Results 41 to 50 of about 60,976 (288)

Zero Watermarking Using Convolutional Additive Self‐Attention Vision Transformer and Discrete Wavelet Transform‐Variance‐Based Feature Descriptor for Medical Image Security in Mobile Healthcare Services

open access: yesAdvanced Intelligent Systems, EarlyView.
A zero‐watermarking algorithm that combines a refined convolutional additive self‐attention vision transformer (CAS‐ViT) with a discrete wavelet transform variance‐based feature descriptor (DVFD) is proposed for protecting the privacy of medical images in mobile healthcare services.
Pei Liu   +6 more
wiley   +1 more source

Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles

open access: yesJournal of Advanced Transportation, 2020
CAV (connected and autonomous vehicle) is a crucial part of intelligent transportation systems. CAVs utilize both sensors and communication components to make driving decisions.
Qiyi He, Xiaolin Meng, Rong Qu
doaj   +1 more source

An Intelligent Feature Engineering‐Driven Hybrid Framework for Adversarial Domain Name System Tunneling Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor   +5 more
wiley   +1 more source

Wireless ICS Training Platform [PDF]

open access: yes, 2019
Indiana University - Purdue University IndianapolisEssential public services, such as Electric, Water and Gas Utilities, are becoming increasingly reliant on network connected devices to control their processes. Wireless control systems are becoming more
Cassandra Boman, Nick Pohlman
core  

Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

open access: yes, 2019
The use of autonomous vehicles (AVs) is a promising technology in Intelligent Transportation Systems (ITSs) to improve safety and driving efficiency. Vehicle-to-everything (V2X) technology enables communication among vehicles and other infrastructures ...
Hamieh, Ismail   +3 more
core   +1 more source

Military objectives in cyber warfare [PDF]

open access: yes, 2017
This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks.
APV Rogers   +21 more
core   +1 more source

Non-linearities, cyber attacks and cryptocurrencies [PDF]

open access: yesFinance Research Letters, 2019
Abstract This paper uses a Markov-switching non-linear specification to analyse the effects of cyber attacks on returns in the case of four cryptocurrencies (Bitcoin, Ethernam, Litecoin and Stellar) over the period 8/8/2015 - 28/2/2019. The analysis considers both cyber attacks in general and those targeting cryptocurrencies in particular, and also ...
Caporale, Guglielmo Maria   +3 more
openaire   +4 more sources

OntoLogX: Ontology‐Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models

open access: yesAdvanced Intelligent Systems, EarlyView.
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti   +4 more
wiley   +1 more source

A Survey on Machine-Learning Based Security Design for Cyber-Physical Systems

open access: yesApplied Sciences, 2021
A cyber-physical system (CPS) is the integration of a physical system into the real world and control applications in a computing system, interacting through a communications network.
Sangjun Kim, Kyung-Joon Park
doaj   +1 more source

Cyber-Attack Attributes [PDF]

open access: yesTechnology Innovation Management Review, 2014
Senior corporate executives, government officials, and academics have become aware that there are: i) serious financial and regulatory costs arising from cyber-attacks (Pearson, 2014; Sugarman, 2014; US Securities and Exchange Commission, 2014); ii) vulnerabilities in high-value assets such as supervisory-control and dataacquisition systems (Ashford ...
openaire   +1 more source

Home - About - Disclaimer - Privacy