunasekera, and Christopher Leckie. 2016. High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognition 58 (2016), 121–134.
[16]
Görrel Espelund. 2016. How vulnerable are water utilities to traditional and cyber threats? Environmental Science & Engineering Magazine. Retrieved July 18, 2021 from https://esemag.com/featured/how-vulnerable-are-water-utilities-to-cyber-threats/.
[17]
Wei Fan, Matthew Miller, Sal Stolfo, Wenke Lee, and Phil Chan. 2004. Using artificial anomalies to detect unknown and known network intrusions. Knowledge and Information Systems 6, 5 (2004), 507–527.
[18]
Frédéric Ferraty and Philippe Vieu. 2006. Nonparametric functional data analysis: theory and practice. Springer Science & Business Media.
[19]
Natasha Zhang Foutz and Wolfgang Jank. 2010. Research note—prerelease demand forecasting for motion pictures using functional shape analysis of virtual stock markets. Marketing Science 29, 3 (2010), 568–579.
[20]
Keke Gai, Meikang Qiu, and Houcine Hassan. 2017. Secure cyber incident analytics framework using Monte Carlo simulations for financial cybersecurity insurance in cloud computing. Concurrency and Computation: Practice and Experience 29, 7 (2017), e3856.
[21]
Long Gao, Susan H. Xu, and Michael O. Ball. 2012. Managing an available-to-promise assembly system with dynamic short-term pseudo-order forecast. Management Science 58, 4 (2012), 770–790.
[22]
Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, and Aditya Mathur. 2016. A dataset to support research in the design of secure water treatment systems. In International Conference on Critical Information Infrastructures Security 88–99. Paris Springer, Cham.
[23]
Negin Golrezaei, Hamid Nazerzadeh, and Paat Rusmevichientong. 2014. Real-time optimization of personalized assortments. Management Science 60, 6 (2014), 1532–1551.
[24]
Michael Hagenau, Michael Liebmann, and Dirk Neumann. 2013. Automated news reading: Stock price prediction based on financial news using context-capturing features. Decision Support Systems 55, 3 (2013), 685–697.
[25]
James V. Hansen, Paul Benjamin Lowry, Rayman D. Meservy, and Daniel M. McDonald. 2007. Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decision Support Systems 43, 4 (2007), 1362–1374.
[26]
Mahmudul Hasan, Md Milon Islam, Md Ishrak Islam Zarif, and M. M. A. Hashem. 2019. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things 7 (2019), 100059.
[27]
Elike Hodo, Xavier Bellekens, Andrew Hamilton, Pierre-Louis Dubouilh, Ephraim Iorkyase, Christos Tachtatzis, and Robert Atkinson. 2016. Threat analysis of IoT networks using artificial neural network intrusion detection system. In International Symposium on Networks, Computers and Communications (ISNCC’16), Tunisia. IEEE, 1–6.
[28]
Jonathan Huang, Vivek Rathod, Chen Sun, Menglong Zhu, Anoop Korattikara, Alireza Fathi, Ian Fischer, et al. 2017. Speed/accuracy trade-offs for modern convolutional object detectors. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu. IEEE, 7310–7311.
[29]
Mohammad S. Jalali, Michael Siegel, and Stuart Madnick. 2019. Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment. The Journal of Strategic Information Systems 28, 1 (2019), 66–82.
[30]
Julian Jang-Jaccard and Surya Nepal. 2014. A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences 80, 5 (2014), 973–993.
[31]
Wolfgang Jank and Shu Zhang. 2011. An automated and data-driven bidding strategy for online auctions. INFORMS Journal on Computing 23, 2 (2011), 238–253.
[32]
Jun Jiang, and Symeon Papavassiliou. 2004. Detecting network attacks in the Internet via statistical network traffic normality prediction. Journal of Network and Systems Management 12, 1 (2004), 51–72.
[33]
Jianmin Jiang and Lasith Yasakethu. 2013. Anomaly detection via one class SVM for protection of SCADA systems. In International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Beijing. IEEE, 82–88.
[34]
Lawrie Jones. 2016. Securing the smart city. Retrieved July 18, 2021 from https://eandt.theiet.org/content/articles/2016/05/securing-the-smart-city/.
[35]
Wolfgang Ketter, John Collins, Maytal Saar-Tsechansky, and Ori Marom. 2018. Information systems for a smart electricity grid: Emerging challenges and opportunities. ACM Transactions on Management Information Systems (TMIS) 9, 3 (2018), 1–22.
[36]
Rida Khatoun and Sherali Zeadally. 2016. Smart cities: Concepts, architectures, research opportunities. Communications of the ACM 59, 8 (2016), 46–57.
[37]
Rob Kitchin and Martin Dodge. 2019. The (in) security of smart cities: Vulnerabilities, risks, mitigation, and prevention. Journal of Urban Technology 26, 2 (2019), 47–65.
[38]
Alois Kneip and Klaus J. Utikal. 2001. Inference for density families using functional principal component analysis. Journal of the American Statistical Association 96, 454 (2001), 519–542.
[39]
John Leyden. 2016. Water treatment plant hacked, chemical mix changed for tap supplies. Retrieved July 18, 2021 from https://www.theregister.co.uk/2016/03/24/water_utility_hacked/.
[40]
Haiqin Liu and Min Sik Kim. 2010. Real-time detection of stealthy DDoS attacks using time-series decomposition. In IEEE International Conference on Communications, Cape Town. IEEE, 1–6.
[41]
N. Locantore, J. S. Marron, D. G. Simpson, N. Tripoli, J. T. Zhang, K. L. Cohen, Graciela Boente, et al. 1999. Robust principal component analysis for functional data. Test 8, 1 (1999), 1–73.
[42]
Scott I. MacKenzie and Poika Isokoski. 2008. Fitts' throughput and the speed-accuracy tradeoff. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Florence. 1633–1636.
[43]
Teena Maddox. 2016. Smart cities: 6 essential technologies. Retrieved July 18, 2021 from https://www.techrepublic.com/article/smart-cities-6-essential-technologies/.
[44]
Leandros A. Maglaras and Jianmin Jiang. 2014. Intrusion detection in SCADA systems using machine learning techniques. In Science and Information Conference, London. IEEE, 626–631.
[45]
Diana Maltseva. 2018. IoT technology in Healthcare. The Creation of Smart Hospitals. Retrieved July 18, 2021 from https://medium.com/@Diana.Maltseva/iot-technology-in-healthcare-the-creation-of-smart-hospitals-926d41bf239.
[46]
Alexander McLeod and Diane Dolezel. 2018. Cyber-analytics: Modeling factors associated with healthcare data breaches. Decision Support Systems 108 (2018), 57–68.
[47]
Yair Meidan, Michael Bohadana, Asaf Shabtai, Juan David Guarnizo, Martín Ochoa, Nils Ole Tippenhauer, and Yuval Elovici. 2017. ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis. In Proceedings of the Symposium on Applied Computing, Marakkesh. 506–509.
[48]
Patric Nader, Paul Honeine, and Pierre Beauseroy. 2016. Detection of cyberattacks in a water distribution system using machine learning techniques. In 6th International Conference on Digital Information Processing and Communications (ICDIPC’16), Beirut. IEEE, 25–30.
[49]
Ellen Nakashima. 2011. Foreign hackers targeted U.S. water plant in apparent malicious cyber attack, expert says. Retrieved July 18, 2021 from https://www.washingtonpost.com/blogs/checkpoint-washington/post/foreign-hackers-broke-into-illinois-water-plant-control-system-industry-expert-says/2011/11/18/gIQAgmTZYN_blog.html?utm_term=.e531bba76430.
[50]
Daniela Oliveira. 2010. Cyber-terrorism & critical energy infrastructure vulnerability to cyber-attacks. Environmental & Energy Law & Policy Journal 5 (2010), 519.
[51]
Jesus Pacheco and Salim Hariri. 2016. IoT security framework for smart cyber infrastructures. In IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS* W’16), Augsburg. IEEE, 242–247.
[52]
Dong Ping Tian. 2013. A review on image feature extraction and representation techniques. International Journal of Multimedia and Ubiquitous Engineering 8, 4 (2013), 385–396.
[53]
J.-P. Planquart. 2001. Application of neural networks to intrusion detection. Sans Institute Retrieved July 18, 2021 from http://rr.sans.org/intrusion/neural.php.
[54]
Sutharshan Rajasegarar, Christopher Leckie, and Marimuthu Palaniswami. 2014. Hyperspherical cluster based distributed anomaly detection in wireless sensor networks. Journal of Parallel and Distributed Computing 74, 1 (2014), 1833–1847.
[55]
Sam Ransbotham, Robert G. Fichman, Ram Gopal, and Alok Gupta. 2016. Special section introduction—Ubiquitous IT and digital vulnerabilities. Information Systems Research 27, 4 (2016), 834–847.
[56]
Sarah J. Ratcliffe, Leo R. Leader, and Gillian Z. Heller. 2002. Functional data analysis with application to periodically stimulated foetal heart rate data. I: Functional regression. Statistics in Medicine 21, 8 (2002), 1103–1114.
[57]
Shahid Raza, Linus Wallgren, and Thiemo Voigt. 2013. SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Networks 11, 8 (2013), 2661–2674.
[58]
Eli Rosenberg and Maya Salam. 2017. Hacking attack woke up Dallas with emergency sirens, Officials Say. Retrieved July 18, 2021 from https://www.nytimes.com/2017/04/08/us/dallas-emergency-sirens-hacking.html?_r=1&utm_source=MIT+Technology+Review&utm_campaign=056ffab32c-The_Download_2017-04-07&utm_medium=email&utm_term=0_997ed6f472-056ffab32c-154352697&mtrref=undefined.
[59]
David E. Sanger. 2016a. Utilities cautioned about potential for a cyberattack after Ukraine's. Retrieved July 18, 2021 from https://www.nytimes.com/2016/03/01/us/politics/utilities-cautioned-about-potential-for-a-cyberattack-after-ukraines.html. (2016).
[60]
David E. Sanger. 2016b. U.S. Indicts 7 Iranians in cyberattacks on banks and a dam. Retrieved July 18, 2021 from https://www.nytimes.com/2016/03/25/world/middleeast/us-indicts-iranians-in-cyberattacks-on-banks-and-a-dam.html.
[61]
Naoum Sayegh, Imad H. Elhajj, Ayman Kayssi, and Ali Chehab. 2014. SCADA intrusion detection system based on temporal behavior of frequent patterns. In 17th IEEE Mediterranean Electrotechnical Conference (MELECON’14), Porto Vallerta. IEEE, 432–438.
[62]
Cong Shi, Jian Liu, Hongbo Liu, and Yingying Chen. 2017. Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Los Angeles. ACM, 1–10.
[63]
Robert P. Schumaker and Hsinchun Chen. 2009. Textual analysis of stock market prediction using breaking financial news: The AZFin text system. ACM Transactions on Information Systems (TOIS) 27, 2 (2009), 1–19.
[64]
Andrei Sleptchenko and M. Eric Johnson. 2015. Maintaining secure and reliable distributed control systems. INFORMS Journal on Computing 27, 1 (2015), 103–117.
[65]
Heung-Il Suk, Seong-Whan Lee, Dinggang Shen, and Alzheimer's Disease Neuroimaging Initiative. 2014. Hierarchical feature representation and multimodal fusion with deep learning for AD/MCI diagnosis. NeuroImage 101 (2014), 569–582.
[66]
Heung-Il Suk, Seong-Whan Lee, Dinggang Shen, and Alzheimer's Disease Neuroimaging Initiative. 2015. Latent feature representation with stacked auto-encoder for AD/MCI diagnosis. Brain Structure and Function 220, 2 (2015), 841–859.
[67]
Montbel Thibaud, Huihui Chi, Wei Zhou, and Selwyn Piramuthu. 2018. Internet of Things (IoT) in high-risk environment, health and safety (EHS) industries: A comprehensive review. Decision Support Systems 108 (2018), 79–95.
[68]
Todd Thibodeaux. 2017. Smart cities are going to be a security nightmare. Retrieved July 18, 2021 from https://hbr.org/2017/04/smart-cities-are-going-to-be-a-security-nightmare.
[69]
Marina Thottan and Chuanyi Ji. 1999. Statistical detection of enterprise network problems. Journal of Network and Systems Management 7, 1 (1999), 27–45.
[70]
Hui Tian and Meimei Ding. 2016. Diffusion wavelet-based anomaly detection in networks. In 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT’16), Guangzhou. IEEE, 382–386.
[71]
Chi-Ho Tsang and Sam Kwong. 2005. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In IEEE International Conference on Industrial Technology. IEEE, 51–56.
[72]
A. Onuchowska, S. Chakraborty, W. Jank, and U. Shrivastava. 2018. Detection and classification of attacks on IoT networks. In 24th Americas Conference on Information Systems AMCIS 2018, New Orleans. Association for Information Systems.
[73]
Shahid Ullah and Caroline F. Finch. 2013. Applications of functional data analysis: A systematic review. BMC Medical Research Methodology 13, 1 (2013), 43.
[74]
Koen Uyttenhove and Michel SJ Steyaert. 2002. Speed-power-accuracy tradeoff in high-speed CMOS ADCs. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing 49, 4 (2002), 280–287.
[75]
Jouni Viinikka, Debar Hervé, Mé Ludovic, Anssi Lehikoinen, and Mika Tarvainen. 2009. Processing intrusion detection alert aggregates with time series modeling. Information Fusion 10, 4 (2009), 312–324.
[76]
Eduardo Viegas, Altair Santin, Alysson Bessani, and Nuno Neves. 2019. BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks. Future Generation Computer Systems 93 (2019), 473–485.
[77]
Bradley W. Vines, Carol L. Krumhansl, Marcelo M. Wanderley, and Daniel J. Levitin. 2006. Cross-modal interactions in the perception of musical performance. Cognition 101, 1 (2006), 80–113.
[78]
Roberto Viviani, Georg Grön, and Manfred Spitzer. 2005. Functional principal component analysis of fMRI data. Human Brain Mapping 24, 2 (2005), 109–129.
[79]
Brett Walton. 2017. Water utility cyberattack rings up hefty data charges—circle of blue. Retrieved July 18, 2021 from http://www.circleofblue.org/2017/water-management/water-utility-cyberattack-rings-hefty-data-charges/.
[80]
Shanshan Wang, Wolfgang Jank, and Galit Shmueli. 2008. Explaining and forecasting online auction prices and their dynamics using functional data analysis. Journal of Business & Economic Statistics 26, 2 (2008), 144–160.
[81]
Jian Yang, David Zhang, Alejandro F. Frangi, and Jing-yu Yang. 2004. Two-dimensional PCA: A new approach to appearance-based face representation and recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 26, 1 (2004), 131–137.
[82]
Fang Yao, Hans-Georg Müller, and Jane-Ling Wang. 2005. Functional data analysis for sparse longitudinal data. Journal of the American Statistical Association 100, 470 (2005), 577–590.
[83]
Adel Yazdanmehr and Jingguo Wang. 2016. Employees' information security policy compliance: A norm activation perspective. Decision Support Systems 92 (2016), 36–46.
[84]
Yishi Zhang, Qi Zhang, Zhijun Chen, Jennifer Shang, and Haiying Wei. 2019. Feature assessment and ranking for classification with nonlinear sparse representation and approximate dependence analysis. Decision Support Systems 122 (2019), 113064.

Cited By

View all
  • (2024)Generative AI for Threat Hunting and Behaviour AnalysisUtilizing Generative AI for Cyber Defense Strategies10.4018/979-8-3693-8944-7.ch007(235-286)Online publication date: 13-Sep-2024
  • (2024)Advancing Industrial Cybersecurity: Machine Learning-Based Detection and Mitigation of IIoT Attacks2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS)10.1109/ICICNIS64247.2024.10823323(396-402)Online publication date: 17-Dec-2024
  • (2024)Recent endeavors in machine learning-powered intrusion detection systems for the Internet of ThingsJournal of Network and Computer Applications10.1016/j.jnca.2024.103925229(103925)Online publication date: Sep-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Management Information Systems
ACM Transactions on Management Information Systems  Volume 12, Issue 4
December 2021
225 pages
ISSN:2158-656X
EISSN:2158-6578
DOI:10.1145/3483349
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 October 2021
Accepted: 01 April 2021
Revised: 01 December 2020
Received: 01 May 2020
Published in TMIS Volume 12, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Industrial IoT
  2. cybersecurity
  3. machine learning
  4. functional shape analysis (FSA)

Qualifiers

  • Research-article
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)77
  • Downloads (Last 6 weeks)9
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Generative AI for Threat Hunting and Behaviour AnalysisUtilizing Generative AI for Cyber Defense Strategies10.4018/979-8-3693-8944-7.ch007(235-286)Online publication date: 13-Sep-2024
  • (2024)Advancing Industrial Cybersecurity: Machine Learning-Based Detection and Mitigation of IIoT Attacks2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS)10.1109/ICICNIS64247.2024.10823323(396-402)Online publication date: 17-Dec-2024
  • (2024)Recent endeavors in machine learning-powered intrusion detection systems for the Internet of ThingsJournal of Network and Computer Applications10.1016/j.jnca.2024.103925229(103925)Online publication date: Sep-2024
  • (2024)Industrial cyber-physical systems protectionComputers and Security10.1016/j.cose.2023.103531135:COnline publication date: 10-Jan-2024
  • (2024)Accelerated Addition in Resistive Ram Array Using Parallel-Friendly Majority GatesModern Approaches in Machine Learning and Cognitive Science: A Walkthrough10.1007/978-3-031-43009-1_10(111-119)Online publication date: 14-Jan-2024
  • (2023)A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack BehaviorsACM Transactions on Cyber-Physical Systems10.1145/36375548:1(1-20)Online publication date: 15-Dec-2023
  • (2023)A deep learning approach for intrusion detection in Internet of Things using focal loss functionInternet of Things10.1016/j.iot.2023.10069922(100699)Online publication date: Jul-2023
  • (2023)AI for Cyberbiosecurity in Water Systems—A SurveyCyberbiosecurity10.1007/978-3-031-26034-6_13(217-263)Online publication date: 11-Jan-2023
  • (2022)Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CIDSensors10.3390/s2301032123:1(321)Online publication date: 28-Dec-2022
  • (2022)A Proactive Attack Detection for Heating, Ventilation, and Air Conditioning (HVAC) System Using Explainable Extreme Gradient Boosting Model (XGBoost)Sensors10.3390/s2223923522:23(9235)Online publication date: 27-Nov-2022
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media