Results 151 to 160 of about 30,706 (186)
Some of the next articles are maybe not open access.

Detection of Cyber-Attacks

2016
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire   +1 more source

Machine Learning–based Cyber Attacks Targeting on Controlled Information

ACM Computing Surveys, 2022
Chao Chen, Lei Pan, Qing-Long Han
exaly  

New forms of cyber Attacks

SSRN Electronic Journal, 2023
Philippe Jougleux   +2 more
openaire   +1 more source

Current Cyber Attack Methods

2006
Understand that cyber attacks are not random but instead are executed with deliberate intent and specific purpose. Ö Identify many of the internal penetration approaches to achieve security breaches. Ö Discover the most common external penetration tactics directed against systems. Ö Come to realize the part that people play in the breach of systems.
openaire   +1 more source

Security and Privacy in the Emerging Cyber-Physical World: A Survey

IEEE Communications Surveys and Tutorials, 2021
Zhiyuan Yu, Zack Kaplan, Qiben Yan
exaly  

Cybersecurity of Industrial Cyber-Physical Systems: A Review

ACM Computing Surveys, 2022
Hakan Kayan, Omer F Rana, Pete Burnap
exaly  

Cyber attacks: awareness

Network Security, 2011
openaire   +1 more source

Targeted Cyber-attacks

Network Security, 2014
openaire   +2 more sources

Differential Privacy Techniques for Cyber Physical Systems: A Survey

IEEE Communications Surveys and Tutorials, 2020
Muneeb Ul Hassan   +2 more
exaly  

Home - About - Disclaimer - Privacy