Skip to main content

Research Repository

Advanced Search

All Outputs (3)

Evaluation of machine learning and deep learning-based intrusion detection systems in in-vehicle networks (2023)
Presentation / Conference Contribution

With the growing complexity and connectivity of Intelligent Connected Vehicles (ICVs), In-vehicle communication plays an important role in today's driving environment. The Controller Area Network (CAN) is the most used protocol in an in-vehicle netwo... Read More about Evaluation of machine learning and deep learning-based intrusion detection systems in in-vehicle networks.

Reducing false negatives in ransomware detection: A critical evaluation of machine learning algorithms (2022)
Journal Article

Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a S... Read More about Reducing false negatives in ransomware detection: A critical evaluation of machine learning algorithms.