2023
DOI: 10.1109/jsyst.2023.3286375
|View full text |Cite
|
Sign up to set email alerts
|

A Generalizable Deep Neural Network Method for Detecting Attacks in Industrial Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…Compute the cost of monitoring nodes and select monitoring nodes by selecting monitoring nodes algorithm for stealing complex network attacks [ 15 ]. In the stealing complex network, the network topology connection is firstly analyzed, which is the carrier of the monitoring node of network attack, namely: …”
Section: Stealing Complex Network Attack Monitoring Considering Secur...mentioning
confidence: 99%
“…Compute the cost of monitoring nodes and select monitoring nodes by selecting monitoring nodes algorithm for stealing complex network attacks [ 15 ]. In the stealing complex network, the network topology connection is firstly analyzed, which is the carrier of the monitoring node of network attack, namely: …”
Section: Stealing Complex Network Attack Monitoring Considering Secur...mentioning
confidence: 99%
“…The various challenges and limitations of large language models are shown in the figure 3. Bias and Ethical Concerns: One of the most prominent issues associated with LLMs is the danger of replicating and amplifying biases present in their training data [38], [39]. Since these models are often trained on data from the internet, which can include text that is sexist, racist, or otherwise offensive, there is a significant risk of these models generating biased or harmful content.…”
Section: Challenges and Limitationsmentioning
confidence: 99%
“…Federated learning has been used for network data security [4,30], healthcare data security [31], game theory [32], vehicular data [33,34], and smart city applications [35]. Studies have found that data poisoning attacks and other cyberattacks can also compromise this technique [36][37][38][39]. Furthermore, traditional machine learning approaches have a limited processing complexity and need help discovering complicated non-linear relationships in large datasets.…”
Section: Introductionmentioning
confidence: 99%