5,015 Hits in 9.2 sec

Intersection Management, Cybersecurity, and Local Government: ITS Applications, Critical Issues, and Regulatory Schemes [chapter]

Yunfei Hou, Kimberly Collins, Montgomery Van Wart
2022 Smart Mobility - Recent Advances, New Perspectives and Applications [Working Title]  
This article focuses on the cybersecurity issues of intersection management—an element of transportation management systems—for local governments.  ...  Until relatively recently, concerns about and research needs for intersection cybersecurity have been largely ignored, and local governments have focused on other types of cyber threats, relying instead  ...  A state-funded initiative in Florida at the National Center for Transit Research is called Enhancing Cybersecurity in Public Transportation [14] .  ... 
doi:10.5772/intechopen.101815 fatcat:bktnbjyd7vgttnkcg4ygwv2dvi

Emerging Trends of Recently Published Datasets for Intrusion Detection Systems (IDS): A Survey [article]

Rishabh Jindal, Adnan Anwar
2021 arXiv   pre-print
Furthermore, a taxonomy based on the discussed datasets has been developed that can be used to inform the dataset selection process for future research endeavours.  ...  In doing so, the discussion emphasizes the need for the publication of even more modern datasets, especially for emerging technologies such as the Internet of Things (IoT) and smartphone devices, to ensure  ...  By simulating these devices, the researchers were able to create over 72 million records of IoT traffic data that is representative of the kind of traffic that can be observed on modern networks.  ... 
arXiv:2110.00773v1 fatcat:wsuaxigofvbphmmvai4k4235tm

The Role of Machine Learning in Cybersecurity [article]

Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco
2022 arXiv   pre-print
Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML.  ...  However, deployment of ML in cybersecurity is still at an early stage, revealing a significant discrepancy between research and practice.  ...  This case study focuses on the well-known ICN approach of Named Data Networking (NDN) [181] .  ... 
arXiv:2206.09707v1 fatcat:27evezomkze6bbuxsdfsi7zv44

Toward a Culture of Cybersecurity Research

Aaron J. Burstein
2008 Social Science Research Network  
Progress in cybersecurity research, however, is beset by a lack of access data from communications networks.  ...  A modest research exception to federal communications privacy law would remove many of the legal barriers to sharing data with cybersecurity researchers.  ...  network data a critical priority. 81 In other words, cybersecurity research faces a "data dearth," with network data being the most scarce. 82 Institutions for collecting network data for research purposes  ... 
doi:10.2139/ssrn.1113014 fatcat:mmza4omw65c7lgcbqsigtzu3km

Cybersecurity data science: an overview from machine learning perspective

Iqbal H. Sarker, A. S. M. Kayes, Shahriar Badsha, Hamed Alqahtani, Paul Watters, Alex Ng
2020 Journal of Big Data  
It's estimated that, a data breach costs 8.19 million USD for the United States and 3.9 million USD on an average [8], and the annual Abstract In a computing context, cybersecurity is undergoing massive  ...  Furthermore, we provide a machine learning based multi-layered framework for the purpose of cybersecurity modeling.  ...  Acknowledgements The authors would like to thank all the reviewers for their rigorous review and comments in several revision rounds.  ... 
doi:10.1186/s40537-020-00318-5 fatcat:i5qjz55m7fcudoxhstzlj3akzu

Evaluation of cybersecurity data set characteristics for their applicability to neural networks algorithms detecting cybersecurity anomalies

Xavier A. Larriva-Novo, Mario Vega-Barbas, Victor A. Villagra, Mario Sanz
2020 IEEE Access  
Finally, the results are used to determine which group of data from a cybersecurity data set are more relevant and representative for the intrusion detection, and the most suitable configuration of Machine  ...  To do this, a categorization for cybersecurity data sets that groups its records into several groups is first considered.  ...  For this reason, there are studies focused on categorizing patterns of a data set such as [29] , either focused on their study or the reduction of features in the case of multidimensional data sets.  ... 
doi:10.1109/access.2019.2963407 fatcat:p4edzjc6l5huhaxhlytdhhjfee

Assessing and mitigating cybersecurity risks of traffic light systems in smart cities

Zhiyi Li, Dong Jin, Christopher Hannon, Mohammad Shahidehpour, Jianhui Wang
2016 IET Cyber-Physical Systems  
This study aims to raise the public awareness of the cybersecurity issues in traffic light systems.  ...  The authors present a bi-level game-theoretic framework for assessing cybersecurity risks of traffic light systems, as the first step towards understanding and mitigating the security vulnerabilities.  ...  In particular, there are few studies on the cyber vulnerabilities and solutions of traffic light systems, as well as on the evaluation of the implications for the management of traffic networks if they  ... 
doi:10.1049/iet-cps.2016.0017 fatcat:2xlvyt6eevaknfpwgctk2cvr3q

Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review

Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat, Jayden F Connolly
2022 Journal of Cybersecurity and Privacy  
The detection of hidden trends and insights from network data and building of a corresponding data-driven machine learning model to prevent these attacks is vital to design intelligent security systems  ...  In this survey, the focus is on the machine learning techniques that have been implemented on cybersecurity data to make these systems secure.  ...  A filter layer was used to extract IRC data from the network data. Labeling was a challenge so the study utilized simulated data for the experiments.  ... 
doi:10.3390/jcp2030027 fatcat:3m3rxixzjjcwbhzk2od72xatta

Artificial Neural Network for Cybersecurity: A Comprehensive Review [article]

Prajoy Podder, Subrato Bharati, M. Rubaiyat Hossain Mondal, Pinto Kumar Paul, Utku Kose
2021 arXiv   pre-print
Cybersecurity is a very emerging field that protects systems, networks, and data from digital attacks.  ...  This paper provides a systematic review of the application of deep learning (DL) approaches for cybersecurity.  ...  Finally, this article discusses the use case scenarios of IoT in the context of COVID-19, and highlights the importance of cybersecurity for IoT devices.  ... 
arXiv:2107.01185v1 fatcat:eowuriahobdpnakopzupxsvpsy

Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity

Sherali Zeadally, Erwin Adi, Zubair Baig, Imran Khan
2020 IEEE Access  
We also discuss future research opportunities associated with the development of AI techniques in the cybersecurity field across a range of application domains.  ...  Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable comments and suggestions which helped us improve the content, quality, and presentation of this paper.  ... 
doi:10.1109/access.2020.2968045 fatcat:tb6xkdqqhfcahb5soip66x5qce

Autonomous Vehicles for Smart and Sustainable Cities: An In-Depth Exploration of Privacy and Cybersecurity Implications

Hazel Lim, Araz Taeihagh
2018 Energies  
This study analyses autonomous vehicles (AVs) as a potential transportation solution for smart and sustainable development.  ...  We then identify the aspects of privacy and cybersecurity in AVs that are important for smart and sustainable development.  ...  The authors plan to use single and comparative case studies in future to address this question appropriately and hope that this study encourages other researchers to study the implications of AVs for smart  ... 
doi:10.3390/en11051062 fatcat:qlha3tb7wrbb3fzspdd6fijjg4

A New Cybersecurity Approach for Protecting Cloud Services against DDoS Attacks

Hosam El-Sofany, King Khalid University
2020 International Journal of Intelligent Engineering and Systems  
The objectives of this paper are, to introduce a new cybersecurity approach for protecting cloud services against all types of DDoS attacks, to evaluate the performance and effectiveness of the proposed  ...  Distributed Denial of Service (DDoS) attacks are a malicious attempt to damage the normal traffic of the targeted cloud by flooding it with internet traffic.  ...  Acknowledgments The author extends his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through General Research Project under grant number (GRP-35-40  ... 
doi:10.22266/ijies2020.0430.20 fatcat:gcz563rm55ddvihsjycifpe3se

Cybercrimes: A Proposed Taxonomy and Challenges

Harmandeep Singh Brar, Gulshan Kumar
2018 Journal of Computer Networks and Communications  
Cybersecurity is one of the most important concepts of cyberworld which provides protection to the cyberspace from various types of cybercrimes.  ...  We conduct the survey of security of recent prominent researches and categorize the recent incidents in context to various fundamental principles of cybersecurity.  ...  Conflicts of Interest e authors declare that there are no conflicts of interest regarding the publication of this article.  ... 
doi:10.1155/2018/1798659 fatcat:5nhvha7bwzfbxojewiejz6pyba

Intelligent mobility: a review of the cybersecurity of IoT in smart cities

2020 Revista de tecnología e innovación  
Objectives - This research aims to explore the various challenges of cybersecurity in the Internet of Things in a Smart Mobility framework within Smart Cities by reviewing the academic literature.  ...  Methodology - Through the review and analysis of the academic literature available in different databases to generate an empirical study, the prospective knowledge on strategy and technology that concatenates  ...  Two pilot case studies were taken as a framework: data collection and collision detection, both on a heterogeneous network.  ... 
doi:10.35429/jti.2020. fatcat:crc5wdquybftrloygafm2quzz4

Cybersecurity Risk Assessment in Smart City Infrastructures

Maxim Kalinin, Vasiliy Krundyshev, Peter Zegzhda
2021 Machines  
In our work, we have proposed a new approach for cybersecurity risk management based on object typing, data mining, and quantitative risk assessment for the smart city infrastructure.  ...  The statistical risk evaluation methods force us to collect statistical data for the calculation of the security indicators for the self-organizing networks, and the accuracy of this method depends on  ...  Petersburg Polytechnic University-SCC "Polytechnichesky" ( accessed on 4 April 2021). Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/machines9040078 fatcat:seh4mhfa7jelbd4hhdtkc4s4re
« Previous Showing results 1 — 15 out of 5,015 results