Results 71 to 80 of about 6,155,073 (227)

Detection of Sensor Attack and Resilient State Estimation for Uniformly Observable Nonlinear Systems having Redundant Sensors

open access: yes, 2018
This paper presents a detection algorithm for sensor attacks and a resilient state estimation scheme for a class of uniformly observable nonlinear systems. An adversary is supposed to corrupt a subset of sensors with the possibly unbounded signals, while
Eun, Yongsoon   +4 more
core   +1 more source

Unorganized malicious attacks detection [PDF]

open access: yesSCIENTIA SINICA Informationis, 2018
Recommender system has attracted much attention during the past decade. However, collaborative filtering as a usual technique is vulnerable to malicious attacks that generate fake profiles to manipulate the system. Prior research has shown that attacks can significantly affect the robustness of the systems.
Ming PANG, Zhi-Hua ZHOU
openaire   +1 more source

Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption

open access: yes, 2015
This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the
Gottesman   +6 more
core   +1 more source

MF‐RF: A detection approach based on multi‐features and random forest algorithm for improved collusive interest flooding attack

open access: yesIET Information Security, 2023
A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I‐CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data ...
Meng Yue, Silin Peng, Wenzhi Feng
doaj   +1 more source

Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine

open access: yesMathematics, 2022
Cyber physical systems (CPS), in the event of a cyber attack, can have a serious impact on the operating physical equipment. In order to improve the attack detection capability of CPS, an support vector machine (SVM) attacks detection model based on ...
Fengchun Liu   +3 more
doaj   +1 more source

A Comparison of Stealthy Sensor Attacks on Control Systems

open access: yes, 2017
As more attention is paid to security in the context of control systems and as attacks occur to real control systems throughout the world, it has become clear that some of the most nefarious attacks are those that evade detection.
aström   +5 more
core   +1 more source

An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System [PDF]

open access: yesIEEE Access, 2020
The integration of communication networks and the Internet of Things (IoT) in Industrial Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing devastating outcomes.
Abdulrahman Al-Abassi   +3 more
semanticscholar   +1 more source

Reducing the Time to Detect Cyber Attacks - Combining Attack Simulation With Detection Logic

open access: yes, 2021
Cyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are becoming more sophisticated and targeted, leaving unprepared environments easy prey for the attackers.
Myllyla, Juuso, Costin, Andrei
openaire   +2 more sources

Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron

open access: yesFuture Internet, 2023
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands.
Sheeraz Ahmed   +7 more
doaj   +1 more source

A robust intelligent zero-day cyber-attack detection technique

open access: yesComplex & Intelligent Systems, 2021
With the introduction of the Internet to the mainstream like e-commerce, online banking, health system and other day-to-day essentials, risk of being exposed to various are increasing exponentially. Zero-day attack(s) targeting unknown vulnerabilities of
Vikash Kumar, Ditipriya Sinha
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy