Results 21 to 30 of about 178,776 (288)

Detecting Bioterror Attack

open access: yesEmerging Infectious Diseases, 2004
To the Editor: In a recent article (1), Kaplan et al. addressed the problems in detecting a bioterror attack from blood-donor screening. The main point of this comment is the "early approximation" used by Kaplan et al. to derive the probability of detecting an attack. The simplification used by Kaplan et al. leads to a probability that does not account
Edward H. Kaplan, Lawrence M. Wein
openaire   +5 more sources

G-IDCS: Graph-Based Intrusion Detection and Classification System for CAN Protocol

open access: yesIEEE Access, 2023
The security of in-vehicle networks has become an important issue as automobiles become more connected and automated. In this paper, we propose a graph-based intrusion detection and classification system, named G-IDCS, which aims to enhance the security ...
Sung Bum Park, Hyo Jin Jo, Dong Hoon Lee
doaj   +1 more source

LSTM-Based Collaborative Source-Side DDoS Attack Detection

open access: yesIEEE Access, 2022
As denial of service attacks become more sophisticated, the source-side detection techniques are being studied to solve the limitations of target-side detection techniques such as delayed detection and difficulty in tracking attackers.
Sungwoong Yeom   +2 more
doaj   +1 more source

Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network

open access: yesIEEE Access, 2020
As the Software Define Network (SDN) adopts centralized control logic, it is vulnerable to various types of Distributed Denial of Service (DDoS) attacks.
Wu Zhijun   +4 more
doaj   +1 more source

Wormhole attack detection techniques in ad-hoc network: A systematic review

open access: yesOpen Computer Science, 2022
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different
Gupta Chitvan   +2 more
doaj   +1 more source

Detection of Multi-Stage Attacks Through Attack Pattern Segmentation

open access: yesIEEE Access
Advanced cyberattack patterns threatening network assets employ various attack vectors, multi-stage attack processes, and diverse penetration strategies.
Seonghyeon Gong   +2 more
doaj   +1 more source

Integrated Replay Spoofing-Aware Text-Independent Speaker Verification

open access: yesApplied Sciences, 2020
A number of studies have successfully developed speaker verification or presentation attack detection systems. However, studies integrating the two tasks remain in the preliminary stages.
Hye-jin Shim   +3 more
doaj   +1 more source

A false data attack detection method for power grid based on an improved AIGA

open access: yesZhejiang dianli, 2023
As a typical cyber-physical attack, false data are measured unchanged, thus deceiving the detection based on chi-square detector. To this end, a false data attack detection method for smart grid based on an improved adaptive immune genetic algorithm ...
WANG Xinyu   +4 more
doaj   +1 more source

Situation Awareness Assessment Approach Based on Attack Traffic and System Vulnerabilities

open access: yesShuju Caiji Yu Chuli
Network security situation assessment plays an important role in the design and implementation of network defense strategies. The existing situation assessment methods gather the information of both attack and defense to construct an assessment model ...
LI Yan   +4 more
doaj   +1 more source

Multi-Step Attack Detection Based on Pre-Trained Hidden Markov Models

open access: yesSensors, 2022
Currently, hidden Markov-based multi-step attack detection models are mainly trained using the unsupervised Baum–Welch algorithm. The Baum–Welch algorithm is sensitive to the initial values of model parameters.
Xu Zhang   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy