Results 21 to 30 of about 574,096 (277)
Necessary detection efficiencies for secure quantum key distribution and bound randomness [PDF]
In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies.
Acín, Antonio +4 more
core +3 more sources
Detecting DDoS attacks with Hadoop [PDF]
Recent distributed denial-of-service (DDoS) attacks have demonstrated horrible destructive power by paralyzing web servers within short time. As the volume of Internet traffic rapidly grows up, the current DDoS detection technologies have met a new challenge that should efficiently deal with a huge amount of traffic within the affordable response time.
Yeonhee Lee, Youngseok Lee 0002
openaire +1 more source
G-IDCS: Graph-Based Intrusion Detection and Classification System for CAN Protocol
The security of in-vehicle networks has become an important issue as automobiles become more connected and automated. In this paper, we propose a graph-based intrusion detection and classification system, named G-IDCS, which aims to enhance the security ...
Sung Bum Park, Hyo Jin Jo, Dong Hoon Lee
doaj +1 more source
Modeling and detection of complex attacks [PDF]
A complex attack is a sequence of temporally and spatially separated legal and illegal actions each of which can be detected by various IDS but as a whole they constitute a powerful attack. IDS fall short of detecting and modeling complex attacks therefore new methods are required.
Seyit Ahmet Çamtepe, Bülent Yener
openaire +2 more sources
Detecting Attackable Sentences in Arguments [PDF]
EMNLP ...
Yohan Jo +4 more
openaire +2 more sources
Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems [PDF]
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the ...
Lakshminarayana, Subhash +3 more
core +2 more sources
Wormhole attack detection techniques in ad-hoc network: A systematic review
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different
Gupta Chitvan +2 more
doaj +1 more source
LSTM-Based Collaborative Source-Side DDoS Attack Detection
As denial of service attacks become more sophisticated, the source-side detection techniques are being studied to solve the limitations of target-side detection techniques such as delayed detection and difficulty in tracking attackers.
Sungwoong Yeom +2 more
doaj +1 more source
Detection of advanced persistent threat using machine-learning correlation analysis [PDF]
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to compromise the system and gain information from the ...
Aparicio-Navarro, F +6 more
core +6 more sources
Detection of Multi-Stage Attacks Through Attack Pattern Segmentation
Advanced cyberattack patterns threatening network assets employ various attack vectors, multi-stage attack processes, and diverse penetration strategies.
Seonghyeon Gong +2 more
doaj +1 more source

