2020
DOI: 10.1002/ett.3947
|View full text |Cite
|
Sign up to set email alerts
|

Core‐level cybersecurity assurance using cloud‐based adaptive machine learning techniques for manufacturing industry

Abstract: Cybersecurity is the domain that ensures safeness in both individual system and overall network systems. The classification and learning approaches used in different machine learning (ML) techniques improve the protection of the cyber systems against various attacks. Techniques such as support vector machine (SVM), neural networks (NN), principle component analysis (PCA), and reinforcement learning (RL) are used against various cyber threats. Applying these techniques at the front-end services (either online o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…As such, it is crucial to define and develop some confidence metrics for security assurance level and the selection and aggregation technique for these security metrics. As pointed out in [250], operating system core can be considered instead of the application level service in order to increase the speed and effectiveness of attack detection [251]- [256]. This is because the operating system's core contains every internal attribute and the file system.…”
Section: Research Gaps and Recommendationsmentioning
confidence: 99%
“…As such, it is crucial to define and develop some confidence metrics for security assurance level and the selection and aggregation technique for these security metrics. As pointed out in [250], operating system core can be considered instead of the application level service in order to increase the speed and effectiveness of attack detection [251]- [256]. This is because the operating system's core contains every internal attribute and the file system.…”
Section: Research Gaps and Recommendationsmentioning
confidence: 99%
“…The dataset used was from the Cardiff University Research Portal. In another research work [80], anomalous services running into the computer systems, both offline and online, were iden-tified using a neural network-based model (NARX-RNN), AI-based multi-perspective SVM, principal component analysis (PCA) and hierarchical process tree-based reinforcement learning techniques.…”
Section: Stages Of a Cyber-attackmentioning
confidence: 99%
“…Li et al [28] combined distributed streaming processing mechanism and ensemble prediction algorithm to monitor the abnormal network traffic of a cyberphysical power system. Sakthivel et al [29] employed a Recursive Neural Network (RNN) algorithm to monitor and prevent the cyber system from cyberattacks in a manufacturing company. Garrido et al [30] adopted a graph learning algorithm to detect intrusion, score anomalous activities and monitor security in industrial automation systems.…”
Section: Machine Learning In Risk Managementmentioning
confidence: 99%