Results 211 to 220 of about 61,508 (265)
Weighted average algorithm adjusted a novel (1 + FOPI)-FOPI-TID controller structure for AGC with integration of non-linearities and cyber-attack. [PDF]
Awal M +4 more
europepmc +1 more source
Dataset of SCADA traffic captures from a medical waste incinerator with injected cyberattacks. [PDF]
Al-Duwairi B +3 more
europepmc +1 more source
Guarding against malicious biased threats (GAMBiT) datasets: Revealing cognitive bias in human-subjects red-team cyber range operations. [PDF]
Beltz B +11 more
europepmc +1 more source
Quantum transfer learning for cross-domain cybersecurity threat detection and categorization. [PDF]
Alsubai S +6 more
europepmc +1 more source
A spyware detection method for firmware based cyber attacks. [PDF]
Shamshirsaz BA, Asghari SA, Aminian M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cyber Attack Detection using Deep Learning
Middle East Research Journal of Engineering and Technology, 2023Intrusion detection refers to the process of identifying unauthorized or malicious activities within a computer network or system. It involves monitoring network traffic, analyzing system logs, and employing various techniques to detect potential security breaches or attacks.
Aayush Kumar +3 more
openaire +1 more source
Clustering toward detecting cyber attacks
2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010Several anomaly methods have been proposed to cope with the recent booming of HTTP-related vulnerabilities which renders the security breaches of lots of vital HTTP-based services on the internet. This paper proposes a novel bottom-up agglomerative clustering method which not only spares the nuisance of a learning process that involves a big amount of ...
null Xiaofeng Yang +5 more
openaire +1 more source
Detection of complex cyber attacks
SPIE Proceedings, 2006One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed.
Ian Gregorio- de Souza +6 more
openaire +1 more source

