Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the propo...
In many sensor network applications, sensor nodes are deployed in open environments, and hence are v...
The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerabil...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
Resiliency and security in critical infrastructure control systems in the modern world of cyber terr...
The planned large scale deployment of smart grid network devices will generate a large amount of inf...
This dissertation examines the concepts and implementation of a network based autonomic cyber sensor...
Resilience is an increasingly important concept in current socio-economic landscapes. Due to the com...
Anomaly detection is used to monitor and capture traffic anomalies in network systems. Many anomalie...
Objectives: This paper presents a new methodology for analyzing the vulnerability of power systems i...
Organizations rely on security experts to improve the security of their systems. These professionals...
Many sensor network applications are dependent on the secure operation of networks, and serious prob...
Malware is one of the problems really existing in the modern post-industrial society. Hackers contin...
Cyber security risk management plays an important role for today’s businesses due to the rapidly cha...
The fuzzy neural networks are hybrid structures that can act in several contexts of the pattern clas...
The file attached to this record is the author's final peer reviewed version.Small and large busines...
In many sensor network applications, sensor nodes are deployed in open environments, and hence are v...
The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerabil...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...
Resiliency and security in critical infrastructure control systems in the modern world of cyber terr...
The planned large scale deployment of smart grid network devices will generate a large amount of inf...
This dissertation examines the concepts and implementation of a network based autonomic cyber sensor...
Resilience is an increasingly important concept in current socio-economic landscapes. Due to the com...
Anomaly detection is used to monitor and capture traffic anomalies in network systems. Many anomalie...
Objectives: This paper presents a new methodology for analyzing the vulnerability of power systems i...
Organizations rely on security experts to improve the security of their systems. These professionals...
Many sensor network applications are dependent on the secure operation of networks, and serious prob...
Malware is one of the problems really existing in the modern post-industrial society. Hackers contin...
Cyber security risk management plays an important role for today’s businesses due to the rapidly cha...
The fuzzy neural networks are hybrid structures that can act in several contexts of the pattern clas...
The file attached to this record is the author's final peer reviewed version.Small and large busines...
In many sensor network applications, sensor nodes are deployed in open environments, and hence are v...
The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerabil...
Abstract:- Intrusion Detection Systems are increasingly a key part of systems defense. Various appro...