Results 231 to 240 of about 61,508 (265)
Some of the next articles are maybe not open access.

Cyber Attack Detection IIOT

2023
Manogna Sai Nandipati   +3 more
openaire   +1 more source

Cyber Attacks: Detection, Prevention Techniques

Cyber attacks are escalating in both volume and sophistication, posing an increasingly critical threat to digital infrastructureworldwide. From personal data theft and corporate espionage to targeted disruption of essential services, attackers employ a widespectrum of malicious techniques that threaten individuals, organizations, and entire societies ...
openaire   +1 more source

A survey of Cyber Attack Detection Strategies

International Journal of Security and Its Applications, 2014
Homeland security field deals with diverse subjects, audio processing, video surveillance, image detection, geolocation determination, and cyber attack detection. Audio processing and video surveillance area are significant for public places safety and land border area. However the big threat for homeland security is cyber attacks. Cyber terror attacks
openaire   +1 more source

A Survey on Network Security for Cyber–Physical Systems: From Threats to Resilient Design

IEEE Communications Surveys and Tutorials, 2022
Sangjun Kim   +2 more
exaly  

Detection of cyber attacks on smart grids

Advances in Computational Intelligence, 2022
Aditi Kar Gangopadhyay   +3 more
openaire   +1 more source

Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions

IEEE Communications Surveys and Tutorials, 2023
Nour Moustafa   +2 more
exaly  

Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives

IEEE Communications Surveys and Tutorials, 2023
Nan Sun, Ming Ding, Jiaojiao Jiang
exaly  

CYBER ATTACKS ON INTRUSION DETECTION SYSTEM

Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer ...
openaire   +1 more source

Cyber-aggression, Cyberbullying, and Cyber-grooming

ACM Computing Surveys, 2022
Miljana Mladenović   +1 more
exaly  

Home - About - Disclaimer - Privacy