Results 1 to 10 of about 573,947 (128)

An attack detection method based on deep learning for internet of things [PDF]

open access: yesScientific Reports
With the rapid development of Internet of Things (IoT) technology, the number of network attack methods it faces is also increasing, and the malicious network traffic generated is growing exponentially.
Yihan Yu   +4 more
doaj   +2 more sources

Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack

open access: yesApplied Sciences, 2023
According to the Fire-eye’s M-Trends Annual Threat Report 2022, there are many advanced persistent threat (APT) attacks that are currently in use, and such continuous and specialized APT attacks cause serious damages attacks.
Kyungroul Lee, Jaehyuk Lee, Kangbin Yim
doaj   +3 more sources

Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network

open access: yesIEEE Access, 2020
As the Software Define Network (SDN) adopts centralized control logic, it is vulnerable to various types of Distributed Denial of Service (DDoS) attacks.
Wu Zhijun   +4 more
doaj   +3 more sources

Anomaly based multi-stage attack detection method. [PDF]

open access: yesPLoS ONE
Multi-stage attacks are one of the most critical security threats in the current cyberspace. To accurately identify multi-stage attacks, this paper proposes an anomaly-based multi-stage attack detection method.
Wei Ma   +3 more
doaj   +2 more sources

Experimental and Theoretical Study for the Popular Shilling Attacks Detection Methods in Collaborative Recommender System

open access: yesIEEE Access, 2023
The stability and reliability of filtration and recommender systems are crucial for continuous operation. The presence of fake profiles, known as “shilling attacks,” can undermine the reliability of these systems. Therefore, it is important
Reda A. Zayed   +4 more
doaj   +1 more source

Standalone Behaviour-Based Attack Detection Techniques for Distributed Software Systems via Blockchain

open access: yesApplied Sciences, 2021
With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them.
Hosam Aljihani   +4 more
doaj   +1 more source

Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning

open access: yesApplied Sciences, 2022
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS).
Jie Cao   +5 more
doaj   +1 more source

Face Morphing, a Modern Threat to Border Security: Recent Advances and Open Challenges

open access: yesApplied Sciences, 2021
Face morphing poses a serious threat to Automatic Border Control (ABC) and Face Recognition Systems (FRS) in general. The aim of this paper is to present a qualitative assessment of the morphing attack issue, and the challenges it entails, highlighting ...
Erion-Vasilis Pikoulis   +3 more
doaj   +1 more source

Machine Learning Methods for Attack Detection in the Smart Grid [PDF]

open access: yes, 2015
Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings.
Esnaola, Inaki   +4 more
core   +2 more sources

HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm

open access: yesApplied Computing and Informatics, 2019
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users.
Indraneel Sreeram   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy