Results 271 to 280 of about 1,171,713 (299)
Some of the next articles are maybe not open access.
Gurukul International Multidisciplinary Research Journal
Introduction Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit.
openaire +1 more source
Introduction Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most cybercrime is committed by cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to damage computers or networks for reasons other than profit.
openaire +1 more source
Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques
Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2021A. Alzubi +2 more
semanticscholar +1 more source
Dark Sides of Cyber Attacks: Protection from the Assorted Cyber Attacks
Journal of Cyber Security, Privacy Issues and ChallengesCyber attacks have increased due to the quick development of digital communications, revealing a dark side where bad actors take advantage of system flaws to do serious damage. These assaults, which target people, businesses, and even governments, can take many different forms, such as ransomware, phishing, data breaches, and Advanced Persistent ...
S. Darshini +4 more
openaire +1 more source
In this article, we present a model of cyber attacks which can be used to represent a cyber attack in an intuitive and concise way. With ever-increasing popularities of online services, we have seen a growing number of cyber attacks targeted towards large online service providers as well as individuals and the IoT devices.
openaire +1 more source
openaire +1 more source
2016
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire +1 more source
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire +1 more source
Cyber-Attack Detection for Autonomous Driving Using Vehicle Dynamic State Estimation
Automotive Innovation, 2021Dong Zhang +3 more
semanticscholar +1 more source

