Results 101 to 110 of about 6,155,073 (227)

Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism

open access: yesTongxin xuebao
In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenance ...
Yuancheng LI   +3 more
doaj   +2 more sources

Multi-type low-rate DDoS attack detection method based on hybrid deep learning

open access: yes网络与信息安全学报, 2022
Low-Rate distributed denial of service (DDoS) attack attacks the vulnerabilities in the adaptive mechanism of network protocols, posing a huge threat to the quality of network services.Low-Rate DDoS attack was characterized by high secrecy, low attack ...
Lijuan LI   +3 more
doaj  

Attack detection model for BCoT based on contrastive variational autoencoder and metric learning

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
With development of blockchain technology, clouding computing and Internet of Things (IoT), blockchain and cloud of things (BCoT) has become development tendency. But the security has become the most development hinder of BCoT.
Chunwang Wu   +6 more
doaj   +1 more source

Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples

open access: yesACM Transactions on Software Engineering and Methodology
As a new programming paradigm, deep learning (DL) has achieved impressive performance in areas such as image processing and speech recognition, and has expanded its application to solve many real-world problems. However, neural networks and DL are normally black-box systems; even worse, DL-based software are vulnerable to threats from ...
Zhe Zhao   +6 more
openaire   +2 more sources

Research on low-rate DDoS attack of SDN network in cloud environment

open access: yesTongxin xuebao, 2019
Aiming at the problems of low-rate DDoS attack detection accuracy in cloud SDN network and the lack of unified framework for data plane and control plane low-rate DDoS attack detection and defense,a unified framework for low-rate DDoS attack detection ...
Xingshu CHEN   +4 more
doaj   +2 more sources

A Security Study of Multimodel Artificial Intelligence System: Adaptive Retention Attack for Object Detection System with Multifocus Image Fusion Model

open access: yesAdvanced Intelligent Systems
Image preprocessing models are usually employed as the preceding operations of high‐level vision tasks to improve the performance. The adversarial attack technology makes both these models face severe challenges.
Xueshuai Gao   +6 more
doaj   +1 more source

IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection

open access: yes, 2019
As an important tool in security, the intrusion detection system bears the responsibility of the defense to network attacks performed by malicious traffic.
Lin, Zilong, Shi, Yong, Xue, Zhi
core  

A Systematic Literature Review of Current Research Trends in Operational and Related Technology Threats, Threat Detection, and Security Insurance

open access: yesApplied Sciences
The expansion of operation technology (OT) use and its tight integration with classical information and communication technologies have led not only to additional and improved possibilities in monitoring physical/manufacturing processes and the emergency
Nikolaj Goranin   +2 more
doaj   +1 more source

Defense Method for Smart Grid GPS Spoofing Attack Based on BiLSTM and Self-attention Mechanism Generative Adversarial Network

open access: yesZhongguo dianli
Phasor measurement unit (PMU) plays a crucial role in smart grids, enabling precise synchronized acquisition of electric power data. Due to the use of the global positioning system (GPS) for time synchronization, the PMU is vulnerable to GPS spoofing ...
Hui WU   +5 more
doaj   +1 more source

An Efficient Hybrid Approach Based on Deep Learning and Stacking Ensemble Using the Whale Optimization Algorithm for Detecting Attacks in IoT Devices

open access: yesEngineering Reports
With the increasing proliferation of the Internet of Things (IoT) and the rise of cyber‐attacks targeting these devices, the need for efficient attack detection methods has become increasingly urgent.
Reza Tavoli   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy