Results 1 to 10 of about 178,776 (288)

An attack detection method based on deep learning for internet of things [PDF]

open access: yesScientific Reports
With the rapid development of Internet of Things (IoT) technology, the number of network attack methods it faces is also increasing, and the malicious network traffic generated is growing exponentially.
Yihan Yu   +4 more
doaj   +2 more sources

Controller Cyber-Attack Detection and Isolation. [PDF]

open access: yesSensors (Basel), 2023
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of
Sztyber-Betley A   +3 more
europepmc   +4 more sources

Anomaly based multi-stage attack detection method. [PDF]

open access: yesPLoS ONE
Multi-stage attacks are one of the most critical security threats in the current cyberspace. To accurately identify multi-stage attacks, this paper proposes an anomaly-based multi-stage attack detection method.
Wei Ma   +3 more
doaj   +2 more sources

Unknown presentation attack detection against rational attackers [PDF]

open access: yesIET Biometrics, 2021
Abstract Despite the impressive progress in the field of presentation attack detection and multimedia forensics over the last decade, these systems are still vulnerable to attacks in real‐life settings. Some of the challenges for the existing solutions are the detection of unknown attacks, the ability to perform in adversarial ...
Ali Khodabakhsh, Zahid Akhtar
openaire   +3 more sources

Detecting BrakTooth Attacks

open access: yesProceedings of the 20th International Conference on Security and Cryptography, 2023
More than 5.1 billion Bluetooth-enabled devices were shipped in the year 2022 and this trend is expected to exceed 7.1 billion by the year 2026. A large proportion of these devices are used in smart homes designed for older adults, to help them age in place.
Nandikotkur, Achyuth   +2 more
openaire   +1 more source

Experimental and Theoretical Study for the Popular Shilling Attacks Detection Methods in Collaborative Recommender System

open access: yesIEEE Access, 2023
The stability and reliability of filtration and recommender systems are crucial for continuous operation. The presence of fake profiles, known as “shilling attacks,” can undermine the reliability of these systems. Therefore, it is important
Reda A. Zayed   +4 more
doaj   +1 more source

Standalone Behaviour-Based Attack Detection Techniques for Distributed Software Systems via Blockchain

open access: yesApplied Sciences, 2021
With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them.
Hosam Aljihani   +4 more
doaj   +1 more source

Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning

open access: yesApplied Sciences, 2022
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS).
Jie Cao   +5 more
doaj   +1 more source

Spoofing Attack Detection by Anomaly Detection [PDF]

open access: yesICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this paper we focus on face spoofing detection. The majority of papers on spoofing attack detection formulate the problem as a two or multiclass learning task, attempting to separate normal accesses from samples of different types of spoofing attacks.
Fatemifar, Soroush   +3 more
openaire   +3 more sources

Detection of Iterative Adversarial Attacks via Counter Attack

open access: yesJournal of Optimization Theory and Applications, 2023
AbstractDeep neural networks (DNNs) have proven to be powerful tools for processing unstructured data. However, for high-dimensional data, like images, they are inherently vulnerable to adversarial attacks. Small almost invisible perturbations added to the input can be used to fool DNNs.
Matthias Rottmann   +4 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy