References
- M. Balduzzi, A. Pasta, and K. Wilhoit, "A security evaluation of AIS automated identification system," in Proc. of the 30th Annual Computer Security Applications Conference (ACSAC '14), pp.436-445, Association for Computing Machinery, New York, NY, USA, Dec. 2014.
- R. Neware and A. Khan, "Cloud Computing Digital Forensic challenges," in Proc. of 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), pp.1090-1092, Mar. 2018.
- R. Dremliuga and M. H. B. M. Rusli, "The Development of the Legal Framework for Autonomous Shipping: Lessons Learned from a Regulation for a Driverless Car," Journal of Politics and Law, vol.13, no.3, Aug. 2020.
- A. L. Buczak and E. Guven, "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," IEEE Communications Surveys & Tutorials, vol.18, no.2, pp.1153-1176, Secondquarter 2016. https://doi.org/10.1109/COMST.2015.2494502
- G. Karatas, O. Demir, and O. K. Sahingoz, "Increasing the Performance of Machine LearningBased IDSs on an Imbalanced and Up-to-Date Dataset," IEEE Access, vol.8, pp.32150-32162, Feb. 2020. https://doi.org/10.1109/ACCESS.2020.2973219
- R. Kaur, D. Gabrijelcic, and T. Klobucar, "Artificial intelligence for cybersecurity: Literature review and future research directions," Information Fusion, vol.97, Sep. 2023.
- A. Corallo, M. Lazoi, M. Lezzi, and A. Luperto, "Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review," Computers in Industry, vol.137, May 2022.
- A. Amro and V. Gkioulos, "Cyber risk management for autonomous passenger ships using threatinformed defense-in-depth," International Journal of Information Security, vol.22, no.1, pp.249-288, Feb. 2022. https://doi.org/10.1007/s10207-022-00638-y
- J. M. Torres, C. I. Comesana, and P. J. Garcia-Nieto, "Review: machine learning techniques applied to cybersecurity," International Journal of Machine Learning and Cybernetics, vol.10, no.10, pp.2823-2836, Oct. 2019. https://doi.org/10.1007/s13042-018-00906-1
- S. Smadi, N. Aslam, and L. Zhang, "Detection of online phishing email using dynamic evolving neural network based on reinforcement learning," Decision Support Systems, vol.107, pp.88-102, Mar. 2018. https://doi.org/10.1016/j.dss.2018.01.001
- F. Feng, Q. Zhou, Z. Shen, X. Yang, L. Han, and J. Wang, "The application of a novel neural network in the detection of phishing websites," Journal of Ambient Intelligence and Humanized Computing, vol.15, no.3, pp.1865-1879, Mar. 2024. https://doi.org/10.1007/s12652-018-0786-3
- L. Yang et al., "Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis," Symmetry, vol.11, no.2, Feb. 2019.
- M. Taddeo, D. McNeish, A. Blanchard, and E. Edgar, "Ethical Principles for Artificial Intelligence in National Defence," Philosophy & Technology, vol.34, no.4, pp.1707-1729, Dec. 2021. https://doi.org/10.1007/s13347-021-00482-3
- H. S. Anderson, J. Woodbridge, and B. Filar, "DeepDGA: Adversarially-Tuned Domain Generation and Detection," in Proc. of the 2016 ACM Workshop on Artificial Intelligence and Security (AISec '16), pp.13-21, Association for Computing Machinery, New York, NY, USA, Oct. 2016.
- R. Prasad and V. Rohokale, Artificial Intelligence and Machine Learning in Cyber Security, Springer Series in Wireless Technology, pp.231-247, Springer, Cham, 2019.
- M. Krzyszton and M. Marks, "Simulation of watchdog placement for cooperative anomaly detection in Bluetooth Mesh Intrusion Detection System," Simulation Modelling Practice and Theory, vol.101, May 2020.
- P. Xiong, H. Liu, Y. Tian, Z. Chen, B. Wang, and H. Yang, "Helicopter maritime search area planning based on a minimum bounding rectangle and K-means clustering," Chinese Journal of Aeronautics, vol.34, no.2, pp.554-562, Feb. 2021.
- M. A. B. Farah et al., "Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends," Information, vol.13, no.1, Jan. 2022.
- P. O. Shoetan, O. O. Amoo, E. S. Okafor, and O. L. Olorunfemi, "Synthesizing AI's Impact on Cybersecurity in Telecommunications: A Conceptual Framework," Computer Science & IT Research Journal, vol.5, no.3, pp.594-605, Mar. 2024. https://doi.org/10.51594/csitrj.v5i3.908
- A. J. G. de Azambuja, C. Plesker, K. Schutzer, R. Anderl, B. Schleich, and V. R. Almeida, "Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0-A Survey," Electronics, vol.12, no.8, Apr. 2023.
- J. Yoo and Y. Jo, "Formulating Cybersecurity Requirements for Autonomous Ships Using the SQUARE Methodology," Sensors, vol.23, no.11, May 2023.
- J. Guo, X. Li, Z. Liu, J. Ma, C. Yang, J. Zhang, D. Wu, "TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning," IEEE Internet of Things Journal, vol.7, no.7, pp.6647-6662, Jul. 2020. https://doi.org/10.1109/JIOT.2020.2975084
- J. Guo, Z. Liu, S. Tian, F. Huang, J. Li, X. Li, K. K. Igorevich, J. Ma, "TFL-DT: A Trust Evaluation Scheme for Federated Learning in Digital Twin for Mobile Networks," IEEE Journal on Selected Areas in Communications, vol.41 no.11, pp.3548-3560, Nov. 2023. https://doi.org/10.1109/JSAC.2023.3310094
- J. Guo, H. Gao, Z. Liu, F. Huang, J. Zhang, X. Li, J. Ma, "ICRA: An Intelligent Clustering Routing Approach for UAV Ad Hoc Networks," IEEE Transactions on Intelligent Transportation Systems, vol.24, no.2, pp.2447-2460, Feb. 2023. https://doi.org/10.1109/TITS.2022.3145857