Results 181 to 190 of about 6,155,073 (227)
Some of the next articles are maybe not open access.
Adaptive Hierarchical Cyber Attack Detection and Localization in Active Distribution Systems
IEEE Transactions on Smart Grid, 2022Development of a cyber security strategy for the active distribution systems is challenging due to the inclusion of distributed renewable energy generations.
Qi Li +5 more
semanticscholar +1 more source
New Electronics, 2020
ULTRASOC AND AGILE ANALOG WORK TO DETECT PHYSICAL CYBER-ATTACKS.
openaire +1 more source
ULTRASOC AND AGILE ANALOG WORK TO DETECT PHYSICAL CYBER-ATTACKS.
openaire +1 more source
DDoS attack detection and wavelets
Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712), 2004This paper presents a systematic method for DDoS attack detection. DDoS attack can be considered a system anomaly or misuse from which abnormal behavior is imposed on network traffic. Attack detection can be performed via abnormal behavior identification.
Lan Li, Gyungho Lee
openaire +1 more source
2014
User spoofing has a serious impact to the normal operation of wireless and sensor networks. It is thus desirable to detect the presence of identity-based attacks and eliminate them from the network. The traditional approach to address identity-based attacks is to apply cryptographic authentication.
Jie Yang +3 more
openaire +1 more source
User spoofing has a serious impact to the normal operation of wireless and sensor networks. It is thus desirable to detect the presence of identity-based attacks and eliminate them from the network. The traditional approach to address identity-based attacks is to apply cryptographic authentication.
Jie Yang +3 more
openaire +1 more source
2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the ...
Muhammet Baykara, Zahit Ziya Gurel
openaire +1 more source
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the ...
Muhammet Baykara, Zahit Ziya Gurel
openaire +1 more source
A Distributed Deep Learning System for Web Attack Detection on Edge Devices
IEEE Transactions on Industrial Informatics, 2020With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further processing.
Zhihong Tian +4 more
semanticscholar +1 more source
2013
In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.
openaire +1 more source
In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.
openaire +1 more source
Scalable Detection of Cyber Attacks
2011Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
ALBANESE M +3 more
openaire +2 more sources
Zero-day attack detection: a systematic literature review
Artificial Intelligence Review, 2023Rasheed Ahmad +3 more
semanticscholar +1 more source
SIP Stealthy Attack Detection and Resource-Drained Malformed Message Attack Detection
2013In this chapter, we first address the stealthy attack, where intelligent attackers can afford a long time to attack the system, and only incur minor changes to the system within each sampling period. To identify such attacks in the early stage for timely responses, we propose a detection scheme based on the signal processing technique wavelet, which is
Jin Tang, Yu Cheng
openaire +1 more source

