Results 271 to 280 of about 1,171,713 (299)
Some of the next articles are maybe not open access.

Understanding Cyber-Attacks

Gurukul International Multidisciplinary Research Journal
Introduction Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit.
openaire   +1 more source

Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques

Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2021
A. Alzubi   +2 more
semanticscholar   +1 more source

Dark Sides of Cyber Attacks: Protection from the Assorted Cyber Attacks

Journal of Cyber Security, Privacy Issues and Challenges
Cyber attacks have increased due to the quick development of digital communications, revealing a dark side where bad actors take advantage of system flaws to do serious damage. These assaults, which target people, businesses, and even governments, can take many different forms, such as ransomware, phishing, data breaches, and Advanced Persistent ...
S. Darshini   +4 more
openaire   +1 more source

Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System

IEEE Transactions on Industrial Informatics, 2021
K. Lu   +5 more
semanticscholar   +1 more source

Cyber Attacks

Computers & Security, 2012
openaire   +1 more source

MODELLING CYBER ATTACKS

In this article, we present a model of cyber attacks which can be used to represent a cyber attack in an intuitive and concise way. With ever-increasing popularities of online services, we have seen a growing number of cyber attacks targeted towards large online service providers as well as individuals and the IoT devices.
openaire   +1 more source

Detection of Cyber-Attacks

2016
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire   +1 more source

Cyber-Attack Detection for Autonomous Driving Using Vehicle Dynamic State Estimation

Automotive Innovation, 2021
Dong Zhang   +3 more
semanticscholar   +1 more source

New forms of cyber Attacks

SSRN Electronic Journal, 2023
Philippe Jougleux   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy