This paper presents experiments using Artificial Intelligence (AI) algorithms for online monitoring of integrated computer systems, including System-on-Chip based embedded systems. This new framework introduces an AI-lead infrastructure that is intended to operate in parallel with conventional monitoring and diagnosis techniques. Specifically, an initial application is presented, where each of the system's software tasks are characterised online during their execution by a combination of novel hardware monitoring circuits and background software. These characteristics then stimulate a Self-Organising Map based classifier which is used to detect abnormal system behaviour, as caused by failure and malicious tampering including viruses. The ap...
The advancements on the Internet have enabled connecting more devices into this technology every day...
The rapid development in internet services led to a significant increase in cyberattacks. The need t...
A potential threat to embedded systems is the execution of unknown or malicious software capable of ...
The number of cybersecurity incidents perpetrated by adversaries using modern complex and emerging t...
Execution of unknown or malicious software on an embedded system may trigger harmful system behaviou...
A potential threat to embedded systems is the execution of unknown or malicious software capable of ...
This paper presents a system level framework for System-on-Chip (SoC) based embedded devices that ma...
This dissertation examines the concepts and implementation of a network based autonomic cyber sensor...
Security assurance in a computer system can be viewed as distinguishing between self and non-self. ...
Security assurance in a computer system can be viewed as distinguishing between self and non-self. A...
Abstract: High-performance computing clusters have be-come critical computing resources in many sens...
Abstract—The design of automated online security and intru-sion tolerance solutions for computer sys...
Artificial Immune Systems are inspired by biological immune systems, and are characterized by intere...
This paper will present and analyse the reported use of artificially intelligent systems when it com...
The intent of this project is to address the importance of artificial intelligence in cybersecurity ...
The advancements on the Internet have enabled connecting more devices into this technology every day...
The rapid development in internet services led to a significant increase in cyberattacks. The need t...
A potential threat to embedded systems is the execution of unknown or malicious software capable of ...
The number of cybersecurity incidents perpetrated by adversaries using modern complex and emerging t...
Execution of unknown or malicious software on an embedded system may trigger harmful system behaviou...
A potential threat to embedded systems is the execution of unknown or malicious software capable of ...
This paper presents a system level framework for System-on-Chip (SoC) based embedded devices that ma...
This dissertation examines the concepts and implementation of a network based autonomic cyber sensor...
Security assurance in a computer system can be viewed as distinguishing between self and non-self. ...
Security assurance in a computer system can be viewed as distinguishing between self and non-self. A...
Abstract: High-performance computing clusters have be-come critical computing resources in many sens...
Abstract—The design of automated online security and intru-sion tolerance solutions for computer sys...
Artificial Immune Systems are inspired by biological immune systems, and are characterized by intere...
This paper will present and analyse the reported use of artificially intelligent systems when it com...
The intent of this project is to address the importance of artificial intelligence in cybersecurity ...
The advancements on the Internet have enabled connecting more devices into this technology every day...
The rapid development in internet services led to a significant increase in cyberattacks. The need t...
A potential threat to embedded systems is the execution of unknown or malicious software capable of ...