Results 151 to 160 of about 30,706 (186)
Some of the next articles are maybe not open access.
2016
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire +1 more source
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire +1 more source
Machine Learning–based Cyber Attacks Targeting on Controlled Information
ACM Computing Surveys, 2022Chao Chen, Lei Pan, Qing-Long Han
exaly
2006
Understand that cyber attacks are not random but instead are executed with deliberate intent and specific purpose. Ö Identify many of the internal penetration approaches to achieve security breaches. Ö Discover the most common external penetration tactics directed against systems. Ö Come to realize the part that people play in the breach of systems.
openaire +1 more source
Understand that cyber attacks are not random but instead are executed with deliberate intent and specific purpose. Ö Identify many of the internal penetration approaches to achieve security breaches. Ö Discover the most common external penetration tactics directed against systems. Ö Come to realize the part that people play in the breach of systems.
openaire +1 more source
Security and Privacy in the Emerging Cyber-Physical World: A Survey
IEEE Communications Surveys and Tutorials, 2021Zhiyuan Yu, Zack Kaplan, Qiben Yan
exaly
Cybersecurity of Industrial Cyber-Physical Systems: A Review
ACM Computing Surveys, 2022Hakan Kayan, Omer F Rana, Pete Burnap
exaly
Differential Privacy Techniques for Cyber Physical Systems: A Survey
IEEE Communications Surveys and Tutorials, 2020Muneeb Ul Hassan +2 more
exaly

