Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Missouri University of Science and Technology

Series

Cybersecurity

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Network Intrusion Detection System Using Deep Learning, Lirim Ashiku, Cihan H. Dagli Jun 2021

Network Intrusion Detection System Using Deep Learning, Lirim Ashiku, Cihan H. Dagli

Engineering Management and Systems Engineering Faculty Research & Creative Works

The widespread use of interconnectivity and interoperability of computing systems have become an indispensable necessity to enhance our daily activities. Simultaneously, it opens a path to exploitable vulnerabilities that go well beyond human control capability. The vulnerabilities deem cyber-security mechanisms essential to assume communication exchange. Secure communication requires security measures to combat the threats and needs advancements to security measures that counter evolving security threats. This paper proposes the use of deep learning architectures to develop an adaptive and resilient network intrusion detection system (IDS) to detect and classify network attacks. The emphasis is how deep learning or deep neural …


System Of Systems (Sos) Architecture For Digital Manufacturing Cybersecurity, Lirim Ashiku, Cihan H. Dagli Aug 2019

System Of Systems (Sos) Architecture For Digital Manufacturing Cybersecurity, Lirim Ashiku, Cihan H. Dagli

Engineering Management and Systems Engineering Faculty Research & Creative Works

Technology advancements of real time connectivity and computing powers has evolved the way people manage activities triggering heavy reliance on smart devices. This has reshaped the ability to memorize crucial information, instead accumulate the information into devices allowing real-time fingertip access when needed. Inability to access such information when needed is routinely assumed with device malfunctioning bypassing the probability of compromise, but what if the information is now being accessed by adversaries depriving the data-owner access to crucial information? Cyber manufacturing systems are not immune from these issues. It is possible to approach this problem as generating SoS meta-architecture. In …