MDPI eBooks,
Journal Year:
2023,
Volume and Issue:
unknown
Published: July 21, 2023
compare
different
ensemble
learning
methods
that
have
been
proposed
in
this
context:
Random
Forests,
XGBoost,
CatBoost,
GBM,
and
LightGBM.Experiments
were
performed
on
datasets,
finding
tree-based
algorithms
can
achieve
good
performance
with
limited
variability.
Access
Control
[7,8]As
stated
above,
access
control
be
viewed
as
another
point
the
anomaly
detection
continuum.Again,
distinguishing
a
legitimate
user
from
impostors
automated
through
machine
learning.The
seventh
paper
[7]
addresses
context
of
face
recognition
systems
(FRSs)
proposes
practical
white
box
adversarial
attack
algorithm.The
method
is
evaluated
CASIA
WebFace
LFW
datasets.In
[8],
authors
used
user's
iris
image,
combined
secret
key,
to
generate
public
key
subsequently
use
such
data
limit
protected
resources.
Threat
Intelligence
[9,10]Not
only
do
we
want
recognize
block
attacks
they
occur-we
also
need
observe
external
overall
network
predict
relevant
events
new
patterns,
addressing
so-called
threat
intelligence
landscape.In
[9],
two
well-known
databases
(CVE
MITRE)
technique
link
correlate
these
sources.The
tenth
[10]
formal
ontologies
monitor
threats
identify
corresponding
risks
an
way.
ConclusionsIn
conclusion,
observed
AI
increasingly
being
cybersecurity,
three
main
directions
current
research:
(1)
areas
cybersecurity
are
addressed,
CPS
security
intelligence;
(2)
more
stable
consistent
results
presented,
sometimes
surprising
accuracy
effectiveness;
(3)
presence
AI-aware
adversary
recognized
analyzed,
producing
robust
reliable
solutions.
Journal of Cybersecurity and Privacy,
Journal Year:
2023,
Volume and Issue:
3(4), P. 662 - 705
Published: Sept. 27, 2023
Smart
grids
have
emerged
as
a
transformative
technology
in
the
power
sector,
enabling
efficient
energy
management.
However,
increased
reliance
on
digital
technologies
also
exposes
smart
to
various
cybersecurity
threats
and
attacks.
This
article
provides
comprehensive
exploration
of
cyberattacks
grids,
focusing
critical
components
applications.
It
examines
cyberattack
types
their
implications
backed
by
real-world
case
studies
quantitative
models.
To
select
optimal
options,
study
proposes
multi-criteria
decision-making
(MCDM)
approach
using
analytical
hierarchy
process
(AHP).
Additionally,
integration
artificial
intelligence
(AI)
techniques
smart-grid
security
is
examined,
highlighting
potential
benefits
challenges.
Overall,
findings
suggest
that
“security
effectiveness”
holds
highest
importance,
followed
“cost-effectiveness”,
“scalability”,
“Integration
compatibility”,
while
other
criteria
(i.e.,
“performance
impact”,
“manageability
usability”,
“compliance
regulatory
requirements”,
“resilience
redundancy”,
“vendor
support
collaboration”,
“future
readiness”)
contribute
evaluation
but
relatively
lower
weights.
Alternatives
such
“access
control
authentication”
information
event
management”
with
high
weighted
sums
are
crucial
for
enhancing
alternatives
requirements”
“encryption”
still
provide
value
respective
criteria.
We
find
“deep
learning”
emerges
most
effective
AI
technique
“hybrid
approaches”,
“Bayesian
networks”,
“swarm
intelligence”,
“machine
learning”,
“fuzzy
logic”,
“natural
language
processing”,
“expert
systems”,
“genetic
algorithms”
exhibit
effectiveness
addressing
cybersecurity.
The
discusses
drawbacks
MCDM-AHP,
enhancements
its
use
cybersecurity,
suggests
exploring
alternative
MCDM
evaluating
options
grids.
aids
decision-makers
field
make
informed
choices
optimize
resource
allocation.
Energies,
Journal Year:
2024,
Volume and Issue:
17(8), P. 1965 - 1965
Published: April 20, 2024
In
the
Industry
4.0
era
of
smart
grids,
real-world
problem
blackouts
and
cascading
failures
due
to
cyberattacks
is
a
significant
concern
highly
challenging
because
existing
Intrusion
Detection
System
(IDS)
falls
behind
in
handling
missing
rates,
response
times,
detection
accuracy.
Addressing
this
with
an
early
attack
mechanism
reduced
rate
decreased
time
critical.
The
development
Intelligent
IDS
vital
mission-critical
infrastructure
grid
prevent
physical
sabotage
processing
downtime.
This
paper
aims
develop
robust
Anomaly-based
using
statistical
approach
machine
learning
classifier
discriminate
from
natural
faults
man-made
events
avoid
failures.
novel
(SAML)
based
on
Neighborhood
Component
Analysis,
ExtraTrees,
AdaBoost
for
feature
extraction,
bagging,
boosting,
respectively,
proposed
optimal
hyperparameter
tuning
discrimination
events.
model
tested
publicly
available
Industrial
Control
Systems
Cyber
Attack
Power
(Triple
Class)
dataset
three-bus/two-line
transmission
system
Mississippi
State
University
Oak
Ridge
National
Laboratory.
Furthermore,
evaluated
scalability
generalization
accessible
IEEE
14-bus
57-bus
datasets
False
Data
Injection
(FDI)
attacks.
test
results
achieved
higher
accuracy,
lower
false
alarm
compared
approaches.
Grid
systems
established
integrated
networks
in
every
hierarchical
level
of
power
system
for
extensive
smart
automation.
To
ensure
the
availability
and
reliability
SmartGrid
system,
fortification
against
cyber
threats
is
crucial.
Amidst
other
anomalies,
Denial
Service
(DoS)
disrupts
normal
network
operations
by
overwhelming
with
excessive
unauthorized
traffic.
assure
cybersecurity
undisrupted
services,
this
article
focuses
on
IEC
60
870-5-104
protocol
concerning
12
classes
DoS
attack
command
detection.
This
anomaly
detection
mechanism
utilizes
a
scrupulously
indexed
60870-5-104
intrusion
dataset
through
panoramic
preprocessing
subsequently
introduces
feature
engineering
dimension
reduction
Principal
Component
Analysis
(PCA).
Succeeding
training
ML
models
achieved
raised
definitive
accuracy
98.709%.
The
introduction
SHAP
analysis
presents
unambiguous
informative
insight
into
model's
decision-making
most
significant
features.
study
establishes
groundwork
crafting
robust
security
protocols
that
integrity
operational
stability
face
constantly
evolving
threats.
Electronics,
Journal Year:
2024,
Volume and Issue:
13(21), P. 4275 - 4275
Published: Oct. 31, 2024
This
review
paper
focuses
on
the
application
of
neural
networks
in
semiconductor
packaging,
particularly
examining
how
Back
Propagation
Neural
Network
(BPNN)
model
predicts
work-in-process
(WIP)
arrival
rates
at
various
stages
packaging
processes.
Our
study
demonstrates
that
BPNN
models
effectively
forecast
WIP
quantities
each
processing
step,
aiding
production
planners
optimizing
machine
allocation
and
thus
reducing
product
manufacturing
cycles.
further
explores
potential
applications
enhancing
efficiency,
forecasting
capabilities,
process
optimization
within
industry.
We
discuss
integration
real-time
data
from
systems
with
network
to
enable
more
accurate
dynamic
planning.
Looking
ahead,
this
outlines
prospective
advancements
for
emphasizing
their
role
addressing
challenges
rapidly
changing
market
demands
technological
innovations.
not
only
underscores
practical
implementations
but
also
highlights
future
directions
leveraging
these
technologies
maintain
competitiveness
fast-evolving
Algorithms,
Journal Year:
2024,
Volume and Issue:
17(12), P. 550 - 550
Published: Dec. 3, 2024
The
deployment
of
intrusion
detection
systems
(IDSs)
is
essential
for
protecting
network
resources
and
infrastructure
against
malicious
threats.
Despite
the
wide
use
various
machine
learning
methods
in
IDSs,
such
often
struggle
to
achieve
optimal
performance.
key
challenges
include
curse
dimensionality,
which
significantly
impacts
IDS
efficacy,
limited
effectiveness
singular
classifiers
handling
complex,
imbalanced,
multi-categorical
traffic
datasets.
To
overcome
these
limitations,
this
paper
presents
an
innovative
approach
that
integrates
dimensionality
reduction
stacking
ensemble
techniques.
We
employ
LogitBoost
algorithm
with
XGBRegressor
feature
selection,
complemented
by
a
Residual
Network
(ResNet)
deep
model
extraction.
Furthermore,
we
introduce
multi-stacking
(MSE),
novel
method,
enhance
attack
prediction
capabilities.
evaluation
on
benchmark
datasets
as
CICIDS2017
UNSW-NB15
demonstrates
our
surpasses
current
models
across
performance
metrics.