Results 211 to 220 of about 61,508 (265)

Guarding against malicious biased threats (GAMBiT) datasets: Revealing cognitive bias in human-subjects red-team cyber range operations. [PDF]

open access: yesData Brief
Beltz B   +11 more
europepmc   +1 more source

Quantum transfer learning for cross-domain cybersecurity threat detection and categorization. [PDF]

open access: yesSci Rep
Alsubai S   +6 more
europepmc   +1 more source

Cyber Attack Detection using Deep Learning

Middle East Research Journal of Engineering and Technology, 2023
Intrusion detection refers to the process of identifying unauthorized or malicious activities within a computer network or system. It involves monitoring network traffic, analyzing system logs, and employing various techniques to detect potential security breaches or attacks.
Aayush Kumar   +3 more
openaire   +1 more source

Clustering toward detecting cyber attacks

2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010
Several anomaly methods have been proposed to cope with the recent booming of HTTP-related vulnerabilities which renders the security breaches of lots of vital HTTP-based services on the internet. This paper proposes a novel bottom-up agglomerative clustering method which not only spares the nuisance of a learning process that involves a big amount of ...
null Xiaofeng Yang   +5 more
openaire   +1 more source

Detection of complex cyber attacks

SPIE Proceedings, 2006
One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed.
Ian Gregorio- de Souza   +6 more
openaire   +1 more source

Home - About - Disclaimer - Privacy