Science topic

Cyber Defense - Science topic

Explore the latest publications in Cyber Defense, and find Cyber Defense experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Cyber Defense (2,181)
Sorted by most recent
Preprint
Full-text available
As cyber threats become increasingly sophisticated, traditional security methods are often insufficient to combat emerging risks. Neural networks and artificial intelligence (AI) offer transformative potential in advancing cyber defense mechanisms, enhancing both the detection and prevention of complex attacks. Leveraging AI's capacity to analyze v...
Preprint
Full-text available
The increasing sophistication of cyber threats necessitates innovative defense strategies capable of adapting to evolving attack patterns. This paper explores the synergy between game theory and artificial intelligence (AI) in developing advanced cyber defense mechanisms. By modeling the interactions between attackers and defenders as strategic gam...
Article
Full-text available
This article examines the transformative role of Artificial Intelligence (AI) in revolutionizing cybersecurity practices, with a particular focus on threat modeling and vulnerability assessment. As cyber threats grow increasingly sophisticated, traditional security measures often fall short in providing comprehensive protection. We explore how AI a...
Article
Full-text available
The rapid digitalization of Tamil Nadu's economy has been accompanied by a surge in cybercrime, threatening the sustainability of economic growth and social well-being. This paper explores the economic impact of cybercrime on society and its implications for sustainable economic development in the region, focusing on key trends, challenges, and con...
Article
Full-text available
In an era marked by escalating cyber threats and sophisticated attack methodologies, organizations are increasingly turning to artificial intelligence (AI) to enhance their cyber defense strategies. This article explores the transformative impact of AI-driven predictive threat intelligence and automation on modern security frameworks. By leveraging...
Article
Full-text available
The object of the study is a corporate network with a dynamic structure and centralized management. The subject of the research is the processes of ensuring the protection of information resources in the corporate network. The goal is to develop a method of protecting information in the corporate network. The development is based on the Zero Trust...
Article
Full-text available
This article presents a comprehensive analysis of the role of machine learning in enhancing intrusion detection systems (IDS) within the field of cybersecurity. As cyber threats continue to evolve in complexity and frequency, traditional methods of threat detection often struggle to keep pace, leading to vulnerabilities that can be exploited by mal...
Preprint
Full-text available
Recent advances in multi-agent reinforcement learning (MARL) have created opportunities to solve complex real-world tasks. Cybersecurity is a notable application area, where defending networks against sophisticated adversaries remains a challenging task typically performed by teams of security operators. In this work, we explore novel MARL strategi...
Preprint
Full-text available
Modern network defense can benefit from the use of autonomous systems, offloading tedious and time-consuming work to agents with standard and learning-enabled components. These agents, operating on critical network infrastructure, need to be robust and trustworthy to ensure defense against adaptive cyber-attackers and, simultaneously, provide expla...
Article
Full-text available
Manufacturers employ platforms’ IoT infrastructure services to produce IoT products and sell them through these platforms. However, consumer data stored within the IoT infrastructure is susceptible to cyber-security risks. Government regulations mandate that platforms invest in IoT cyber-defense improvements, necessitating supply chain collaboratio...
Article
As the reliance on machine learning (ML) technologies in cyber defense intensifies, so too do the ethical considerations associated with their deployment. Machine learning algorithms have the potential to enhance the speed and effectiveness of threat detection, incident response, and overall cybersecurity posture. However, the integration of these...
Poster
Full-text available
Quantum Algorithms for Enhancing Cybersecurity in Computational Intelligence in Healthcare (QAECCIH-2024) The computing landscape is rapidly evolving, with quantum computing at the forefront of this transformation. This book offers a comprehensive examination of foundational principles, Cybersecurity, advanced quantum machine learning algorithms,...
Preprint
Full-text available
This short note contributes to the literature by showcasing a quantitative and comparative analysis of optimistic and pessimistic attacker modeling in automated cyber defense. It demonstrates, through simulation, that deviating from the conventional worst-case assumption can lead to significantly improved defender performance. This challenges estab...
Article
Full-text available
This study examines the cyber warfare strategies employed during the 2021-2022 conflict between Russia and Ukraine, focusing on how technological developments in information and communication have influenced this aspect of modern warfare. The conflict escalated as Russia viewed Ukraine's desire to join NATO as a significant threat, leading to a mix...
Article
Full-text available
The sophistication and breadth of cyber threats are continuously expanding, making it more difficult for traditional security measures to keep up. Artificial intelligence is revolutionizing cybersecurity by equipping businesses to proactively counter threats with automated reaction systems and predictive threat intelligence. Data analytics, behavio...
Preprint
Full-text available
Deep learning (DL)-based malware detectors have shown promise in swiftly detecting unseen malware without expensive dynamic malware behavior analysis. These detectors have been shown to be susceptible to adversarial malware variants generated from meticulously modifying known malware to mislead detectors into recognizing them as benign. Being able...
Article
Full-text available
This article comprehensively analyzes Israel’s experience in the legal regulation of cybersecurity and explores its potential adaptation for Ukraine. Israel is a leading cybersecurity nation due to its integrated approach to cyber protection. The paper examines key legislative acts and organizational measures implemented in Israel, such as establis...
Book
Full-text available
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates...
Research
Full-text available
The rise of cyber threats targeting cloud and network infrastructures has driven the demand for resilient, adaptive defense architectures. This paper explores the integration of artificial intelligence (AI) and machine learning (ML) into cybersecurity strategies, aiming to enhance threat detection, response speed, and predictive accuracy in cloud a...
Article
Full-text available
The integration of drones into various sectors, such as logistics, surveillance, agriculture, and emergency response, has revolutionized operational capabilities. However, this advancement has also exposed drones to significant cybersecurity threats, necessitating robust forensic investigation techniques. This paper presents a comprehensive approac...
Article
Full-text available
The Internet of Battlefield Things (IoBT) is revolutionizing military operations by integrating interconnected devices and autonomous systems into combat environments, significantly enhancing decision-making, communication, and battlefield efficiency. However, this reliance on IoBT introduces substantial cybersecurity risks, exposing military netwo...
Article
Full-text available
The current legal framework in Ukraine defines a set of cybersecurity measures and the need to plan their further development, which allows us to formulate and describe a general approach to cybersecurity in the form of a systematic process. At the same time, there is a need to form specific cybersecurity parameters that allow quantifying cybersecu...
Preprint
Full-text available
Cybersecurity threats have become increasingly complex and adaptive, requiring dynamic defense mechanisms that can keep pace with evolving attack vectors. The proposed hybrid cryptographic defense framework integrates machine learning through Llama, an open-source large language model, with traditional cryptographic techniques, enabling real-time a...
Presentation
Full-text available
The Cybersecurity Test and Evaluation Workshop by Tonex is designed to equip participants with the knowledge and skills to effectively assess and validate cybersecurity measures. This intensive workshop delves into cybersecurity testing methodologies, evaluation frameworks, and best practices to ensure robust protection of systems against modern c...
Article
Full-text available
In the rapidly evolving digital landscape, technology permeates every aspect of global society. As revolutionary developments continue to unfold, we witness the seamless integration of automation, IoT devices, cloud platforms, and emerging technologies for human convenience and the betterment of society. However, this remarkable technological depen...
Conference Paper
Full-text available
The exponential growth of the Internet of Things (IoT) and Cyber Physical Systems, coupled with the increasing frequency of accidental and malicious cyber events, has created a complex, ambiguous, and non-linear security environment. Traditional Cyber Resilience algorithms, often static and non-adaptive, struggle to keep pace with the dynamic natur...
Presentation
Full-text available
The Certified Cyber Warfare Technician (CCWT) course by Tonex equips participants with the critical knowledge and advanced skills needed to effectively engage in and counter cyber warfare activities. The program focuses on modern cyber defense and offensive strategies, bridging the gap between theoretical concepts and practical, hands-on technique...
Presentation
Full-text available
The Certified Cyber Electromagnetic Warfare Analyst (CCEWA) Certification is designed to equip professionals with advanced knowledge and expertise in the intersection of cyber and electromagnetic warfare. This program provides a comprehensive understanding of the operational, strategic, and technical aspects of modern cyber and electromagnetic envi...
Presentation
Full-text available
The Certified Cyber Capabilities Specialist (CCCS) Certification Course by Tonex is designed to provide professionals with a comprehensive understanding of the cyber landscape, focusing on identifying, analyzing, and mitigating cyber threats. This certification equips participants with cutting-edge strategies, technologies, and tools to strengthen...
Article
Full-text available
The impact of Artificial Intelligence (AI) on international security is unmistakable, as machines are now capable of undertaking tasks traditionally reserved for human intelligence. This shift brings forth a myriad of challenges in international security, affecting both conventional military capabilities and hybrid threats. Simultaneously, AI prese...
Article
Full-text available
Cybersecurity remains a critical concern, even amidst global events like the COVID-19 pandemic. The rise of COVID-19 has deepened cybersecurity threats, with phishing emails and phone scams attempting to exploit the situation. This paper focuses on proactive strategies to protect enterprise environments against threats and vulnerabilities, specific...
Article
Full-text available
In this human subjects study, we sought to enable user-based detection of malware within portable document format (PDF) files. Such malware is often difficult to detect with traditional malware detection tools. Humans are excellent sensors and pattern detectors and could be a key to more robust malware detection but need something to sense. By desi...
Research
Full-text available
In the face of rapidly evolving cyber threats, integrating machine learning (ML) with Intrusion Detection Systems (IDS) has emerged as a pivotal strategy for enhancing cybersecurity measures. Traditional IDS often struggle to keep pace with sophisticated attack techniques and large volumes of data, leading to high rates of false positives and negat...
Article
Full-text available
In an era where traditional perimeter-based security models are increasingly inadequate against sophisticated cyber threats, Zero Trust Architecture (ZTA) emerges as a robust framework designed to bolster cybersecurity. Zero Trust operates on the principle of "never trust, always verify," ensuring that every request-regardless of origin-undergoes r...
Research
Full-text available
Establishing a policy of least privilege is a fundamental principle in cybersecurity that limits users' access rights to only those necessary for their job functions. This principle aims to minimize the risk of accidental or malicious misuse of sensitive information and systems. By integrating the concept of segregation of duties (SoD), organizatio...
Research
Full-text available
In the rapidly evolving landscape of e-commerce, the need for a comprehensive cyber defense strategy is more critical than ever. As online transactions grow and digital platforms become more complex, they become increasingly attractive targets for cyber threats. To address these challenges, integrating AI-driven threat mitigation with blockchain se...
Research
Full-text available
In an era where cyber threats are increasingly sophisticated and pervasive, traditional reactive defense mechanisms are no longer sufficient to protect complex and dynamic network infrastructures. This paper proposes a proactive cyber defense framework that leverages the synergistic integration of Artificial Intelligence (AI), specifically evolutio...
Research
Full-text available
The exponential growth of e-commerce has necessitated the adoption of robust, scalable, and secure database technologies. This paper conducts a comparative analysis of three critical technologies-Blockchain, Scalable Storage Solutions, and Cyber Defense Strategies-within the context of e-commerce. Blockchain technology is explored for its decentral...
Research
Full-text available
Big Data has become a transformative force in supply chain optimization, particularly within the rapidly evolving realm of e-commerce. The exponential growth of data generated by e-commerce platforms, from customer preferences to real-time logistics, requires businesses to adopt scalable data storage solutions. These solutions allow for efficient p...
Research
Full-text available
In the ever-evolving landscape of cybersecurity, implementing robust defense strategies is crucial to safeguarding digital assets from sophisticated threats. This paper explores the integration of evolutionary algorithms, cyber forensics, and AI-driven solutions to enhance cyber defense mechanisms. Evolutionary algorithms, inspired by natural selec...
Research
Full-text available
In the rapidly evolving landscape of cybersecurity, traditional defense mechanisms often fall short in addressing sophisticated and adaptive threats. To combat these challenges, a proactive approach that leverages artificial intelligence (AI) and evolutionary algorithms is emerging as a critical strategy. This paper explores the integration of AI-d...
Preprint
Full-text available
Russian cyberattacks on Ukraine largely failed to produce meaningful outcomes not merely due to robust Ukrainian cyber defenses but were instead primarily a result of Ukraine's effective cyber resilience.
Preprint
Full-text available
Growing apprehension among internet users regarding cyber-security threats, particularly Distributed Reflective Denial of Service (DRDoS) attacks, underscores a pressing issue. Despite considerable research endeavors, the efficacy of detecting DRDoS attacks remains unsatisfactory. This deficiency calls for the development of pioneering solutions to...
Article
Full-text available
Traditional cybersecurity techniques are having trouble in keeping up with the increasing sophistication of cyber threats. Artificial intelligence (AI) is revolutionizing security capabilities by facilitating real-time protective response, automated threat detection, and predictive analysis. Recent research is pioneering groundbreaking innovations...
Article
Full-text available
Research objective: This study evaluates the efficiency of cyber threat intelligence (CTI) for predicting and mitigating cyber threats, which is important in business today. Organisations endure cyber assaults and fight cyber crimes, which threaten commercial exposure. CTI is a proactive approach to these risks since it gives the finest methods and...
Article
Full-text available
Artificial Intelligence (AI) is being widely adopted in modern cyber defense to weave automation and scalability into the operational fabric of cybersecurity firms. Today, AI aids in crucial cyber defense tasks such as malware and intrusion detection to keep Information Technology (IT) infrastructure secure. Despite their value, cyber defense AI ag...
Preprint
Full-text available
The devastating health, societal, and economic impacts of the COVID-19 pandemic illuminate potential dangers of unpreparedness for catastrophic pandemic-scale cyber events. While the nature of these threats differs, the responses to COVID-19 illustrate valuable lessons that can guide preparation and response to cyber events. Drawing on the critical...
Article
Full-text available
Cybersecurity ecosystem is an important facet in protecting sensitive information and securing critical infrastructure for countering modern cyber threats. With the increasing complexity and frequency of security incidents, there is an escalating demand for development of innovative solutions beyond current human capabilities pertaining to cybersec...
Preprint
Full-text available
Cybersecurity ecosystem is an important facet in protecting sensitive information and securing critical infrastructure for countering modern cyber threats. With the increasing complexity and frequency of security incidents, there is an escalating demand for development of innovative solutions beyond current human capabilities pertaining to cybersec...
Article
Full-text available
Phishing is a growing form of cybercrime that poses a serious threat to information security in the digital world. This article aims to analyze the latest trends in phishing attacks and evaluate effective prevention methods. Using data from cybersecurity reports, case studies, and academic literature, this research identifies the latest phishing te...
Article
Full-text available
As the world of cybersecurity constantly changes, traditional cryptographic techniques have faced limitations against today's sophisticated and dynamic threats. Existing protections usually adopt static algorithms and key structure, making them difficult to resist the categories of modern attacks. This research paper, therefore, presents CryptoGenS...
Chapter
Full-text available
This chapter covers cyber threats to the nuclear enterprise and suggests ways that India and the United States can mitigate such dangers. Indian author Pulkit Mohan describes the Indian government’s evolving regulatory approach to the problem. Mohan argues for measures including the creation of an effective security culture, addressing supply-chain...
Research
Full-text available
This exhaustive report delves deep into the critical intersection between essential infrastructure and industrial control systems (ICS), painstakingly examining their vulnerabilities in an increasingly interconnected digital world. By meticulously analyzing the components and hierarchical structure of ICS, we shed light on their unique security cha...
Book
Full-text available
The continued success of cyber attacks motivates the need for continued innovation in cyber defense. In particular, there is a need for novel methods to mitigate attacker reconnaissance, usually the first stage in planning an attack. One of the few general approaches in this stage is using deception and information manipulation to affect what the a...
Article
Full-text available
Russian cyberattacks on Ukraine largely failed to produce meaningful outcomes not merely due to robust Ukrainian cyber defenses but also because of Ukraine’s effective cyber resilience.
Article
Full-text available
As financial institutions increasingly rely on AI for cybersecurity, they face complex regulatory landscapes requiring robust security measures to ensure transparency, accountability, and fairness. This research aims to develop a comprehensive AI-based cybersecurity model for the financial sector, enhancing the capacity to recognize, stop, and reac...
Article
Full-text available
Advancements in artificial intelligence, machine learning, and natural language processing have culminated in sophisticated technologies such as transformer models, generative AI models, and chatbots. Chatbots are sophisticated software applications created to simulate conversation with human users. Chatbots have surged in popularity owing to their...
Article
Full-text available
Today's escalating cyber attacks are outpacing standard network security defenses and, once inside, malware rapidly subverts individual hosts. Automatic post-breach protection of enterprise networks is a challenging and fundamental research problem that requires understanding and exploiting malware targeting strategies. In this work, we focus on th...
Article
Full-text available
This research focuses on the implementation of cyberspace cooperation between Indonesia and the United States in an effort to tackle cyber terrorism in Indonesia in the 2019-2023 period. The background of this research is based on the increasing cyber threats faced by Indonesia, including attacks on critical infrastructure and government data. This...
Article
Full-text available
A company’s cyber defenses are based on a secure infrastructure and risk-aware behavior by employees. With rising cyber threats and normative training efforts showing limited impact, raising cyber risk awareness is emerging as a challenging effort. The review of the extant literature on awareness diagnosis shows interdisciplinary but mainly theoret...
Preprint
Full-text available
Several types of cyber-attacks on automobiles and business firms keep on rising as we are preparing to counter cybercrimes with several new technologies and defense models. Cyber defense (also, counter intelligence) is a computer network defense mechanism that involves response to activities, critical infrastructure protection, and information assu...
Thesis
Full-text available
Modern power systems undergo a continuous digitalization for a more reliable, secure, and environmentally friendly operation. However, this advancement opens a door to a wide range of digital threats, making electrical grids vulnerable to cyberattacks. These malicious activities mainly affect the monitoring and control systems of smart power infras...
Article
Full-text available
Iran's convoluted geopolitical status, its centrality to locale-specific wars, plus the shifting balance of the global order make cyber security a key issue worldwide in addition to traditional security challenges. Iran is an appealing target for cyber enemies due to its numerous security vulnerabilities, which include ransomware infection, scams,...
Conference Paper
Full-text available
The Industrial Control Systems (ICS) that govern critical infrastructure are increasingly targeted by cyber threats, particularly through communication protocols such as IEC 60870-5-104 (IEC104). This research paper focuses on enhancing the cybersecurity of ICS utilizing the IEC104 protocol, which is pivotal in Europe's critical infrastructure. Thr...
Preprint
Full-text available
The CAGE-2 challenge is considered a standard benchmark to compare methods for autonomous cyber defense. Current state-of-the-art methods evaluated against this benchmark are based on model-free (offline) reinforcement learning, which does not provide provably optimal defender strategies. We address this limitation and present a formal (causal) mod...
Article
Full-text available
As artificial intelligence (AI) rapidly infiltrates the realm of cybersecurity, its geopolitical implications have become a critical concern for nations and global security. This research presents a comprehensive analysis of the geopolitical implications of artificial intelligence in cybersecurity by drawing on an extensive review of scholarly lite...
Article
Full-text available
In today's digital age, cybersecurity has emerged as a crucial component for safeguarding business information infrastructure from evolving threats. This article delves into comprehensive methods and strategies tailored for business environments to protect critical digital assets. It highlights the role of advanced technologies such as artificial i...
Article
Full-text available
Japan has long been one of the most active global players in defending the free and open internet and the argument that international law applies in cyberspace. Its traditional preference for defensive defense policy and its position as a defender of the liberal world order have long determined Japan’s cyber diplomacy and the way it dealt with cybe...
Article
Full-text available
This comprehensive article examines the profound and multifaceted influence of cutting-edge artificial intelligence (AI) technologies on the rapidly evolving cybersecurity landscape. Focusing on Large Language Models (LLMs), Reinforcement Learning (RL), Graph Neural Networks (GNNs), Diffusion Models, and Multimodal Systems, we provide an in-depth a...
Conference Paper
Full-text available
Malicious URLs, posing threats such as phishing and malware, cause significant financial losses globally. Detecting these URLs automatically before users access them is essential for cybersecurity. This study explores various machine learning techniques to accurately identify malicious URLs. Decision trees, random forests, K-nearest neighbors (KNN)...
Article
Full-text available
The development of the Internet of Things and the associated devices has made it necessary to establish and implement encryption standards to ensure secure data transmission. These standards need to be comply with fundamental encryption principles and cater to devices with limited computational resources. As a result, lightweight cryptography has e...
Article
Full-text available
This paper examines the growing cyber threats facing the United States' vital infrastructure, particularly those posed by state-sponsored threat actors. It discusses the significant risks these threats pose to economic stability and national security. Ithighlights the difficulties in protecting U.S. critical infrastructures from the constantly adva...
Article
Full-text available
The practice of cyber intelligence is a comprehensive data collection process aimed at identifying, identifying, classifying, and strategizing any threats or risks to information assets. This article aims to describe and explain the current relevance of cyber-intelligence practice in preventing cyber-threats, the methods and techniques of conductin...
Article
Full-text available
Identifying the source of cyber-attacks is crucial to ensuring cybersecurity. This study examines different attribution techniques, obstacles, and real-world examples in the context of cyber warfare. It explores challenges such as incorrect attributions, ethical concerns, legal barriers, and complexities in the digital environment. The discussed to...
Article
Full-text available
Defensive Cyber Operations (DCO) in complex environments, such as cyber wargames, require in-depth cybersecurity knowledge and the ability to make quick decisions. In a typical DCO, execution rarely follows a pre-planned path because of extensive adversary influence, challenging an already complex decision-making environment. Decision-making models...
Method
Full-text available
The global energy sector faces escalating threats from cyber-attacks targeting critical infrastructure, necessitating robust resilience strategies to safeguard against potential disruptions. This research explores the diverse landscape of cyber threats confronting energy grids, encompassing various attack types such as ransomware, phishing, and adv...
Article
Full-text available
За останні роки спецслужби росії продемонстрували, що спроможні подолати заходи безпеки навіть добре захищених компаній і урядових мереж по всьому світу, зокрема систему безпеки військової бази США на острові Гуам. За оцінками Служби безпеки України нині росія здійснює близько 10 кібератак на Україну щоденно. Тому підготовка фахівців із кібернетичн...
Conference Paper
Full-text available
Cyber deception is a highly recommended technique in cyber defense and is being used more and more by cyber security experts to provide a more optimal network security defense. We propose a deception model adapted to cyber attacks on automotive systems that will not only thwart cyber attacks but also deceive the attacker who initiates the attack so...
Article
Full-text available
This study presents a concise review for exploring the burgeoning intersection of Deep Reinforcement Learning (DRL) and cybersecurity, delving into its basics, applications, and open challenges. In particular, DRL is introduced as a dynamic approach to cybersecurity, permitting adaptive threat detection, intrusion prevention, and occurrence respons...
Poster
Full-text available
"Emerging Trends in Information System Security Using AI & Data Science for Next-Generation Cyber Analytics" is a comprehensive exploration into the intersection of cutting-edge technologies and the critical domain of cybersecurity, this book delves deep into the evolving landscape of cyber threats and the imperative for innovative solutions. From...
Article
Full-text available
The banking industry is greatly threatened by cybercrime, which makes it necessary to do a thorough investigation to comprehend its effects and forthcoming developments for cybersecurity. Research highlights the constant evolution of cyber risks and the disastrous effects of cyberattacks on Indian banking systems. The study explores the rise in cyb...
Article
Full-text available
Technological advancements since the early 1990s have increased the interconnectedness of global economies, concurrently escalating the risk of cyber fraud, particularly in the financial sector. The study examined the prevalence and economic impact of cyber fraud within Canada’s financial sector, particularly in the post-COVID-19 landscape, which...
Article
Full-text available
The last decade has shown the global society, especially South American society, the great challenges that democracies will face in the 21st century. Among the various threats observed in cyberspace are the so-called disinformation campaigns and hybrid interference. As a result, this new digital means of information socialization has caused serious...
Conference Paper
Full-text available
The Industrial Control Systems (ICS) that govern critical infrastructure are increasingly targeted by cyber threats, particularly through communication protocols such as IEC 60870-5-104 (IEC104). This research paper focuses on enhancing the cybersecurity of ICS utilizing the IEC104 protocol, which is pivotal in Europe's critical infrastructure. Thr...
Article
Full-text available
In the constantly expanding field of cybersecurity, Artificial Intelligence (AI), and more specifically Generative Artificial Intelligence (GenAI) impacts every aspect of the cybersecurity landscape. In today’s world, most manual transactions, interactions, and records have become digital, generating vast amounts of valuable data. Many devices are...
Preprint
Full-text available
The rise of new complex attacks scenarios in Internet of things (IoT) environments necessitate more advanced and intelligent cyber defense techniques such as various Intrusion Detection Systems (IDSs) which are responsible for detecting and mitigating malicious activities in IoT networks without human intervention. To address this issue, deep reinf...
Conference Paper
Full-text available
The Internet of Things (IoT) paradigm refers to a system of billions of Internet-enabled smart devices interconnected with each other. This study attempts to evaluate access control restrictions in smart devices through a penetration test of a lightweight IoT device such as a smartbulb. Very often, lightweight firmware for such devices become the f...
Conference Paper
Full-text available
Although virtual reality (VR) is not a new technology, it has recently been used in various fields other than entertainment, and this has caused the information security research community to pay attention to the new cyber threats associated with it. The diversity of system components enables a wide range of cyber attacks that can be exploited by h...
Article
Full-text available
Cyber threats continue to evolve in complexity, thereby traditional cyber threat intelligence (CTI) methods struggle to keep pace. AI offers a potential solution, automating and enhancing various tasks, from data ingestion to resilience verification. This paper explores the potential of integrating artificial intelligence (AI) into CTI. We provide...
Technical Report
Full-text available
The complicated nature of supply chain systems has heightened cyber security challenges for critical natural infrastructure (CNI). This is because supply chain processes expose critical infrastructure to third party vendors whose activities and exposure to cyber security threats cannot be completely controlled. Machine learning (ML) which is a rece...
Chapter
Full-text available
To protect the vast amounts of data being stored on computers and transported over networks, cybersecurity is crucial. To prevent increasingly complex assaults in the future, methods for identifying threats must be regularly updated. Experts in security are using GAN to accomplish results in password cracking, anomaly generation, and intrusion dete...
Chapter
Full-text available
This chapter introduces ML-Defend, a novel defense mechanism tailored for detecting and mitigating cyber-attacks in wireless sensor networks (WSNs). By combining support vector machines (SVMs) for anomaly detection and convolutional neural networks (CNNs) for classification, ML-Defend harnesses the complementary strengths of these algorithms. This...
Article
Full-text available
The authors note that the digitization of public services has taken place, which has led to the transition of most or at least a significant number of public services to an electronic format and allowed us to talk about the emergence of concepts of electronic state (government) (e-government). The step-by-step transformation of state data managemen...