Honeypots: Screening Cyber Attacks
M. I., Vanam Rajkumar, Adnaan Arbaaz
openaire +1 more source
Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks. [PDF]
Kandasamy V, Roseline AA.
europepmc +1 more source
D4I - Digital forensics framework for reviewing and investigating cyber attacks. [PDF]
Dimitriadis A +3 more
europepmc +1 more source
Farida Chowdhury, Md Sadek Ferdous
openaire +1 more source
Motion State Estimation with Bandwidth Constraints and Mixed Cyber-Attacks for Unmanned Surface Vehicles: A Resilient Set-Membership Filtering Framework. [PDF]
Wang Z, Lou P, Wang Y, Li J, Wang J.
europepmc +1 more source
Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications. [PDF]
Al-Eidi S, Darwish O, Chen Y.
europepmc +1 more source
Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use. [PDF]
Tubis AA +4 more
europepmc +1 more source
Focal Causal Temporal Convolutional Neural Networks: Advancing IIoT Security with Efficient Detection of Rare Cyber-Attacks. [PDF]
Miryahyaei M +2 more
europepmc +1 more source
Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies. [PDF]
Lykou G, Moustakas D, Gritzalis D.
europepmc +1 more source
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. [PDF]
Achaal B +4 more
europepmc +1 more source

