Results 131 to 140 of about 30,706 (186)
Practical Predefined-Time Sliding-Mode Adaptive Resilient Control for PMSM Cyber-Physical Systems. [PDF]
Wang Z, Zhang S, Jiang Y, Yin C.
europepmc +1 more source
Cybersecurity as it relates to perfusion. [PDF]
Lung K.
europepmc +1 more source
Cyber-resilient machine learning framework for accurate individual load forecasting and anomaly detection in smart grids. [PDF]
Tayseer M +8 more
europepmc +1 more source
ACO-tuned randomized decision tree for detecting cyber threats in mobile web applications. [PDF]
Aljohani A.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Communications of the ACM, 2010
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire +1 more source
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire +1 more source
International Journal of Knowledge-based and Intelligent Engineering Systems, 2018
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally.
Sibi Chakkaravarthy, S. +4 more
openaire +1 more source
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally.
Sibi Chakkaravarthy, S. +4 more
openaire +1 more source
New Electronics, 2020
ULTRASOC AND AGILE ANALOG WORK TO DETECT PHYSICAL CYBER-ATTACKS.
openaire +1 more source
ULTRASOC AND AGILE ANALOG WORK TO DETECT PHYSICAL CYBER-ATTACKS.
openaire +1 more source
2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), 2017
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire +1 more source
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now.
openaire +1 more source
Scalable Detection of Cyber Attacks
2011Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
ALBANESE M +3 more
openaire +2 more sources
2016
The first step in preventing a cyber-attack is to make sure that staff members are educated about potential threats, many of which arrive in their inbox. Hospitals are encouraged to enforce preventive behaviors that will benefit their entire network. Basic cyber-hygiene training of the workforce is a necessity.
openaire +1 more source
The first step in preventing a cyber-attack is to make sure that staff members are educated about potential threats, many of which arrive in their inbox. Hospitals are encouraged to enforce preventive behaviors that will benefit their entire network. Basic cyber-hygiene training of the workforce is a necessity.
openaire +1 more source

