Special Issue “AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection”
1. Introduction
2. Cyber Physical Systems (CPSs) [1,2,3]
3. Intrusion Detection [4,5]
4. Malware Analysis [6]
5. Access Control [7,8]
6. Threat Intelligence [9,10]
7. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Tushkanova, O.; Levshun, D.; Branitskiy, A.; Fedorchenko, E.; Novikova, E.; Kotenko, I. Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation. Algorithms 2023, 16, 85. [Google Scholar] [CrossRef]
- Lysenko, S.; Bobrovnikova, K.; Kharchenko, V.; Savenko, O. IoT Multi-Vector Cyberattack Detection Based on Machine Learning Algorithms: Traffic Features Analysis, Experiments, and Efficiency. Algorithms 2022, 15, 239. [Google Scholar] [CrossRef]
- Li, X.J.; Ma, M.; Sun, Y. An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers for Intrusion Detection in Smart Grids. Algorithms 2023, 16, 288. [Google Scholar] [CrossRef]
- Almalki, S.A.; Abdel-Rahim, A.; Sheldon, F.T. Adaptive IDS for Cooperative Intelligent Transportation Systems Using Deep Belief Networks. Algorithms 2022, 15, 251. [Google Scholar] [CrossRef]
- Mijalkovic, J.; Spognardi, A. Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems. Algorithms 2022, 15, 258. [Google Scholar] [CrossRef]
- Louk, M.H.L.; Tama, B.A. Tree-Based Classifier Ensembles for PE Malware Analysis: A Performance Revisit. Algorithms 2022, 15, 332. [Google Scholar] [CrossRef]
- Lang, D.; Chen, D.; Huang, J.; Li, S. A Momentum-Based Local Face Adversarial Example Generation Algorithm. Algorithms 2022, 15, 465. [Google Scholar] [CrossRef]
- Matveev, I.; Safonov, I. From Iris Image to Embedded Code: System of Methods. Algorithms 2023, 16, 87. [Google Scholar] [CrossRef]
- Grigorescu, O.; Nica, A.; Dascalu, M.; Rughinis, R. CVE2ATT&CK: BERT-Based Mapping of CVEs to MITRE ATT&CK Techniques. Algorithms 2022, 15, 314. [Google Scholar]
- Shaked, A.; Margalit, O. Sustainable Risk Identification Using Formal Ontologies. Algorithms 2022, 15, 316. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bergadano, F.; Giacinto, G. Special Issue “AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection”. Algorithms 2023, 16, 327. https://doi.org/10.3390/a16070327
Bergadano F, Giacinto G. Special Issue “AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection”. Algorithms. 2023; 16(7):327. https://doi.org/10.3390/a16070327
Chicago/Turabian StyleBergadano, Francesco, and Giorgio Giacinto. 2023. "Special Issue “AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection”" Algorithms 16, no. 7: 327. https://doi.org/10.3390/a16070327
APA StyleBergadano, F., & Giacinto, G. (2023). Special Issue “AI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection”. Algorithms, 16(7), 327. https://doi.org/10.3390/a16070327