Results 211 to 220 of about 61,083 (243)
End-to-end deep learning for smart maritime threat detection: an AE-CNN-LSTM-based approach. [PDF]
Anuja R, Annrose J.
europepmc +1 more source
Digital Twin-Driven Intrusion Detection for Industrial SCADA: A Cyber-Physical Case Study. [PDF]
Sayghe A.
europepmc +1 more source
Designing a neuro-symbolic dual-model architecture for explainable and resilient intrusion detection in IoT networks. [PDF]
Almadhor A +5 more
europepmc +1 more source
Intelligent cybersecurity management in industrial IoT system using attribute reduction with collaborative deep learning enabled false data injection attack detection approach. [PDF]
Alrashdi I, Duraibi S.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cyber Attack Detection using Deep Learning
Middle East Research Journal of Engineering and Technology, 2023Intrusion detection refers to the process of identifying unauthorized or malicious activities within a computer network or system. It involves monitoring network traffic, analyzing system logs, and employing various techniques to detect potential security breaches or attacks.
Aayush Kumar +3 more
openaire +1 more source
Clustering toward detecting cyber attacks
2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010Several anomaly methods have been proposed to cope with the recent booming of HTTP-related vulnerabilities which renders the security breaches of lots of vital HTTP-based services on the internet. This paper proposes a novel bottom-up agglomerative clustering method which not only spares the nuisance of a learning process that involves a big amount of ...
null Xiaofeng Yang +5 more
openaire +1 more source
Detection of complex cyber attacks
SPIE Proceedings, 2006One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed.
Ian Gregorio- de Souza +6 more
openaire +1 more source
New Electronics, 2020
ULTRASOC AND AGILE ANALOG WORK TO DETECT PHYSICAL CYBER-ATTACKS.
openaire +1 more source
ULTRASOC AND AGILE ANALOG WORK TO DETECT PHYSICAL CYBER-ATTACKS.
openaire +1 more source
Scalable Detection of Cyber Attacks
2011Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
ALBANESE M +3 more
openaire +2 more sources

