Results 71 to 80 of about 6,155,073 (227)
This paper presents a detection algorithm for sensor attacks and a resilient state estimation scheme for a class of uniformly observable nonlinear systems. An adversary is supposed to corrupt a subset of sensors with the possibly unbounded signals, while
Eun, Yongsoon +4 more
core +1 more source
Unorganized malicious attacks detection [PDF]
Recommender system has attracted much attention during the past decade. However, collaborative filtering as a usual technique is vulnerable to malicious attacks that generate fake profiles to manipulate the system. Prior research has shown that attacks can significantly affect the robustness of the systems.
Ming PANG, Zhi-Hua ZHOU
openaire +1 more source
Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption
This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the
Gottesman +6 more
core +1 more source
A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I‐CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data ...
Meng Yue, Silin Peng, Wenzhi Feng
doaj +1 more source
Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine
Cyber physical systems (CPS), in the event of a cyber attack, can have a serious impact on the operating physical equipment. In order to improve the attack detection capability of CPS, an support vector machine (SVM) attacks detection model based on ...
Fengchun Liu +3 more
doaj +1 more source
A Comparison of Stealthy Sensor Attacks on Control Systems
As more attention is paid to security in the context of control systems and as attacks occur to real control systems throughout the world, it has become clear that some of the most nefarious attacks are those that evade detection.
aström +5 more
core +1 more source
An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System [PDF]
The integration of communication networks and the Internet of Things (IoT) in Industrial Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing devastating outcomes.
Abdulrahman Al-Abassi +3 more
semanticscholar +1 more source
Reducing the Time to Detect Cyber Attacks - Combining Attack Simulation With Detection Logic
Cyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are becoming more sophisticated and targeted, leaving unprepared environments easy prey for the attackers.
Myllyla, Juuso, Costin, Andrei
openaire +2 more sources
Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands.
Sheeraz Ahmed +7 more
doaj +1 more source
A robust intelligent zero-day cyber-attack detection technique
With the introduction of the Internet to the mainstream like e-commerce, online banking, health system and other day-to-day essentials, risk of being exposed to various are increasing exponentially. Zero-day attack(s) targeting unknown vulnerabilities of
Vikash Kumar, Ditipriya Sinha
semanticscholar +1 more source

