2021
DOI: 10.1016/j.future.2021.02.001
|View full text |Cite
|
Sign up to set email alerts
|

A hypergraph based Kohonen map for detecting intrusions over cyber–physical systems traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…The SOFM network used is part of an ANN group called networks based on competitive learning models in which the output neurons of the grid compete with each other to be activated, and are mainly used to visualize clusters. 40 According to Link et al, 24 once the network has been initialized, there are three essential processes involved in its formation: competition, cooperation, and synaptic adaptation. The basic principle of the SOFM map is that it represents high-dimensional input vectors in a lowerdimensional 2D topology in an unsupervised way.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The SOFM network used is part of an ANN group called networks based on competitive learning models in which the output neurons of the grid compete with each other to be activated, and are mainly used to visualize clusters. 40 According to Link et al, 24 once the network has been initialized, there are three essential processes involved in its formation: competition, cooperation, and synaptic adaptation. The basic principle of the SOFM map is that it represents high-dimensional input vectors in a lowerdimensional 2D topology in an unsupervised way.…”
Section: Resultsmentioning
confidence: 99%
“…Network neurons calculate their respective Euclidean distance values, and these values provide the basis for competition between them. 24,40,41 The neuron with the shortest Euclidean distance is declared the winner, that is, the one that best meets the stimulus provided by the input vector. 42 In a cluster-type neural network, neurons are connected by directed and weighted edges.…”
Section: Resultsmentioning
confidence: 99%
“…Detection of current threats, data anomalies and malware (Cascavilla et al, 2021), (Sadik et al, 2020), (Lee and Lim, 2016), (Gonzalez-Granadillo et al, 2018), (Catak et al, 2021), (Jagtap et al, 2021), (Ma et al, 2021).…”
Section: Resultsmentioning
confidence: 99%
“…Nowadays, legislative fit and data security is also an issue of the analysis of cyber security. In the times of Internet of Things, when all machines are connected between themselves using the Internet [134][135][136][137][138], cyber security is a very important issue for the continued assurance of the development of production processes.…”
Section: Discussionmentioning
confidence: 99%