Results 251 to 260 of about 62,210 (284)
Some of the next articles are maybe not open access.
Machine Learning Techniques for Cyber Attacks Detection
2014The increased usage of cloud services, growing number of users, changes in network infrastructure that connect devices running mobile operating systems, and constantly evolving network technology cause novel challenges for cyber security that have never been foreseen before.
Rafal Kozik, Michal Choras
openaire +1 more source
2016
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire +1 more source
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire +1 more source
Clustering toward detecting cyber attacks
2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010Several anomaly methods have been proposed to cope with the recent booming of HTTP-related vulnerabilities which renders the security breaches of lots of vital HTTPbased services on the internet. This paper proposes a novel bottom-up agglomerative clustering method which not only spares the nuisance of a learning process that involves a big amount of ...
Yang, Xiaofeng +5 more
openaire +2 more sources
The Future Roadmap for Cyber-attack Detection
2022 6th International Conference on Cryptography, Security and Privacy (CSP), 2022Raha Soleymanzadeh, Rasha Kashef 0001
openaire +1 more source
Human Augmentation of UAV Cyber-Attack Detection
2018Unmanned aerial vehicles (UAVs) have extensive applications in both civilian and military applications. Nevertheless, the continued development of UAVs has been accompanied by security concerns. UAV navigation systems are potentially vulnerable to malicious attacks that target their Global Positioning System (GPS). Thus, efficient GPS hacking detection
Haibei Zhu +4 more
openaire +1 more source
Methods of anomaly detection for the prevention and detection of cyber attacks
International Journal of Intelligent Engineering Informatics, 2023N. Girubagari, T. N. Ravi
openaire +1 more source
A survey of Cyber Attack Detection Strategies
International Journal of Security and Its Applications, 2014Homeland security field deals with diverse subjects, audio processing, video surveillance, image detection, geolocation determination, and cyber attack detection. Audio processing and video surveillance area are significant for public places safety and land border area. However the big threat for homeland security is cyber attacks. Cyber terror attacks
openaire +1 more source
Detection of Cyber Attacks on a Water Distribution Testbed
2022 IEEE Conference on Control Technology and Applications (CCTA), 2022Mengsen Jia, Ping Zhang 0022
openaire +1 more source
Cyber attack estimation and detection for cyber-physical power systems
Applied Mathematics and Computation, 2021WenTing Wang, Jian Li
exaly

