Results 21 to 30 of about 574,096 (277)

Necessary detection efficiencies for secure quantum key distribution and bound randomness [PDF]

open access: yes, 2016
In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies.
Acín, Antonio   +4 more
core   +3 more sources

Detecting DDoS attacks with Hadoop [PDF]

open access: yesProceedings of The ACM CoNEXT Student Workshop, 2011
Recent distributed denial-of-service (DDoS) attacks have demonstrated horrible destructive power by paralyzing web servers within short time. As the volume of Internet traffic rapidly grows up, the current DDoS detection technologies have met a new challenge that should efficiently deal with a huge amount of traffic within the affordable response time.
Yeonhee Lee, Youngseok Lee 0002
openaire   +1 more source

G-IDCS: Graph-Based Intrusion Detection and Classification System for CAN Protocol

open access: yesIEEE Access, 2023
The security of in-vehicle networks has become an important issue as automobiles become more connected and automated. In this paper, we propose a graph-based intrusion detection and classification system, named G-IDCS, which aims to enhance the security ...
Sung Bum Park, Hyo Jin Jo, Dong Hoon Lee
doaj   +1 more source

Modeling and detection of complex attacks [PDF]

open access: yes2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007, 2007
A complex attack is a sequence of temporally and spatially separated legal and illegal actions each of which can be detected by various IDS but as a whole they constitute a powerful attack. IDS fall short of detecting and modeling complex attacks therefore new methods are required.
Seyit Ahmet Çamtepe, Bülent Yener
openaire   +2 more sources

Detecting Attackable Sentences in Arguments [PDF]

open access: yesProceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP), 2020
EMNLP ...
Yohan Jo   +4 more
openaire   +2 more sources

Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems [PDF]

open access: yes, 2017
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the ...
Lakshminarayana, Subhash   +3 more
core   +2 more sources

Wormhole attack detection techniques in ad-hoc network: A systematic review

open access: yesOpen Computer Science, 2022
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different
Gupta Chitvan   +2 more
doaj   +1 more source

LSTM-Based Collaborative Source-Side DDoS Attack Detection

open access: yesIEEE Access, 2022
As denial of service attacks become more sophisticated, the source-side detection techniques are being studied to solve the limitations of target-side detection techniques such as delayed detection and difficulty in tracking attackers.
Sungwoong Yeom   +2 more
doaj   +1 more source

Detection of advanced persistent threat using machine-learning correlation analysis [PDF]

open access: yes, 2018
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to compromise the system and gain information from the ...
Aparicio-Navarro, F   +6 more
core   +6 more sources

Detection of Multi-Stage Attacks Through Attack Pattern Segmentation

open access: yesIEEE Access
Advanced cyberattack patterns threatening network assets employ various attack vectors, multi-stage attack processes, and diverse penetration strategies.
Seonghyeon Gong   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy