Results 1 to 10 of about 6,155,073 (227)

An attack detection method based on deep learning for internet of things [PDF]

open access: yesScientific Reports
With the rapid development of Internet of Things (IoT) technology, the number of network attack methods it faces is also increasing, and the malicious network traffic generated is growing exponentially.
Yihan Yu   +4 more
doaj   +2 more sources

Cyber Attack Detection

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount.
Prof. Kaustubh Shinde   +4 more
semanticscholar   +2 more sources

DDOS Attack Detection

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology
A Distributed Denial of Service (DDoS) attack is an attempt to make a service unavailable by overwhelming the server with malicious traffic. DDoS attacks have become the most tedious and cumbersome issue in recent past.
Dhananjay Tangtode   +4 more
semanticscholar   +2 more sources

Audio-replay attack detection countermeasures [PDF]

open access: yes, 2017
This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017.
Kozlov, Alexander   +5 more
core   +2 more sources

Anomaly based multi-stage attack detection method. [PDF]

open access: yesPLoS ONE
Multi-stage attacks are one of the most critical security threats in the current cyberspace. To accurately identify multi-stage attacks, this paper proposes an anomaly-based multi-stage attack detection method.
Wei Ma   +3 more
doaj   +2 more sources

Unknown presentation attack detection against rational attackers [PDF]

open access: yesIET Biometrics, 2021
Abstract Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real‐life settings. Some of the challenges for the existing solutions are the detection of unknown attacks, the ability to perform in adversarial ...
Ali Khodabakhsh, Zahid Akhtar
openaire   +3 more sources

NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation [PDF]

open access: yesNetwork and Distributed System Security Symposium, 2023
Advanced Persistent Threats (APT) attacks have plagued modern enterprises, causing significant financial losses. To counter these attacks, researchers propose techniques that capture the complex and stealthy scenarios of APT attacks by using provenance ...
Shaofei Li   +8 more
semanticscholar   +1 more source

Detecting BrakTooth Attacks

open access: yesProceedings of the 20th International Conference on Security and Cryptography, 2023
More than 5.1 billion Bluetooth-enabled devices were shipped in the year 2022 and this trend is expected to exceed 7.1 billion by the year 2026. A large proportion of these devices are used in smart homes designed for older adults, to help them age in place.
Nandikotkur, Achyuth   +2 more
openaire   +1 more source

Experimental and Theoretical Study for the Popular Shilling Attacks Detection Methods in Collaborative Recommender System

open access: yesIEEE Access, 2023
The stability and reliability of filtration and recommender systems are crucial for continuous operation. The presence of fake profiles, known as “shilling attacks,” can undermine the reliability of these systems. Therefore, it is important
Reda A. Zayed   +4 more
doaj   +1 more source

Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing

open access: yesInternational Journal of Intelligent Systems, 2023
Cloud computing is a vast revolution in information technology (IT) that inhibits scalable and virtualized sources to end users with low infrastructure cost and maintenance.
S. Balasubramaniam   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy