An intelligent hybrid approach combining fuzzy C-means and the sperm whale algorithm for cyber attack detection in IoT networks. [PDF]
Elsedimy EI, AboHashish SMM.
europepmc +1 more source
A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection. [PDF]
Dutta V, ChoraĆ M, Pawlicki M, Kozik R.
europepmc +1 more source
The Intersection of Machine Learning and Wireless Sensor Network Security for Cyber-Attack Detection: A Detailed Analysis. [PDF]
Delwar TS +7 more
europepmc +1 more source
How hospitals can protect themselves from cyber attack. [PDF]
Owens B.
europepmc +1 more source
When all computers shut down: the clinical impact of a major cyber-attack on a general hospital. [PDF]
Abbou B +9 more
europepmc +1 more source
Who Are The Greatest Cyber Attack Threats To The United States?: UNH Unveils Cyber Threat Calculator At National Defense Department Conference [PDF]
Wright, Lori
core +1 more source
A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm. [PDF]
Jyothi KK +8 more
europepmc +1 more source
Honeypots: Screening Cyber Attacks
M. I., Vanam Rajkumar, Adnaan Arbaaz
openaire +1 more source
Farida Chowdhury, Md Sadek Ferdous
openaire +1 more source
Nation-States and Their Operations in Planting of Malware in Other Countries: Is It Legal Under International Law [PDF]
Chung, John J.
core +1 more source

