Results 11 to 20 of about 6,155,073 (227)
The absence of standards and the diverse nature of the Internet of Things (IoT) have made security and privacy concerns more acute. Attacks such as distributed denial of service (DDoS) are becoming increasingly widespread in IoT, and the need for ways to
Walid I. Khedr +2 more
semanticscholar +1 more source
With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them.
Hosam Aljihani +4 more
doaj +1 more source
Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS).
Jie Cao +5 more
doaj +1 more source
Data-Driven Cyber-Attack Detection of Intelligent Attacks in Islanded DC Microgrids
In this letter, a data-driven cyber-attack detection method for islanded dc microgrids is proposed. Data are collected by monitoring the behavior of an intelligent attacker who is able to bypass the conventional cyber-attack detection algorithms and ...
Yihao Wan, T. Dragičević
semanticscholar +1 more source
Spoofing Attack Detection by Anomaly Detection [PDF]
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this paper we focus on face spoofing detection. The majority of papers on spoofing attack detection formulate the problem as a two or multiclass learning task, attempting to separate normal accesses from samples of different types of spoofing attacks.
Fatemifar, Soroush +3 more
openaire +3 more sources
Detection of Iterative Adversarial Attacks via Counter Attack
AbstractDeep neural networks (DNNs) have proven to be powerful tools for processing unstructured data. However, for high-dimensional data, like images, they are inherently vulnerable to adversarial attacks. Small almost invisible perturbations added to the input can be used to fool DNNs.
Matthias Rottmann +4 more
openaire +4 more sources
A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection
Cyber attack detection technology plays a vital role today, since cyber attacks have been causing great harm and loss to organizations and individuals. Feature selection is a necessary step for many cyber-attack detection systems, because it can reduce ...
Yang Lyu, Yaokai Feng, K. Sakurai
semanticscholar +1 more source
FLAD: Adaptive Federated Learning for DDoS Attack Detection [PDF]
Federated Learning (FL) has been recently receiving increasing consideration from the cybersecurity community as a way to collaboratively train deep learning models with distributed profiles of cyber threats, with no disclosure of training data ...
R. D. Corin, D. Siracusa
semanticscholar +1 more source
Face Morphing, a Modern Threat to Border Security: Recent Advances and Open Challenges
Face morphing poses a serious threat to Automatic Border Control (ABC) and Face Recognition Systems (FRS) in general. The aim of this paper is to present a qualitative assessment of the morphing attack issue, and the challenges it entails, highlighting ...
Erion-Vasilis Pikoulis +3 more
doaj +1 more source
A review of Machine Learning-based zero-day attack detection: Challenges and future directions
Zero-day attacks exploit unknown vulnerabilities so as to avoid being detected by cybersecurity detection tools. The studies [1], [2], [3] show that zero-day attacks are wide spread and are one of the major threats to computer security.
Yang Guo
semanticscholar +1 more source

