2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2020
DOI: 10.1109/dessert50317.2020.9125016
|View full text |Cite
|
Sign up to set email alerts
|

A Cyberattacks Detection Technique Based on Evolutionary Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 28 publications
0
8
0
1
Order By: Relevance
“…In order to evaluate the efficiency of the proposed approach the experiments were held. They were based on the usage of the BotGRABBER -cyberattacks' detection toolwas used [34][35][36][37][38].…”
Section: Methodsmentioning
confidence: 99%
“…In order to evaluate the efficiency of the proposed approach the experiments were held. They were based on the usage of the BotGRABBER -cyberattacks' detection toolwas used [34][35][36][37][38].…”
Section: Methodsmentioning
confidence: 99%
“…Solutions devoted to cyberattack detection against Internet of Things infrastructure are widely presented [7,8]. Quite possibly, the most encouraging approaches for IoT cyberattack detection are based on machine learning algorithms (MLA) [9][10][11][12][13].…”
Section: The State-of-the-artmentioning
confidence: 99%
“…Several studies focused on using prediction models for attack detections in smart grid infrastructures. For example, the authors of [123] proposed a detection method that uses cosine similarity and chisquare detector to identify FDIA in networks. They also employed Kalman filter to find expected measurements and calculate any deviation between actual measurements and estimated values.…”
Section: Prediction Modelsmentioning
confidence: 99%
“…Another technique is elliptic curve cryptosystems. The authors of [92] introduce elliptic curve cryptosystems as a public-key cryptography with the same power as RSA, despite its key size smaller than RSA [123].…”
Section: ) Cryptographic and Authenticationmentioning
confidence: 99%