Notice Board :

Call for Paper
Vol. 13 Issue 2

Submission Start Date:
February 01, 2026

Acceptence Notification Start:
February 10, 2026

Submission End:
February 28, 2026

Final MenuScript Due:
March 05, 2026

Publication Date:
March 10, 2026
                         Notice Board: Call for PaperVol. 13 Issue 2      Submission Start Date: February 01, 2026      Acceptence Notification Start: February 10, 2026      Submission End: February 28, 2026      Final MenuScript Due: March 05, 2026      Publication Date: March 10, 2026




Volume XII Issue III

Author Name
Nikhil Chaurasia, Dr. Pritaj Yadav, Dr. Sanjeev kumar Gupta
Year Of Publication
2025
Volume and Issue
Volume 12 Issue 3
Abstract
The profound integration of informatisation and industrialization is amplifying security concerns regarding digital twins within industrial IoT (IIoT) network protocols. Current techniques for detecting vulnerabilities in network protocols, primarily based on feature mutation and fuzz testing, encounter drawbacks including reliance on expert experience and incapacity to address unknown protocols. This work concentrates on the automated analysis and formulation of vulnerability detection algorithms to tackle the issues of vulnerability detection for digital twins in IIoT protocols. A method for detecting network protocol vulnerabilities is proposed, utilising a combination of Generative Adversarial Networks (GANs) and mutation algorithms. A network protocol analysis model utilising GANs is employed to thoroughly extract information from message sequences, delineate message formats and associated attributes, and ascertain the structure of the network protocol.
PaperID
2025/IJTRM/03/2025/45510