Results 31 to 40 of about 6,155,073 (227)

A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook

open access: yesItalian National Conference on Sensors, 2022
Recently, ransomware attacks have been among the major threats that target a wide range of Internet and mobile users throughout the world, especially critical cyber physical systems.
Abdullah Alqahtani, Frederick T. Sheldon
semanticscholar   +1 more source

HVAC system attack detection dataset

open access: yesData in Brief, 2021
The importance of the security of building management systems (BMSs) has increased given the advances in the technologies used. Since the Heating, Ventilation, and Air Conditioning (HVAC) system in buildings accounts for about 40% of the total energy consumption, threats targeting the HVAC system can be quite severe and costly. Given the limitations on
Mariam Elnour   +3 more
openaire   +3 more sources

LDoS attack detection method based on simple statistical features

open access: yesTongxin xuebao, 2022
Traditional low-rate denial of service (LDoS) attack detection methods were complex in feature extraction, high in computational cost, single in experimental data background settings, and outdated in attack scenarios, so it was difficult to meet the ...
Xueyuan DUAN, Yu FU, Kun WANG, Bin LI
doaj   +2 more sources

Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack

open access: yesApplied Sciences, 2023
According to the Fire-eye’s M-Trends Annual Threat Report 2022, there are many advanced persistent threat (APT) attacks that are currently in use, and such continuous and specialized APT attacks cause serious damages attacks.
Kyungroul Lee, Jaehyuk Lee, Kangbin Yim
doaj   +1 more source

Hybrid CNN and RNN-based shilling attack framework in social recommender networks [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2022
INTRODUCTION: Recommender system is considered to be widely utilized in diversified domain for the purpose of effectively handling information overload.
Praveena Narayanan, Vivekanandan. K
doaj   +1 more source

Detecting time-fragmented cache attacks against AES using Performance Monitoring Counters [PDF]

open access: yes, 2019
Cache timing attacks use shared caches in multi-core processors as side channels to extract information from victim processes. These attacks are particularly dangerous in cloud infrastructures, in which the deployed countermeasures cause collateral ...
AK Biswas   +8 more
core   +2 more sources

Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA

open access: yesIEEE Transactions on Dependable and Secure Computing, 2021
Industrial control systems (ICSs) are widely used and vital to industry and society. Their failure can have severe impact on both the economy and human life. Hence, these systems have become an attractive target for physical and cyber attacks alike.
Moshe Kravchik, A. Shabtai
semanticscholar   +1 more source

Attacks Generation by Detecting Attack Surfaces

open access: yesProcedia Computer Science, 2014
AbstractIn the development process of software and systems, one of the main challenges is to detect the existing attack surfaces and their exact related attacks. In this paper, we address the issue of generating attacks related to systems that are designed by using SysML activity diagrams.
Ouchani, Samir, Lenzini, Gabriele
openaire   +2 more sources

DDoS Attack Detection and Attacker Identification

open access: yesInternational Journal of Computer Applications, 2012
DDoS attack is a form of DoS attack in which attacker uses authorized user IP address to attack on a particular victim. Of the two types of attack it falls in the active category. The main aim of the attacker is to jam the resources in order to deny services to the recipient. The attacker can use several strategies to achieve this goal, one of which is
S. K. Jena, Brajesh Kashyap
openaire   +1 more source

Sequential Detection of Replay Attacks

open access: yesIEEE Transactions on Automatic Control, 2023
One of the most studied forms of attacks on the cyber-physical systems is the replay attack. The statistical similarities of the replay signal and the true observations make the replay attack difficult to detect. In this paper, we have addressed the problem of replay attack detection by adding watermarking to the control inputs and then performed ...
Arunava Naha   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy