Results 251 to 260 of about 60,976 (288)
Some of the next articles are maybe not open access.

Event-Based Secure Leader-Following Consensus Control for Multiagent Systems With Multiple Cyber Attacks

IEEE Transactions on Cybernetics, 2021
Jinliang Liu, Tingting Yin, Dong Yue
exaly  

Cyber Attacks

Computers & Security, 2012
openaire   +1 more source

MODELLING CYBER ATTACKS

In this article, we present a model of cyber attacks which can be used to represent a cyber attack in an intuitive and concise way. With ever-increasing popularities of online services, we have seen a growing number of cyber attacks targeted towards large online service providers as well as individuals and the IoT devices.
openaire   +1 more source

A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions

Electronics (Switzerland), 2023
Omer Aslan   +2 more
exaly  

Detection of Cyber-Attacks

2016
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire   +1 more source

New forms of cyber Attacks

SSRN Electronic Journal, 2023
Philippe Jougleux   +2 more
openaire   +1 more source

Current Cyber Attack Methods

2006
Understand that cyber attacks are not random but instead are executed with deliberate intent and specific purpose. Ö Identify many of the internal penetration approaches to achieve security breaches. Ö Discover the most common external penetration tactics directed against systems. Ö Come to realize the part that people play in the breach of systems.
openaire   +1 more source

Home - About - Disclaimer - Privacy