<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Publications Archives - IoTAC</title>
	<atom:link href="https://iotac.eu/category/publications/feed/" rel="self" type="application/rss+xml" />
	<link>https://iotac.eu/category/publications/</link>
	<description>Internet of Things Access Control</description>
	<lastBuildDate>Sun, 19 Apr 2026 08:02:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2.9</generator>

<image>
	<url>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon-32x32.jpg</url>
	<title>Publications Archives - IoTAC</title>
	<link>https://iotac.eu/category/publications/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Kuaban G, Gelenbe E, Czachórski T, Czekalski P. 2023. Modelling the Energy Performance of Off-Grid Sustainable Green Cellular Base Stations. MASCOTS 2023.</title>
		<link>https://iotac.eu/kuaban-g-gelenbe-e-czachorski-t-czekalski-p-2023-modelling-the-energy-performance-of-off-grid-sustainable-green-cellular-base-stations-mascots-2023/</link>
					<comments>https://iotac.eu/kuaban-g-gelenbe-e-czachorski-t-czekalski-p-2023-modelling-the-energy-performance-of-off-grid-sustainable-green-cellular-base-stations-mascots-2023/#respond</comments>
		
		<dc:creator><![CDATA[Kuaban G, Gelenbe E, and Czachórski T, IITIS-PAN, Czekalski P, Silesian University of Technology]]></dc:creator>
		<pubDate>Mon, 23 Oct 2023 10:11:02 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12928</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/kuaban-g-gelenbe-e-czachorski-t-czekalski-p-2023-modelling-the-energy-performance-of-off-grid-sustainable-green-cellular-base-stations-mascots-2023/">Kuaban G, Gelenbe E, Czachórski T, Czekalski P. 2023. Modelling the Energy Performance of Off-Grid Sustainable Green Cellular Base Stations. MASCOTS 2023.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5e08172fa2"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row top-level standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://iotac.eu/gdl/1SwlVNBoD0qY6ATvnKK51Hsm75qPcrGp8" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Conference:<br />
</strong>31st International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2023)<br />
16-18. October 2023<br />
Stony Brook University, Stony Brook, NY, USA</p>
<p><strong>Authors:<br />
</strong>Kuaban G, Gelenbe E, Czachórski T, Czekalski P.</p>
<p><strong>Abstract:<br />
</strong></p>
<p>There is a growing awareness of the need to reduce carbon emissions from the operation of mobile networks. The massive deployment of ultra-dense 5G and IoT networks will significantly increase energy demand and put the electricity grid under stress while also driving up operational costs. In this paper, we model the energy performance of an off-grid sustainable green cellular base station site which consists of a solar power system, Battery Energy Storage (BESS) and Hydrogen Energy Storage (HESS) system, and various types of macrocells, microcells, picocells, or femtocells, with broadband optical or microwave transmission systems, and other electrical and electronic systems (air conditioner, power converters, and controllers). We propose diffusion-based models of the charging and discharging processes of the energy storage systems, and obtain the probability of charging them to their full capacities during the day and completely discharging them at the end of each day. We also investigate the impact of design parameters such as the mean charging rate and the mean discharging rate on the probability densities of charging BESS and HESS to their full capacities during the day and of completely discharging them before the end of each night period.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/kuaban-g-gelenbe-e-czachorski-t-czekalski-p-2023-modelling-the-energy-performance-of-off-grid-sustainable-green-cellular-base-stations-mascots-2023/">Kuaban G, Gelenbe E, Czachórski T, Czekalski P. 2023. Modelling the Energy Performance of Off-Grid Sustainable Green Cellular Base Stations. MASCOTS 2023.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/kuaban-g-gelenbe-e-czachorski-t-czekalski-p-2023-modelling-the-energy-performance-of-off-grid-sustainable-green-cellular-base-stations-mascots-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gelenbe E, 2023. Electricity Consumption by ICT: Facts, trends, and measurements. ACM Ubiquity, Volume: 2023, Issue: August</title>
		<link>https://iotac.eu/gelenbe-e-2023-electricity-consumption-by-ict-facts-trends-and-measurements-acm-ubiquity-volume-2023-issue-august/</link>
					<comments>https://iotac.eu/gelenbe-e-2023-electricity-consumption-by-ict-facts-trends-and-measurements-acm-ubiquity-volume-2023-issue-august/#respond</comments>
		
		<dc:creator><![CDATA[Erol Gelenbe, Institute of Theoretical and Applied Informatics Polish Academy of Sciences, IITIS-PAN]]></dc:creator>
		<pubDate>Wed, 30 Aug 2023 20:45:02 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12820</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/gelenbe-e-2023-electricity-consumption-by-ict-facts-trends-and-measurements-acm-ubiquity-volume-2023-issue-august/">Gelenbe E, 2023. Electricity Consumption by ICT: Facts, trends, and measurements. ACM Ubiquity, Volume: 2023, Issue: August</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5e0817492f"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=1S8hF8-PrBMlFE2Z5GhVSu-EAS3b_dWsW" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Journal:<br />
</strong>ACM Ubiquity, Volume: 2023, Issue: August</p>
<p><strong>Authors:<br />
</strong>Gelenbe E.</p>
<p><strong>Abstract:<br />
</strong></p>
<p>This paper considers key issues surrounding energy consumption by information and communication technologies (ICT), which has been steadily growing and is now attaining approximately 10% of the worldwide electricity consumption with a significant impact on greenhouse gas emissions. The perimeter of ICT systems is discussed, and the role of the subsystems that compose ICT is considered.<br />
Data from recent years is used to understand how each of these sub-systems contribute to ICT’s energy consumption. The quantitatively demonstrated positive correlation between the penetration of ICT in the world’s different economies and the same economies’ contributions to undesirable greenhouse gas emissions is also discussed. We also examine how emerging technologies such as 5G, edge computing, and cryptocurrencies are contributing to the worldwide increase in electricity consumption by ICT, despite the increases in ICT efficiency, in terms of energy consumed per bit processed, stored, or transmitted. The measurement of specific ICT systems’ electricity consumption is also addressed, and the manner in which this consumption can be minimized in a specific edge-computing context is discussed.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/gelenbe-e-2023-electricity-consumption-by-ict-facts-trends-and-measurements-acm-ubiquity-volume-2023-issue-august/">Gelenbe E, 2023. Electricity Consumption by ICT: Facts, trends, and measurements. ACM Ubiquity, Volume: 2023, Issue: August</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/gelenbe-e-2023-electricity-consumption-by-ict-facts-trends-and-measurements-acm-ubiquity-volume-2023-issue-august/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A,  2023. Software vulnerability prediction: A systematic mapping study. Information and Software Technology, Vol. 164, 2023.</title>
		<link>https://iotac.eu/kalouptsoglou-i-siavvas-m-ampatzoglou-a-kehagias-d-chatzigeorgiou-a-2023-software-vulnerability-prediction-a-systematic-mapping-study-information-and-software-technology-vol-164-2023/</link>
					<comments>https://iotac.eu/kalouptsoglou-i-siavvas-m-ampatzoglou-a-kehagias-d-chatzigeorgiou-a-2023-software-vulnerability-prediction-a-systematic-mapping-study-information-and-software-technology-vol-164-2023/#respond</comments>
		
		<dc:creator><![CDATA[Ilias Kalouptsoglou, Miltiadis Siavvas, Dionysios Kehagias, Centre for Research and Technology Hellas and Alexandros Chatzigeorgiou, Apostolos Ampatzoglou, University of Macedonia]]></dc:creator>
		<pubDate>Mon, 21 Aug 2023 18:48:29 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12743</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/kalouptsoglou-i-siavvas-m-ampatzoglou-a-kehagias-d-chatzigeorgiou-a-2023-software-vulnerability-prediction-a-systematic-mapping-study-information-and-software-technology-vol-164-2023/">Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A,  2023. Software vulnerability prediction: A systematic mapping study. Information and Software Technology, Vol. 164, 2023.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5e08174ec8"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style=""  href="https://drive.google.com/uc?export=download&#038;id=1ZWN9fu-zUOazP1XeSY3TvTwlSy6WSQG0" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Journal:<br />
</strong>Information and Software Technology, Vol. 164, 2023.</p>
<p><strong>Authors:<br />
</strong>Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A.</p>
<p><strong>Abstract:<br />
Context:</strong> Software security is considered a major aspect of software quality as the number of discovered vulnerabilities in software products is growing. Vulnerability prediction is a mechanism that helps engineers to prioritize their inspection efforts focusing on vulnerable parts. Despite the recent advancements, current literature lacks a systematic mapping study on vulnerability prediction.<br />
<strong>Objective:</strong> This paper aims to analyze the state-of-the-art of vulnerability  prediction focusing on: (a) the goals of vulnerability prediction-related studies; (b) the data collection processes and the types of datasets that exist in the literature; (c) the mostly examined techniques for the construction of the prediction models and their input features; and (d) the utilized evaluation techniques.<br />
<strong>Method:</strong> We collected 180 primary studies following a broad search methodology across four popular digital libraries. We mapped these studies to the variables of interest and we identified trends and relationships between the studies.<br />
<strong>Results:</strong> The main findings suggest that: (i) there are two major study types, prediction of vulnerable software components and forecasting of the evolution of vulnerabilities in software; (ii) most studies construct their own vulnerability-related dataset retrieving information from vulnerability databases for real-world software; (iii) there is a growing interest for deep learning models along with a trend on textual source code representation; and (iv) F1-score was found to be the most widely used evaluation metric.<br />
<strong>Conclusions:</strong> The results of our study indicate that there are several open challenges in the domain of vulnerability prediction. One of the major conclusions, is the fact that most studies focus on within-project prediction, neglecting the real-world scenario of cross-project prediction.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/kalouptsoglou-i-siavvas-m-ampatzoglou-a-kehagias-d-chatzigeorgiou-a-2023-software-vulnerability-prediction-a-systematic-mapping-study-information-and-software-technology-vol-164-2023/">Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A,  2023. Software vulnerability prediction: A systematic mapping study. Information and Software Technology, Vol. 164, 2023.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/kalouptsoglou-i-siavvas-m-ampatzoglou-a-kehagias-d-chatzigeorgiou-a-2023-software-vulnerability-prediction-a-systematic-mapping-study-information-and-software-technology-vol-164-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kuaban G, Gelenbe E, Czachórski T, Czekalski P, Tangka J. 2023. Modelling of the Energy Depletion Process and Battery Depletion Attacks for Battery-Powered Internet of Things (IoT) Devices. sensors. 2023, 23(13)</title>
		<link>https://iotac.eu/kuaban-g-gelenbe-e-czachorski-t-czekalski-p-tangka-j-2023-modelling-of-the-energy-depletion-process-and-battery-depletion-attacks-for-battery-powered-internet-of-things-iot-devices-sensors-2/</link>
					<comments>https://iotac.eu/kuaban-g-gelenbe-e-czachorski-t-czekalski-p-tangka-j-2023-modelling-of-the-energy-depletion-process-and-battery-depletion-attacks-for-battery-powered-internet-of-things-iot-devices-sensors-2/#respond</comments>
		
		<dc:creator><![CDATA[Kuaban G, Gelenbe E, and Czachórski T, IITIS-PAN, Czekalski P, Silesian University of Technology, Tangka J, University of Dschang]]></dc:creator>
		<pubDate>Wed, 09 Aug 2023 14:19:21 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12661</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/kuaban-g-gelenbe-e-czachorski-t-czekalski-p-tangka-j-2023-modelling-of-the-energy-depletion-process-and-battery-depletion-attacks-for-battery-powered-internet-of-things-iot-devices-sensors-2/">Kuaban G, Gelenbe E, Czachórski T, Czekalski P, Tangka J. 2023. Modelling of the Energy Depletion Process and Battery Depletion Attacks for Battery-Powered Internet of Things (IoT) Devices. sensors. 2023, 23(13)</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5e08175463"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=1MjVzlPZ4PEBQuvlLvBAywHzKb6dZux87" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Journal:<br />
</strong>Sensors 2023, 23(13)</p>
<p><strong>Authors:<br />
</strong>Kuaban G, Gelenbe E, Czachórski T, Czekalski P, Tangka J.</p>
<p><strong>Abstract:<br />
</strong></p>
<p>The Internet of Things (IoT) is transforming almost every industry, including agriculture, food processing, health care, oil and gas, environmental protection, transportation and logistics, manufacturing, home automation, and safety. Cost-effective, small-sized batteries are often used to power IoT devices being deployed with limited energy capacity. The limited energy capacity of IoT devices makes them vulnerable to battery depletion attacks designed to exhaust the energy stored in the battery rapidly and eventually shut down the device. In designing and deploying IoT devices, the battery and device specifications should be chosen in such a way as to ensure a long lifetime of the device. This paper proposes diffusion approximation as a mathematical framework for modelling the energy depletion process in IoT batteries. We applied diffusion or Brownian motion processes to model the energy depletion of a battery of an IoT device. We used this model to obtain the probability density function, mean, variance, and probability of the lifetime of an IoT device. Furthermore, we studied the influence of active power consumption, sleep time, and battery capacity on the probability density function, mean, and probability of the lifetime of an IoT device. We modelled ghost energy depletion attacks and their impact on the lifetime of IoT devices. We used numerical examples to study the influence of battery depletion attacks on the distribution of the lifetime of an IoT device.<br />
We also introduced an energy threshold after which the device’s battery should be replaced in order to ensure that the battery is not completely drained before it is replaced.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/kuaban-g-gelenbe-e-czachorski-t-czekalski-p-tangka-j-2023-modelling-of-the-energy-depletion-process-and-battery-depletion-attacks-for-battery-powered-internet-of-things-iot-devices-sensors-2/">Kuaban G, Gelenbe E, Czachórski T, Czekalski P, Tangka J. 2023. Modelling of the Energy Depletion Process and Battery Depletion Attacks for Battery-Powered Internet of Things (IoT) Devices. sensors. 2023, 23(13)</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/kuaban-g-gelenbe-e-czachorski-t-czekalski-p-tangka-j-2023-modelling-of-the-energy-depletion-process-and-battery-depletion-attacks-for-battery-powered-internet-of-things-iot-devices-sensors-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gelenbe E, Nakip M. 2023. IoT Network Cybersecurity Assessment with the Associated Random Neural Network. IEEE Access. 2023. Vol. 11. 2023</title>
		<link>https://iotac.eu/gelenbe-e-nakip-m-2023-iot-network-cybersecurity-assessment-with-the-associated-random-neural-network-ieee-access-2023/</link>
					<comments>https://iotac.eu/gelenbe-e-nakip-m-2023-iot-network-cybersecurity-assessment-with-the-associated-random-neural-network-ieee-access-2023/#respond</comments>
		
		<dc:creator><![CDATA[Erol Gelenbe and Mert Nakip, IITIS-PAN]]></dc:creator>
		<pubDate>Thu, 20 Jul 2023 14:37:07 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12596</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2023-iot-network-cybersecurity-assessment-with-the-associated-random-neural-network-ieee-access-2023/">Gelenbe E, Nakip M. 2023. IoT Network Cybersecurity Assessment with the Associated Random Neural Network. IEEE Access. 2023. Vol. 11. 2023</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5e081759d9"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=1IczR01zKBsvgU94kTHZwk0D41Vjw2QLl" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Journal:<br />
</strong>IEEE Access 2023. Vol. 11. 2023</p>
<p><strong>Authors:<br />
</strong>Gelenbe E, Nakip M.</p>
<p><strong>Abstract:<br />
</strong></p>
<p>This paper proposes a method to assess the security of an <em>n</em> device, or IP address, IoT network by simultaneously identifying all the compromised IoT devices and IP addresses. It uses a specific Random Neural Network (RNN) architecture composed of two mutually interconnected sub-networks that complement each other in a recurrent structure, called the Associated RNN (ARNN). For each of the <em>n</em> devices or IP addresses in the IoT network, two distinct neurons of the ARNN advocate opposite views: compromised or not compromised. The fully interconnected 2<em>n</em> neuron ARNN structure of paired neurons learns offline from ground truth data. Thus rather than requiring a separate attack detector at each network node, the ARNN offers a single overall attack detector that observes the incoming traffic at each node, learns about the interdependencies between network nodes, and formulates a recommendation for each device or IP address in an IoT network. The ARNN weight initialization and learning algorithm are discussed, and the ARNN performance is evaluated using real attack data, and compared against several learning and testing techniques. Results are obtained both for off-line learning with ground truth data, and for on-line incremental learning using a simplified average metric measured from incoming packet traffic. Comparisons with the best state-of-the-art techniques show that the ARNN significantly outperforms previously known approaches.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2023-iot-network-cybersecurity-assessment-with-the-associated-random-neural-network-ieee-access-2023/">Gelenbe E, Nakip M. 2023. IoT Network Cybersecurity Assessment with the Associated Random Neural Network. IEEE Access. 2023. Vol. 11. 2023</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/gelenbe-e-nakip-m-2023-iot-network-cybersecurity-assessment-with-the-associated-random-neural-network-ieee-access-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Szántó M, Hidalgo C, González L, Pérez J, Asua E, Vajta L. 2023. Trajectory Planning of Automated Vehicles Using Real-Time Map Updates. IEEE Access. 2023. Vol. 11. 2023</title>
		<link>https://iotac.eu/szanto-m-hidalgo-c-gonzalez-l-perez-j-asua-e-vajta-l-2023-trajectory-planning-of-automated-vehicles-using-real-time-map-updates-ieee-access-2023/</link>
					<comments>https://iotac.eu/szanto-m-hidalgo-c-gonzalez-l-perez-j-asua-e-vajta-l-2023-trajectory-planning-of-automated-vehicles-using-real-time-map-updates-ieee-access-2023/#respond</comments>
		
		<dc:creator><![CDATA[Mátyás Szántó, BME, Carlos Hidalgo, Leonardo González and Joshué Pérez, Tecnalia, Estibaliz Asua, UPV/EHU and László Vajta, BME]]></dc:creator>
		<pubDate>Fri, 07 Jul 2023 11:11:42 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12572</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/szanto-m-hidalgo-c-gonzalez-l-perez-j-asua-e-vajta-l-2023-trajectory-planning-of-automated-vehicles-using-real-time-map-updates-ieee-access-2023/">Szántó M, Hidalgo C, González L, Pérez J, Asua E, Vajta L. 2023. Trajectory Planning of Automated Vehicles Using Real-Time Map Updates. IEEE Access. 2023. Vol. 11. 2023</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5e08175f42"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=1wRWRfMXi7YqIQzEEjBTA6_1j39-7GQXM" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Journal:<br />
</strong>IEEE Access 2023. Vol. 11. 2023</p>
<p><strong>Authors:<br />
</strong>Szántó M, Hidalgo C, González L, Pérez J, Asua E, and Vajta L.</p>
<p><strong>Abstract:<br />
</strong>The development of connected and automated vehicles (CAVs) presents a great opportunity to extend the current range of vehicle vision, by gathering information outside of its sensors. Two main sources could be aggregated for this extended perception; vehicles making use of vehicle-to-vehicle communication (V2V), and infrastructure using vehicle-to-infrastructure communication (V2I). In this paper, we focus on the infrastructure side and make the case for low-latency obstacle mapping using V2I communication. A map management framework is proposed, which allows vehicles to broadcast and subscribe to traffic information-related messages using the Message Queuing Telemetry Transport (MQTT) protocol. This framework makes use of our novel candidate/employed map (C/EM) model for the real-time updating of obstacles broadcast by individual vehicles. This solution has been implemented and tested using a scenario that contains real and simulated CAVs tasked with doing lane change and braking maneuvers. As a result, the simulated vehicle can optimize its trajectory planning based on information which could not be observed by its sensor suite but is instead received from the presented map-management module, while remaining capable of performing the maneuvers in an automated manner.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/szanto-m-hidalgo-c-gonzalez-l-perez-j-asua-e-vajta-l-2023-trajectory-planning-of-automated-vehicles-using-real-time-map-updates-ieee-access-2023/">Szántó M, Hidalgo C, González L, Pérez J, Asua E, Vajta L. 2023. Trajectory Planning of Automated Vehicles Using Real-Time Map Updates. IEEE Access. 2023. Vol. 11. 2023</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/szanto-m-hidalgo-c-gonzalez-l-perez-j-asua-e-vajta-l-2023-trajectory-planning-of-automated-vehicles-using-real-time-map-updates-ieee-access-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Nasereddin M, Nakip M, Gelenbe E. 2023. Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed. IEEE LCN 2023.</title>
		<link>https://iotac.eu/nasereddin-m-nakip-m-gelenbe-e-2023-measurement-based-evaluation-and-mitigation-of-flood-attacks-on-a-lan-test-bed-ieee-lcn-2023/</link>
					<comments>https://iotac.eu/nasereddin-m-nakip-m-gelenbe-e-2023-measurement-based-evaluation-and-mitigation-of-flood-attacks-on-a-lan-test-bed-ieee-lcn-2023/#respond</comments>
		
		<dc:creator><![CDATA[Mohammed Nasereddin, Mert Nakip and Erol Gelenbe, Institute of Theoretical and Applied Informatics (IITIS-PAN), Polish Academy of Sciences]]></dc:creator>
		<pubDate>Thu, 29 Jun 2023 11:14:49 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12554</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/nasereddin-m-nakip-m-gelenbe-e-2023-measurement-based-evaluation-and-mitigation-of-flood-attacks-on-a-lan-test-bed-ieee-lcn-2023/">Nasereddin M, Nakip M, Gelenbe E. 2023. Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed. IEEE LCN 2023.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5e0817642f"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=14yPwamUzz8R4JRCWwIPIXZC-Zy8BPT-L" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Conference:<br />
</strong>The 48th IEEE Conference on Local Computer Networks 2023 (IEEE  LCN 2023), 2-5 October 2023, Daytona Beach, Florida, USA.</p>
<p><strong>Authors:<br />
</strong> Nasereddin M, Nakip M, Gelenbe E.</p>
<p><strong>Abstract:<br />
</strong>The IoT is vulnerable to network attacks, and Intrusion Detection Systems (IDS) can provide high attack detection accuracy and are easily installed in IoT Servers. However, IDS are seldom evaluated in operational conditions which are seriously impaired by attack overload. Thus a Local Area Network test-bed  is used to evaluate the impact of UDP Flood Attacks on an IoT Server, whose first line of defence is an accurate IDS. We show that attacks overload the multi-core Server and paralyze its IDS. Thus a mitigation scheme that detects attacks rapidly, and drops packets within milli-seconds after the attack begins, is proposed and experimentally evaluated.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/nasereddin-m-nakip-m-gelenbe-e-2023-measurement-based-evaluation-and-mitigation-of-flood-attacks-on-a-lan-test-bed-ieee-lcn-2023/">Nasereddin M, Nakip M, Gelenbe E. 2023. Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed. IEEE LCN 2023.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/nasereddin-m-nakip-m-gelenbe-e-2023-measurement-based-evaluation-and-mitigation-of-flood-attacks-on-a-lan-test-bed-ieee-lcn-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gelenbe E, Nakip M. 2023. Real-Time Cyberattack Detection with Offline and Online Learning. IEEE LANMAN 2023.</title>
		<link>https://iotac.eu/gelenbe-e-nakip-m-2023-real-time-cyberattack-detection-with-offline-and-online-learning-ieee-lanman-2023/</link>
					<comments>https://iotac.eu/gelenbe-e-nakip-m-2023-real-time-cyberattack-detection-with-offline-and-online-learning-ieee-lanman-2023/#respond</comments>
		
		<dc:creator><![CDATA[Erol Gelenbe and Mert Nakip, IITIS-PAN]]></dc:creator>
		<pubDate>Fri, 26 May 2023 11:56:25 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12440</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2023-real-time-cyberattack-detection-with-offline-and-online-learning-ieee-lanman-2023/">Gelenbe E, Nakip M. 2023. Real-Time Cyberattack Detection with Offline and Online Learning. IEEE LANMAN 2023.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5e081768fc"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=1CwnqbVE7oKGnGrrasUaWeYCew98s70P6" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Conference:<br />
</strong>IEEE International Symposium on Local and Metropolitan Area Networks 2023 (IEEE  LANMAN 2023), 10-11 July 2023, London, UK.</p>
<p><strong>Authors:<br />
</strong>Gelenbe E, Nakip M.</p>
<p><strong>Abstract:<br />
</strong>This paper presents several novel algorithms for real-time cyberattack detection using the Auto-Associative Deep Random Neural Network. Some of these algorithms require offline learning, while others allow the algorithm to learn during its normal operation while it is also testing the flow of incoming traffic to detect possible attacks. Most of the methods we present are designed to be used at a single node, while one specific method collects data from multiple network ports to detect and monitor the spread of a Botnet. The evaluation of the accuracy of all these methods is carried out with real attack traces. The novel methods presented here are compared with other state-of-the-art approaches, showing that they offer better or equal performance, with lower learning times and shorter detection times, as compared to the existing state-of-the-art approaches.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2023-real-time-cyberattack-detection-with-offline-and-online-learning-ieee-lanman-2023/">Gelenbe E, Nakip M. 2023. Real-Time Cyberattack Detection with Offline and Online Learning. IEEE LANMAN 2023.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/gelenbe-e-nakip-m-2023-real-time-cyberattack-detection-with-offline-and-online-learning-ieee-lanman-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gelenbe E, Nakip M. 2022. Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices. IEEE Access. 2022.  Vol.10.</title>
		<link>https://iotac.eu/gelenbe-e-nakip-m-2022-traffic-based-sequential-learning-during-botnet-attacks-to-identify-compromised-iot-devices-ieee-access-2022-vol-10/</link>
					<comments>https://iotac.eu/gelenbe-e-nakip-m-2022-traffic-based-sequential-learning-during-botnet-attacks-to-identify-compromised-iot-devices-ieee-access-2022-vol-10/#respond</comments>
		
		<dc:creator><![CDATA[Erol Gelenbe and Mert Nakip, IITIS-PAN]]></dc:creator>
		<pubDate>Tue, 13 Dec 2022 16:30:59 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=10870</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2022-traffic-based-sequential-learning-during-botnet-attacks-to-identify-compromised-iot-devices-ieee-access-2022-vol-10/">Gelenbe E, Nakip M. 2022. Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices. IEEE Access. 2022.  Vol.10.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5e08176e11"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=1XKBRhR4VwH0ESyc9lUC0cVuwzkREOVZh" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Journal:<br />
</strong>IEEE Access 2022. Vol. 10.</p>
<p><strong>Authors:<br />
</strong>Gelenbe E, Nakip M.</p>
<p><strong>Abstract:<br />
</strong>A novel online Compromised Device Identification System (CDIS) is presented to identify IoT devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources and destinations that transmit packets. The method uses specific metrics that are selected for this purpose and which are easily extracted from network traffic, and trains itself online during normal operation with an Auto-Associative Dense Random Neural Network (AADRNN) using traffic metrics measured as traffic arrives. As it operates, the AADRNN is trained with auto-associative learning only using traffic that it estimates as being benign, without prior collection of different attack data. The experimental evaluation on publicly available Mirai Botnet attack data shows that CDIS achieves high performance with Balanced Accuracy of 97%, despite its low on-line training and execution time. Experimental comparisons show that the AADRNN with sequential (online) auto-associative learning, provides the best performance among six different state-of-the-art machine learning models. Thus CDIS can provide crucial effective information to prevent the spread of Botnet attacks in IoT networks having multiple devices and IP addresses.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/gelenbe-e-nakip-m-2022-traffic-based-sequential-learning-during-botnet-attacks-to-identify-compromised-iot-devices-ieee-access-2022-vol-10/">Gelenbe E, Nakip M. 2022. Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices. IEEE Access. 2022.  Vol.10.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/gelenbe-e-nakip-m-2022-traffic-based-sequential-learning-during-botnet-attacks-to-identify-compromised-iot-devices-ieee-access-2022-vol-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kalouptsoglou I, Tsoukalas D, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. 2022. Time Series Forecasting of Software Vulnerabilities Using Statistical and Deep Learning Models. Electronics 2022, 11(18), 2820.</title>
		<link>https://iotac.eu/time-series-forecasting-of-software-vulnerabilities-using-statistical-and-deep-learning-models-electronics/</link>
					<comments>https://iotac.eu/time-series-forecasting-of-software-vulnerabilities-using-statistical-and-deep-learning-models-electronics/#respond</comments>
		
		<dc:creator><![CDATA[Ilias Kalouptsoglou, Dimitrios Tsoukalas, Miltiadis Siavvas, Dionysios Kehagias, CERTH and Alexander Chatzigeorgiou, Apostolos Ampatzoglou, University of Macedonia]]></dc:creator>
		<pubDate>Fri, 09 Sep 2022 13:24:48 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=10227</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/time-series-forecasting-of-software-vulnerabilities-using-statistical-and-deep-learning-models-electronics/">Kalouptsoglou I, Tsoukalas D, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. 2022. Time Series Forecasting of Software Vulnerabilities Using Statistical and Deep Learning Models. Electronics 2022, 11(18), 2820.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5e08177322"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style=""  href="https://drive.google.com/uc?export=download&#038;id=1V4QNGgSmYq719eTO32Z0cu8Q7KK6l9Ih" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Journal:<br />
</strong>Electronics 2022, 11(18), 2820</p>
<p><strong>Authors:<br />
</strong>Kalouptsoglou I, Tsoukalas D, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A.</p>
<p><strong>Abstract:<br />
</strong>Software security is a critical aspect of modern software products. The vulnerabilities that reside in their source code could become a major weakness for enterprises that build or utilize these products, as their exploitation could lead to devastating financial consequences. Therefore, the development of mechanisms capable of identifying and discovering software vulnerabilities<br />
has recently attracted the interest of the research community. Besides the studies that examine software attributes in order to predict the existence of vulnerabilities in software components, there are also studies that attempt to predict the future number of vulnerabilities based on the already reported vulnerabilities of a project. In this paper, the evolution of vulnerabilities in a horizon of up to 24 months ahead is predicted using a univariate time series forecasting approach. Both statistical and deep learning models are developed and compared based on security data coming from five popular software projects. In contrast to related literature, the results indicate that the capacity of Deep Learning and statistical models in forecasting the evolution of software vulnerabilities, as well as the selection of the best-performing model, depends on the respective software project. In some cases, statistical models provided better accuracy, whereas in other cases, Deep Learning models demonstrated better predictive power. However, the difference in their performance was not found to be statistically significant. In general, the two model categories produced similar forecasts for the number of vulnerabilities expected in the future, without significant diversities.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/time-series-forecasting-of-software-vulnerabilities-using-statistical-and-deep-learning-models-electronics/">Kalouptsoglou I, Tsoukalas D, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. 2022. Time Series Forecasting of Software Vulnerabilities Using Statistical and Deep Learning Models. Electronics 2022, 11(18), 2820.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/time-series-forecasting-of-software-vulnerabilities-using-statistical-and-deep-learning-models-electronics/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
