Results 11 to 20 of about 6,155,073 (227)

FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN-Based IoT Networks

open access: yesIEEE Access, 2023
The absence of standards and the diverse nature of the Internet of Things (IoT) have made security and privacy concerns more acute. Attacks such as distributed denial of service (DDoS) are becoming increasingly widespread in IoT, and the need for ways to
Walid I. Khedr   +2 more
semanticscholar   +1 more source

Standalone Behaviour-Based Attack Detection Techniques for Distributed Software Systems via Blockchain

open access: yesApplied Sciences, 2021
With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them.
Hosam Aljihani   +4 more
doaj   +1 more source

Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning

open access: yesApplied Sciences, 2022
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS).
Jie Cao   +5 more
doaj   +1 more source

Data-Driven Cyber-Attack Detection of Intelligent Attacks in Islanded DC Microgrids

open access: yesIEEE transactions on industrial electronics (1982. Print), 2023
In this letter, a data-driven cyber-attack detection method for islanded dc microgrids is proposed. Data are collected by monitoring the behavior of an intelligent attacker who is able to bypass the conventional cyber-attack detection algorithms and ...
Yihao Wan, T. Dragičević
semanticscholar   +1 more source

Spoofing Attack Detection by Anomaly Detection [PDF]

open access: yesICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this paper we focus on face spoofing detection. The majority of papers on spoofing attack detection formulate the problem as a two or multiclass learning task, attempting to separate normal accesses from samples of different types of spoofing attacks.
Fatemifar, Soroush   +3 more
openaire   +3 more sources

Detection of Iterative Adversarial Attacks via Counter Attack

open access: yesJournal of Optimization Theory and Applications, 2023
AbstractDeep neural networks (DNNs) have proven to be powerful tools for processing unstructured data. However, for high-dimensional data, like images, they are inherently vulnerable to adversarial attacks. Small almost invisible perturbations added to the input can be used to fool DNNs.
Matthias Rottmann   +4 more
openaire   +4 more sources

A Survey on Feature Selection Techniques Based on Filtering Methods for Cyber Attack Detection

open access: yesInf., 2023
Cyber attack detection technology plays a vital role today, since cyber attacks have been causing great harm and loss to organizations and individuals. Feature selection is a necessary step for many cyber-attack detection systems, because it can reduce ...
Yang Lyu, Yaokai Feng, K. Sakurai
semanticscholar   +1 more source

FLAD: Adaptive Federated Learning for DDoS Attack Detection [PDF]

open access: yesComputers & security, 2022
Federated Learning (FL) has been recently receiving increasing consideration from the cybersecurity community as a way to collaboratively train deep learning models with distributed profiles of cyber threats, with no disclosure of training data ...
R. D. Corin, D. Siracusa
semanticscholar   +1 more source

Face Morphing, a Modern Threat to Border Security: Recent Advances and Open Challenges

open access: yesApplied Sciences, 2021
Face morphing poses a serious threat to Automatic Border Control (ABC) and Face Recognition Systems (FRS) in general. The aim of this paper is to present a qualitative assessment of the morphing attack issue, and the challenges it entails, highlighting ...
Erion-Vasilis Pikoulis   +3 more
doaj   +1 more source

A review of Machine Learning-based zero-day attack detection: Challenges and future directions

open access: yesComputer Communications, 2022
Zero-day attacks exploit unknown vulnerabilities so as to avoid being detected by cybersecurity detection tools. The studies [1], [2], [3] show that zero-day attacks are wide spread and are one of the major threats to computer security.
Yang Guo
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy