Machine learning plays a vital role in understanding threats, vulnerabilities, and security policies. In this dissertation, two machine learning empowered approaches on improving the security of critical cyber infrastructures and functionalities will be discussed. The first work focuses on preventing attacks that use adversarial, active end-to-end topology inference to obtain the topology information of a target network. The topology of a network is fundamental for building network infrastructure functionalities. In many scenarios, enterprise networks may have no desire to disclose their topology information. To this end, we propose a Proactive Topology Obfuscation (ProTO) system that adopts a detect-then-obfuscate framework: (i) a lightwei...
With the emergence of the Internet of Things (IoT) and Artificial Intelligence (AI) services and app...
Rapid shifting by government sectors and companies to provide their services and products over the i...
The significance of security is often overlooked until a catastrophic event occurs. This holds for t...
With the rapid development of a computer network, our lives are already inseparable from it. Wireles...
With the rapid development of a computer network, our lives are already inseparable from it. Wireles...
International audienceThe Internet of Things (IoT) has continued gaining in popularity and importanc...
International audienceThe Internet of Things (IoT) has continued gaining in popularity and importanc...
This research examines the use of machine-learning techniques to identify malicious traffic in an em...
The rapid growth of edge-based IoT devices, their use cases, and autonomous communication has create...
In recent years, there has been an immense research interest in applying Machine Learning (ML) for d...
In recent years, there has been an immense research interest in applying Machine Learning (ML) for d...
In recent years, there has been an immense research interest in applying Machine Learning (ML) for d...
Internet of things (IoT) has brought a greater prevalence of smart objects with higher connectivity ...
The author has not given permission for Aaltodoc -publishing.Intrusion detection systems are conside...
With the emergence of the Internet of Things (IoT) and Artificial Intelligence (AI) services and app...
With the emergence of the Internet of Things (IoT) and Artificial Intelligence (AI) services and app...
Rapid shifting by government sectors and companies to provide their services and products over the i...
The significance of security is often overlooked until a catastrophic event occurs. This holds for t...
With the rapid development of a computer network, our lives are already inseparable from it. Wireles...
With the rapid development of a computer network, our lives are already inseparable from it. Wireles...
International audienceThe Internet of Things (IoT) has continued gaining in popularity and importanc...
International audienceThe Internet of Things (IoT) has continued gaining in popularity and importanc...
This research examines the use of machine-learning techniques to identify malicious traffic in an em...
The rapid growth of edge-based IoT devices, their use cases, and autonomous communication has create...
In recent years, there has been an immense research interest in applying Machine Learning (ML) for d...
In recent years, there has been an immense research interest in applying Machine Learning (ML) for d...
In recent years, there has been an immense research interest in applying Machine Learning (ML) for d...
Internet of things (IoT) has brought a greater prevalence of smart objects with higher connectivity ...
The author has not given permission for Aaltodoc -publishing.Intrusion detection systems are conside...
With the emergence of the Internet of Things (IoT) and Artificial Intelligence (AI) services and app...
With the emergence of the Internet of Things (IoT) and Artificial Intelligence (AI) services and app...
Rapid shifting by government sectors and companies to provide their services and products over the i...
The significance of security is often overlooked until a catastrophic event occurs. This holds for t...