Results 211 to 220 of about 61,083 (243)

Cyber Attack Detection using Deep Learning

Middle East Research Journal of Engineering and Technology, 2023
Intrusion detection refers to the process of identifying unauthorized or malicious activities within a computer network or system. It involves monitoring network traffic, analyzing system logs, and employing various techniques to detect potential security breaches or attacks.
Aayush Kumar   +3 more
openaire   +1 more source

Clustering toward detecting cyber attacks

2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010
Several anomaly methods have been proposed to cope with the recent booming of HTTP-related vulnerabilities which renders the security breaches of lots of vital HTTP-based services on the internet. This paper proposes a novel bottom-up agglomerative clustering method which not only spares the nuisance of a learning process that involves a big amount of ...
null Xiaofeng Yang   +5 more
openaire   +1 more source

Detection of complex cyber attacks

SPIE Proceedings, 2006
One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed.
Ian Gregorio- de Souza   +6 more
openaire   +1 more source

Detecting Cyber-Attacks

New Electronics, 2020
ULTRASOC AND AGILE ANALOG WORK TO DETECT PHYSICAL CYBER-ATTACKS.
openaire   +1 more source

Scalable Detection of Cyber Attacks

2011
Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
ALBANESE M   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy