Menu
×
John L. Dart Library
9 a.m. – 7 p.m.
Phone: (843) 722-7550
West Ashley Library
9 a.m. – 7 p.m.
Phone: (843) 766-6635
Folly Beach Library
Closed
Phone: (843) 588-2001
Edgar Allan Poe/Sullivan's Island Library
Closed for renovations
Phone: (843) 883-3914
Wando Mount Pleasant Library
9 a.m. – 8 p.m.
Phone: (843) 805-6888
Village Library
9 a.m. – 6 p.m.
Phone: (843) 884-9741
St. Paul's/Hollywood Library
9 a.m. – 8 p.m.
Phone: (843) 889-3300
Otranto Road Library
9 a.m. – 8 p.m.
Phone: (843) 572-4094
Mt. Pleasant Library
9 a.m. – 8 p.m.
Phone: (843) 849-6161
McClellanville Library
9 a.m. - 6 p.m.
Phone: (843) 887-3699
Keith Summey North Charleston Library
9 a.m. – 8 p.m.
Phone: (843) 744-2489
John's Island Library
9 a.m. – 8 p.m.
Phone: (843) 559-1945
Hurd/St. Andrews Library
9 a.m. – 8 p.m.
Phone: (843) 766-2546
Miss Jane's Building (Edisto Library Temporary Location)
9 a.m. – 6 p.m.
Phone: (843) 869-2355
Dorchester Road Library
9 a.m. – 8 p.m.
Phone: (843) 552-6466
Baxter-Patrick James Island
9 a.m. – 8 p.m.
Phone: (843) 795-6679
Main Library
9 a.m. – 8 p.m.
Phone: (843) 805-6930
Bees Ferry West Ashley Library
9 a.m. – 8 p.m.
Phone: (843) 805-6892
Mobile Library
9 a.m. - 5 p.m.
Phone: (843) 805-6909
Today's Hours
John L. Dart Library
9 a.m. – 7 p.m.
Phone: (843) 722-7550
West Ashley Library
9 a.m. – 7 p.m.
Phone: (843) 766-6635
Folly Beach Library
Closed
Phone: (843) 588-2001
Edgar Allan Poe/Sullivan's Island Library
Closed for renovations
Phone: (843) 883-3914
Wando Mount Pleasant Library
9 a.m. – 8 p.m.
Phone: (843) 805-6888
Village Library
9 a.m. – 6 p.m.
Phone: (843) 884-9741
St. Paul's/Hollywood Library
9 a.m. – 8 p.m.
Phone: (843) 889-3300
Otranto Road Library
9 a.m. – 8 p.m.
Phone: (843) 572-4094
Mt. Pleasant Library
9 a.m. – 8 p.m.
Phone: (843) 849-6161
McClellanville Library
9 a.m. - 6 p.m.
Phone: (843) 887-3699
Keith Summey North Charleston Library
9 a.m. – 8 p.m.
Phone: (843) 744-2489
John's Island Library
9 a.m. – 8 p.m.
Phone: (843) 559-1945
Hurd/St. Andrews Library
9 a.m. – 8 p.m.
Phone: (843) 766-2546
Miss Jane's Building (Edisto Library Temporary Location)
9 a.m. – 6 p.m.
Phone: (843) 869-2355
Dorchester Road Library
9 a.m. – 8 p.m.
Phone: (843) 552-6466
Baxter-Patrick James Island
9 a.m. – 8 p.m.
Phone: (843) 795-6679
Main Library
9 a.m. – 8 p.m.
Phone: (843) 805-6930
Bees Ferry West Ashley Library
9 a.m. – 8 p.m.
Phone: (843) 805-6892
Mobile Library
9 a.m. - 5 p.m.
Phone: (843) 805-6909
Patron Login
menu
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
Cyber attack detection and mitigation process in cloud via deep hybrid model with selected feature set.
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
- Author(s): Dahiya, Deepak
- Source:
Multimedia Tools & Applications; Aug2024, Vol. 83 Issue 28, p70749-70775, 27p- Subject Terms:
- Source:
- Additional Information
- Abstract: For ensuring the proper operation of CPS, it is required to obtain a solution to the security problem. Applications for cyber-physical systems (CPS) have a big impact on several industrial sectors. Growing in both quantity and variety are cyber attacks try to manage both the industrial process itself as well as data collection from CPS. Attacks on CPS must be identified and stopped in order to avoid financial loss, production disruptions, and possible threats to national security. This paper models a cyber-attack detection and mitigation framework using a hybrid classifier (CADFHC) including the steps like (1) Pre-processing, (2) Feature Extraction (3) Feature Selection (4) Detection & (5) Mitigation. The initial data is preprocessed via z-score normalization. Higher-order statistical features, mutual information, correlation, and raw features, will be retrieved in the feature extraction step. From the extracted feature set, an improved PCA will be used for selecting the appropriate features. In the detection phase, the hybrid model combining improved Bi-GRU & RNN is used for detecting the presence of an attack. After the attack detection process, the mitigation process will be performed by eliminating the attackers from the network. For this, modified distribution entropy function-based mitigation is performed. Finally, the effectiveness of the accepted model is compared with the conventional models with different metrics. The CADFHC approach has attained the most excellent outcomes (0.99) under the best case scenario. [ABSTRACT FROM AUTHOR]
- Abstract: Copyright of Multimedia Tools & Applications is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Abstract:
Contact CCPL
Copyright 2022 Charleston County Public Library Powered By EBSCO Stacks 3.3.0 [350.3] | Staff Login
No Comments.