Results 251 to 260 of about 574,096 (277)
Some of the next articles are maybe not open access.
Detecting DNS Amplification Attacks
2008DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS response messages may be substantially larger than DNS query messages. In this paper, we present and evaluate a novel and practical method that is able to distinguish between
Georgios Kambourakis +3 more
openaire +1 more source
An attack-norm separation approach for detecting cyber attacks
Information Systems Frontiers, 2006The two existing approaches to detecting cyber attacks on computers and networks, signature recognition and anomaly detection, have shortcomings related to the accuracy and efficiency of detection. This paper describes a new approach to cyber attack (intrusion) detection that aims to overcome these shortcomings through several innovations.
Nong Ye +2 more
openaire +1 more source
The generation of XSS attacks developing in the detect detection
2016In recent years, the web security events emerge in endlessly, web security has been widely concerned. Cross-site scripting (XSS) attack is one of the most foremost threats which using malicious scripts injected into Web applications and executing the scripts in the client browsers.
Baojiang Cui +3 more
openaire +1 more source
An Intrusion Detection System for Detecting Phishing Attacks
2007In this paper we present a hybrid system to protect private data from phishing attacks. Our solution uses intrusion detection methods to identify potential phishing emails then relies on web crawlers to validate or reject this suspicion. We also use external information coming through RDF Site Summaries (RSS) alerts about potential phishing sites.
Hasika Pamunuwa +2 more
openaire +1 more source
Data-Driven Cyber-Attack Detection of Intelligent Attacks in Islanded DC Microgrids
IEEE Transactions on Industrial Electronics, 2023Yihao Wan, Tomislav Dragicevic
exaly
Sparse Actuator Attack Detection and Identification: A Data-Driven Approach
IEEE Transactions on Cybernetics, 2023Zhengen Zhao, Yunsong Xu, Yuzhe Li
exaly
Cyber attack estimation and detection for cyber-physical power systems
Applied Mathematics and Computation, 2021WenTing Wang, Jian Li
exaly
Detection, estimation, and compensation of false data injection attack for UAVs
Information Sciences, 2021Xiang Yu, Jianzhong Qiao
exaly

