Results 1 to 10 of about 61,083 (243)

Controller Cyber-Attack Detection and Isolation [PDF]

open access: yesSensors, 2023
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively
Anna Sztyber-Betley   +3 more
doaj   +4 more sources

Algorithm Selection Framework for Cyber Attack Detection [PDF]

open access: yesProceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.
Ajmera Aman   +15 more
core   +2 more sources

Data mining based cyber-attack detection [PDF]

open access: yesSystem Simulation Technology, 2017
Detecting cyber-attacks undoubtedly has become a big data problem. This paper presents a tutorial on data mining based cyber-attack detection. First, a data driven defence framework is presented in terms of cyber security situational awareness. Then, the process of data mining based cyber-attack detection is discussed.
Tianfield, Huaglory
core   +2 more sources

Markov Model of Cyber Attack Life Cycle Triggered by Software Vulnerability [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be ...
Romuald Hoffmann
doaj   +1 more source

Cyber-attack method and perpetrator prediction using machine learning algorithms [PDF]

open access: yesPeerJ Computer Science, 2021
Cyber-attacks have become one of the biggest problems of the world. They cause serious financial damages to countries and people every day. The increase in cyber-attacks also brings along cyber-crime.
Abdulkadir Bilen, Ahmet Bedri Özer
doaj   +2 more sources

Experimental Cyber Attack Detection Framework [PDF]

open access: yesElectronics, 2021
Digital security plays an ever-increasing, crucial role in today’s information-based society. The variety of threats and attack patterns has dramatically increased with the advent of digital transformation in our lives. Researchers in both public and private sectors have tried to identify new means to counteract these threats, seeking out-of-the-box ...
Cătălin Mironeanu   +3 more
openaire   +1 more source

Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks

open access: yesIEEE Access, 2023
Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks.
Athanasios Dimitriadis   +5 more
doaj   +1 more source

Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning

open access: yesApplied Sciences, 2022
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS).
Jie Cao   +5 more
doaj   +1 more source

False Data Injection Attack Detection in Power Systems Based on Cyber-Physical Attack Genes

open access: yesFrontiers in Energy Research, 2021
In the process of the detection of a false data injection attack (FDIA) in power systems, there are problems of complex data features and low detection accuracy.
Zhaoyang Qu   +10 more
doaj   +1 more source

An Ensemble Approach for Cyber Attack Detection System: A Generic Framework [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources.
Shailendra Singh, Sanjay Silakari
doaj   +1 more source

Home - About - Disclaimer - Privacy