Results 231 to 240 of about 61,508 (265)
Some of the next articles are maybe not open access.
Cyber Attacks: Detection, Prevention Techniques
Cyber attacks are escalating in both volume and sophistication, posing an increasingly critical threat to digital infrastructureworldwide. From personal data theft and corporate espionage to targeted disruption of essential services, attackers employ a widespectrum of malicious techniques that threaten individuals, organizations, and entire societies ...openaire +1 more source
A survey of Cyber Attack Detection Strategies
International Journal of Security and Its Applications, 2014Homeland security field deals with diverse subjects, audio processing, video surveillance, image detection, geolocation determination, and cyber attack detection. Audio processing and video surveillance area are significant for public places safety and land border area. However the big threat for homeland security is cyber attacks. Cyber terror attacks
openaire +1 more source
A Survey on Network Security for Cyber–Physical Systems: From Threats to Resilient Design
IEEE Communications Surveys and Tutorials, 2022Sangjun Kim +2 more
exaly
Detection of cyber attacks on smart grids
Advances in Computational Intelligence, 2022Aditi Kar Gangopadhyay +3 more
openaire +1 more source
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
IEEE Communications Surveys and Tutorials, 2023Nan Sun, Ming Ding, Jiaojiao Jiang
exaly
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer ...openaire +1 more source
Cyber-aggression, Cyberbullying, and Cyber-grooming
ACM Computing Surveys, 2022Miljana Mladenović +1 more
exaly

