Results 1 to 10 of about 6,155,073 (227)
An attack detection method based on deep learning for internet of things [PDF]
With the rapid development of Internet of Things (IoT) technology, the number of network attack methods it faces is also increasing, and the malicious network traffic generated is growing exponentially.
Yihan Yu +4 more
doaj +2 more sources
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount.
Prof. Kaustubh Shinde +4 more
semanticscholar +2 more sources
A Distributed Denial of Service (DDoS) attack is an attempt to make a service unavailable by overwhelming the server with malicious traffic. DDoS attacks have become the most tedious and cumbersome issue in recent past.
Dhananjay Tangtode +4 more
semanticscholar +2 more sources
Audio-replay attack detection countermeasures [PDF]
This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017.
Kozlov, Alexander +5 more
core +2 more sources
Anomaly based multi-stage attack detection method. [PDF]
Multi-stage attacks are one of the most critical security threats in the current cyberspace. To accurately identify multi-stage attacks, this paper proposes an anomaly-based multi-stage attack detection method.
Wei Ma +3 more
doaj +2 more sources
Unknown presentation attack detection against rational attackers [PDF]
Abstract Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in realālife settings. Some of the challenges for the existing solutions are the detection of unknown attacks, the ability to perform in adversarial ...
Ali Khodabakhsh, Zahid Akhtar
openaire +3 more sources
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation [PDF]
Advanced Persistent Threats (APT) attacks have plagued modern enterprises, causing significant financial losses. To counter these attacks, researchers propose techniques that capture the complex and stealthy scenarios of APT attacks by using provenance ...
Shaofei Li +8 more
semanticscholar +1 more source
More than 5.1 billion Bluetooth-enabled devices were shipped in the year 2022 and this trend is expected to exceed 7.1 billion by the year 2026. A large proportion of these devices are used in smart homes designed for older adults, to help them age in place.
Nandikotkur, Achyuth +2 more
openaire +1 more source
The stability and reliability of filtration and recommender systems are crucial for continuous operation. The presence of fake profiles, known as “shilling attacks,” can undermine the reliability of these systems. Therefore, it is important
Reda A. Zayed +4 more
doaj +1 more source
Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing
Cloud computing is a vast revolution in information technology (IT) that inhibits scalable and virtualized sources to end users with low infrastructure cost and maintenance.
S. Balasubramaniam +6 more
semanticscholar +1 more source

