Results 111 to 120 of about 6,155,073 (227)

Efficient attack detection and data aggregation algorithm

open access: yesTongxin xuebao, 2012
An efficient algorithm of attack detection and data aggregation for wireless multimedia sensor networks based on the previous work was proposed.The proposed algorithm concludes the action trait of sensor nodes from their attribute vectors without any ...
Hong-bing CHENG   +4 more
doaj  

Exploit detection based on illegal control flow transfers identification

open access: yesTongxin xuebao, 2014
In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety ...
Ming-hua WANG   +2 more
doaj  

A dataset collected in real-world industrial control systems for network attack detection. [PDF]

open access: yesSci Data
Zhou X   +9 more
europepmc   +1 more source

Transparent and trustworthy CyberSecurity: an XAI-integrated big data framework for phishing attack detection. [PDF]

open access: yesFront Big Data
Nauman M   +4 more
europepmc   +1 more source

Biometric Presentation Attack Detection

open access: yesAmerican Journal of Computing and Engineering
Abstract   Purpose: Biometric systems play a crucial role in authentication and identification processes but are vulnerable to various attacks that compromise their security and reliability. Detecting such attacks is critical to ensuring the integrity of these systems and maintaining user trust.
openaire   +1 more source

Home - About - Disclaimer - Privacy