Results 221 to 230 of about 61,083 (243)
Some of the next articles are maybe not open access.

Intrusion Detection Techniques for Detection of Cyber Attacks

2021
Intrusion detection system (IDS) is a software-related application where we can detect the system or network activities and notice if any suspicious task happens. Excellent broadening and the use of the Internet lift examine the communication and save the digital information securely. Nowadays, attackers use variety of attacks for fetching private data.
Shaikh Sahil Ahmed   +2 more
openaire   +1 more source

Finding Patterns of Cyber-Attacks and Creating A Detection Model to Detect Cyber-Attacks Using Machine Learning

Journal of Artificial Intelligence, Machine Learning and Neural Network, 2023
This research is a finding and detection type of research. That paper focuses on exploratory data analysis and YOLOv3, you only look once at version three, a real-time recognizing model. The hypothesis of this research are, a cyber-attack gives the same pattern in all the different, different IP addresses, and the research model, the YOLOv3 model can ...
openaire   +1 more source

Data-Driven Kinetic Cyber-Attack Detection

2020
In this chapter, we will present a data-driven defense mechanism in cyber-physical systems against kinetic cyber-attacks. Kinetic cyber-attacks cause physical damage to the system from the cyber-domain. In cyber-physical manufacturing, kinetic cyber-attacks are realized by introducing flaws in the design of the 3D objects.
Sujit Rokka Chhetri   +1 more
openaire   +1 more source

Detection and Defense Methods of Cyber Attacks

2021
Cyberspace has been threatened by attacks ever since its birth. With the development of the information technologies, especially big data and artificial intelligence, many kinds of cyber attacks are emerging every day, causing severe consequences to society. Meanwhile, intelligent defense methods are proposed to detect these attacks.
Kai Xing, Aiping Li, Rong Jiang, Yan Jia
openaire   +1 more source

Detection of Cyber-Attacks

2016
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire   +1 more source

Faults and Cyber Attacks Detection in Critical Infrastructures

2016
In this paper we study the case of Critical Infrastructures (CIs), and especially power grid systems, which nowadays rely on computers and the Internet for their operation. We propose a combinatorial method for automatic detection and classification of faults and cyber-attacks, when there is limited data from the power grid nodes due to cyber ...
Soupionis, Yannis   +2 more
openaire   +2 more sources

Packet Analysis for Cyber Attack Detection

Real-time network data collection is crucial for identifying security risks such as outdated software and open ports. Network forensics uses packet analysis to monitor traffic, detect threats, trace intrusions, and recover digital content. This study evaluates the integrity of home networks using Wireshark, capturing traffic across devices.
Dr. Harish Joshi   +5 more
openaire   +1 more source

Multi Layer Cyber Attack Detection through Honeynet

2008 New Technologies, Mobility and Security, 2008
Intrusion detection forms an indispensable component of cyber security. To keep pace with the growing trends of blackhat community, there is an urgent need to replace single layer detection technology with multi layer detection. Our practical experiences depicted the retrieval of attack evidences from system traces. This paper signifies the integration
J. S. Bhatia   +3 more
openaire   +1 more source

Cyber Attack Detection IIOT

2023
Manogna Sai Nandipati   +3 more
openaire   +1 more source

Cyber Attacks: Detection, Prevention Techniques

Cyber attacks are escalating in both volume and sophistication, posing an increasingly critical threat to digital infrastructureworldwide. From personal data theft and corporate espionage to targeted disruption of essential services, attackers employ a widespectrum of malicious techniques that threaten individuals, organizations, and entire societies ...
openaire   +1 more source

Home - About - Disclaimer - Privacy