Results 51 to 60 of about 62,210 (284)

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

Cloaking the Clock: Emulating Clock Skew in Controller Area Networks

open access: yes, 2018
Automobiles are equipped with Electronic Control Units (ECU) that communicate via in-vehicle network protocol standards such as Controller Area Network (CAN).
Bushnell, Linda   +4 more
core   +1 more source

Synaptic κ‐Ga2O3 Photodetectors for Privacy‐Enhancing Neuromorphic Computing

open access: yesAdvanced Science, EarlyView.
We report on a single‐element neuromorphic sensor based on the persistent photoconductivity (PPC) of κ‐phase Ga2O3 capable of sensing ultraviolet light and harnessing intrinsic data privacy. The approach establishes a materials‐enabled pathway toward compact, intelligent, and privacy‐enhancing optoelectronic hardware for next‐generation edge systems ...
Yanqing Jia   +13 more
wiley   +1 more source

Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

open access: yes, 2017
Social media is often viewed as a sensor into various societal events such as disease outbreaks, protests, and elections. We describe the use of social media as a crowdsourced sensor to gain insight into ongoing cyber-attacks.
Becker Hila   +14 more
core   +1 more source

Zero Watermarking Using Convolutional Additive Self‐Attention Vision Transformer and Discrete Wavelet Transform‐Variance‐Based Feature Descriptor for Medical Image Security in Mobile Healthcare Services

open access: yesAdvanced Intelligent Systems, EarlyView.
A zero‐watermarking algorithm that combines a refined convolutional additive self‐attention vision transformer (CAS‐ViT) with a discrete wavelet transform variance‐based feature descriptor (DVFD) is proposed for protecting the privacy of medical images in mobile healthcare services.
Pei Liu   +6 more
wiley   +1 more source

A Review on IoT Cyber-Attacks Detection Challenges‎ and Solutions

open access: yesAl-Iraqia Journal for Scientific Engineering Research, 2023
 The Internet of Things (IoT) has recast the way we interact with technology and the world around us. The IoT is almost everywhere in our daily lives, and this huge growth in using the IoT increases the need for implementing a high level of security ...
Marwa Jawad Kathem, Tayseer Salman Atia
doaj   +1 more source

An Intelligent Feature Engineering‐Driven Hybrid Framework for Adversarial Domain Name System Tunneling Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor   +5 more
wiley   +1 more source

Cyber Attack Detection

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount. This abstract introduces the concept of cyber attack detection and its significance in safeguarding digital assets.
Prof. Kaustubh Shinde   +4 more
openaire   +1 more source

OntoLogX: Ontology‐Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models

open access: yesAdvanced Intelligent Systems, EarlyView.
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti   +4 more
wiley   +1 more source

A cyber‐attack detection method for load control system based on cyber and physical layer crosscheck mechanism

open access: yesIET Generation, Transmission & Distribution, 2022
Cyber‐attack has become one of the main threats to the safe operation of the load control system in the distribution network. Currently, a large number of methods are developed to detect cyber‐attacks.
Yingjun Wu   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy