Results 31 to 40 of about 62,210 (284)
Cyber Attacks on Intrusion Detection System
Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer ...
Priyanka Sharma, Rakesh Singh Kunwar
openaire +2 more sources
Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle [PDF]
Security is one of the key challenges in cyber-physical systems, because by their nature, any cyber attack against them can have physical repercussions. This is a critical issue for autonomous vehicles; if compromised in terms of their communications or ...
Anthony, Richard J. +3 more
core +1 more source
Detection and Modeling of Cyber Attacks with Petri Nets [PDF]
The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of ...
Bartosz Jasiul +2 more
openaire +2 more sources
Proposed Approach for Targeted Attacks Detection [PDF]
For years governments, organizations and companies have made great efforts to keep hackers, malware, cyber attacks at bay with different degrees of success. On the other hand, cyber criminals and miscreants produced more advanced techniques to compromise
Ghafir Ibrahim, Přenosil Václav
core +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Experimental Cyber Attack Detection Framework [PDF]
Digital security plays an ever-increasing, crucial role in today’s information-based society. The variety of threats and attack patterns has dramatically increased with the advent of digital transformation in our lives. Researchers in both public and private sectors have tried to identify new means to counteract these threats, seeking out-of-the-box ...
Cătălin Mironeanu +3 more
openaire +1 more source
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source
Smart grid networks face several cyber-attacks, where distributed denial-of-service (DDoS) attacks distract the grid network. The synchrophasor technique protects the wide-area measurement system (WAMS) from the complex problem and addresses different ...
A.K.M. Ahasan Habib +5 more
doaj +1 more source
Detection of advanced persistent threat using machine-learning correlation analysis [PDF]
As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to compromise the system and gain information from the ...
Aparicio-Navarro, F +6 more
core +6 more sources
Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid [PDF]
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable
Khan, Rafiullah +4 more
core +1 more source

