Search Results for author: Truong Thu Huong

Found 3 papers, 1 papers with code

Explainable Anomaly Detection for Industrial Control System Cybersecurity

1 code implementation4 May 2022 Do Thu Ha, Nguyen Xuan Hoang, Nguyen Viet Hoang, Nguyen Huu Du, Truong Thu Huong, Kim Phuc Tran

Industrial Control Systems (ICSs) are becoming more and more important in managing the operation of many important systems in smart manufacturing, such as power stations, water supply systems, and manufacturing sites.

Anomaly Detection Explainable artificial intelligence

LocKedge: Low-Complexity Cyberattack Detection in IoT Edge Computing

no code implementations28 Nov 2020 Truong Thu Huong, Ta Phuong Bac, Dao M. Long, Bui D. Thang, Nguyen T. Binh, Tran D. Luong, Tran Kim Phuc

Internet of Things and its applications are becoming commonplace with more devices, but always at risk of network security.

Edge-computing Federated Learning

Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-learning based Defense Framework

no code implementations27 Jul 2019 Trung V. Phan, T M Rayhan Gias, Syed Tasnimul Islam, Truong Thu Huong, Nguyen Huu Thanh, Thomas Bauschert

We first analyze the adversary model of stealthy DoS attacks, the related vulnerabilities in SDN-based networks and the key characteristics of stealthy DoS attacks.

Anomaly Detection BIG-bench Machine Learning +2

Cannot find the paper you are looking for? You can Submit a new open access paper.