Results 1 to 10 of about 573,947 (128)
An attack detection method based on deep learning for internet of things [PDF]
With the rapid development of Internet of Things (IoT) technology, the number of network attack methods it faces is also increasing, and the malicious network traffic generated is growing exponentially.
Yihan Yu +4 more
doaj +2 more sources
Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack
According to the Fire-eye’s M-Trends Annual Threat Report 2022, there are many advanced persistent threat (APT) attacks that are currently in use, and such continuous and specialized APT attacks cause serious damages attacks.
Kyungroul Lee, Jaehyuk Lee, Kangbin Yim
doaj +3 more sources
Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network
As the Software Define Network (SDN) adopts centralized control logic, it is vulnerable to various types of Distributed Denial of Service (DDoS) attacks.
Wu Zhijun +4 more
doaj +3 more sources
Anomaly based multi-stage attack detection method. [PDF]
Multi-stage attacks are one of the most critical security threats in the current cyberspace. To accurately identify multi-stage attacks, this paper proposes an anomaly-based multi-stage attack detection method.
Wei Ma +3 more
doaj +2 more sources
The stability and reliability of filtration and recommender systems are crucial for continuous operation. The presence of fake profiles, known as “shilling attacks,” can undermine the reliability of these systems. Therefore, it is important
Reda A. Zayed +4 more
doaj +1 more source
With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them.
Hosam Aljihani +4 more
doaj +1 more source
Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS).
Jie Cao +5 more
doaj +1 more source
Face Morphing, a Modern Threat to Border Security: Recent Advances and Open Challenges
Face morphing poses a serious threat to Automatic Border Control (ABC) and Face Recognition Systems (FRS) in general. The aim of this paper is to present a qualitative assessment of the morphing attack issue, and the challenges it entails, highlighting ...
Erion-Vasilis Pikoulis +3 more
doaj +1 more source
Machine Learning Methods for Attack Detection in the Smart Grid [PDF]
Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings.
Esnaola, Inaki +4 more
core +2 more sources
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users.
Indraneel Sreeram +1 more
doaj +1 more source

