no code implementations • 7 Jan 2021 • Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha
The novelty of this approach lies in extracting intelligence from known real-world CPS/IoT attacks, representing them in the form of regular expressions, and employing machine learning (ML) techniques on this ensemble of regular expressions to generate new attack vectors and security vulnerabilities.