A Hybrid Security Methodology for Real-Time Constraint Cyber-physical Systems DOI

R Katoch,

Yashwant Singh, Zakir Ahmad Sheikh

и другие.

Lecture notes in electrical engineering, Год журнала: 2024, Номер unknown, С. 217 - 231

Опубликована: Янв. 1, 2024

Язык: Английский

Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks DOI Creative Commons

P. Mamatha,

S. Balaji,

S. Sai Anuraghav

и другие.

International Journal of Computational Intelligence Systems, Год журнала: 2025, Номер 18(1)

Опубликована: Фев. 5, 2025

Язык: Английский

Процитировано

0

Metaparameter optimized hybrid deep learning model for next generation cybersecurity in software defined networking environment DOI Creative Commons

C. B. Senthil Kumar,

Suresh Betam,

Denis A. Pustokhin

и другие.

Scientific Reports, Год журнала: 2025, Номер 15(1)

Опубликована: Апрель 23, 2025

Язык: Английский

Процитировано

0

A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks DOI
Ankit Sharma, Kriti Bhushan

Cluster Computing, Год журнала: 2024, Номер 27(10), С. 13809 - 13834

Опубликована: Июль 5, 2024

Язык: Английский

Процитировано

3

Symmetric Keys for Lightweight Encryption Algorithms Using a Pre–Trained VGG16 Model DOI Creative Commons

Ala’a Talib Khudhair,

Abeer Tariq Maolood, Ekhlas Khalaf Gbashi

и другие.

Telecom, Год журнала: 2024, Номер 5(3), С. 892 - 906

Опубликована: Сен. 3, 2024

The main challenge within lightweight cryptographic symmetric key systems is striking a delicate balance between security and efficiency. Consequently, the issue revolves around crafting schemes that are both robust enough to safeguard resource-constrained environments. This paper presents new method of making long keys for algorithms. A pre–trained convolutional neural network (CNN) model called visual geometry group 16 (VGG16) used take features from two images, turn them into binary strings, make strings equal by cutting down length shorter string, then use XOR images. depends on number in Compared other algorithms, we found this greatly decreases time required generate improves defense against brute force attacks creating exceptionally keys. successfully passed all 15 tests when evaluated using NIST SP 800-22 statistical test suite Basic Five Statistical Tests. To best our knowledge, first research explore generation encryption VGG16 model.

Язык: Английский

Процитировано

1

A Hybrid Security Methodology for Real-Time Constraint Cyber-physical Systems DOI

R Katoch,

Yashwant Singh, Zakir Ahmad Sheikh

и другие.

Lecture notes in electrical engineering, Год журнала: 2024, Номер unknown, С. 217 - 231

Опубликована: Янв. 1, 2024

Язык: Английский

Процитировано

0