Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Alireza Dehlaghi-Ghadim"'
Publikováno v:
IEEE Access, Vol 11, Pp 107982-107996 (2023)
Over the past few decades, Industrial Control Systems (ICS) have been targeted by cyberattacks and are becoming increasingly vulnerable as more ICSs are connected to the internet. Using Machine Learning (ML) for Intrusion Detection Systems (IDS) is a
Externí odkaz:
https://doaj.org/article/d98b9850d85640c3ba570b9007389a86
Autor:
Per Erik Strandberg, David Söderman, Alireza Dehlaghi-Ghadim, Miguel Leon, Tijana Markovic, Sasikumar Punnekkat, Mahshid Helali Moghadam, David Buffoni
Publikováno v:
Data in Brief, Vol 50, Iss , Pp 109512- (2023)
There is a growing body of knowledge on network intrusion detection, and several open data sets with network traffic and cyber-security threats have been released in the past decades. However, many data sets have aged, were not collected in a contemp
Externí odkaz:
https://doaj.org/article/87e9b57be52644499b2b7e2711e93fde
Publikováno v:
Computers in Industry. 148:103906
Autor:
Seba Anna Varghese, Alireza Dehlaghi Ghadim, Ali Balador, Zahra Alimadadi, Panos Papadimitratos
Digital twins have recently gained significant interest in simulation, optimization, and predictive maintenance of Industrial Control Systems (ICS). Recent studies discuss the possibility of using digital twins for intrusion detection in industrial s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d53b8a2c38d85737c1439aff25329b25
http://arxiv.org/abs/2207.09999
http://arxiv.org/abs/2207.09999
Publikováno v:
COMPUTING AND INFORMATICS; Vol 37, No 4 (2018): Computing and Informatics; 838-864
Cost optimization for workflow scheduling while meeting deadline is one of the fundamental problems in utility computing. In this paper, a two-phase cost-efficient scheduling algorithm called critical chain is presented. The proposed algorithm uses t
Autor:
Abbaspour Asadollah, Sara, Imtiaz, Shamoona, Dehlaghi-Ghadim, Alireza, Sjödin, Mikael, Sirjani, Marjan
Publikováno v:
Journal of Cybersecurity & Privacy; Dec2024, Vol. 4 Issue 4, p823-852, 30p