Results 31 to 40 of about 62,210 (284)

Cyber Attacks on Intrusion Detection System

open access: yesInternational Journal of Information Sciences and Techniques, 2016
Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer ...
Priyanka Sharma, Rakesh Singh Kunwar
openaire   +2 more sources

Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle [PDF]

open access: yes, 2016
Security is one of the key challenges in cyber-physical systems, because by their nature, any cyber attack against them can have physical repercussions. This is a critical issue for autonomous vehicles; if compromised in terms of their communications or ...
Anthony, Richard J.   +3 more
core   +1 more source

Detection and Modeling of Cyber Attacks with Petri Nets [PDF]

open access: yesEntropy, 2014
The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of ...
Bartosz Jasiul   +2 more
openaire   +2 more sources

Proposed Approach for Targeted Attacks Detection [PDF]

open access: yes, 2015
For years governments, organizations and companies have made great efforts to keep hackers, malware, cyber attacks at bay with different degrees of success. On the other hand, cyber criminals and miscreants produced more advanced techniques to compromise
Ghafir Ibrahim, Přenosil Václav
core   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Experimental Cyber Attack Detection Framework [PDF]

open access: yesElectronics, 2021
Digital security plays an ever-increasing, crucial role in today’s information-based society. The variety of threats and attack patterns has dramatically increased with the advent of digital transformation in our lives. Researchers in both public and private sectors have tried to identify new means to counteract these threats, seeking out-of-the-box ...
Cătălin Mironeanu   +3 more
openaire   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Distributed denial-of-service attack detection for smart grid wide area measurement system: A hybrid machine learning technique

open access: yesEnergy Reports, 2023
Smart grid networks face several cyber-attacks, where distributed denial-of-service (DDoS) attacks distract the grid network. The synchrophasor technique protects the wide-area measurement system (WAMS) from the complex problem and addresses different ...
A.K.M. Ahasan Habib   +5 more
doaj   +1 more source

Detection of advanced persistent threat using machine-learning correlation analysis [PDF]

open access: yes, 2018
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to compromise the system and gain information from the ...
Aparicio-Navarro, F   +6 more
core   +6 more sources

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid [PDF]

open access: yes, 2016
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable
Khan, Rafiullah   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy