Results 251 to 260 of about 144,780 (287)
Some of the next articles are maybe not open access.
Cryptanalytical attacks on cyber-physical systems
2016 5th Mediterranean Conference on Embedded Computing (MECO), 2016Abstract Cryptography finds its application in various objects used in our everyday life. GSM communication, credit cards, tickets for public transport or RFID tags employ cryptographic features either to protect privacy or to ensure trustworthy authentication. However, many such objects are vulnerable to certain cryptanalytic attacks. In this review
openaire +1 more source
Cyber Security and Frameworks: A Study of Cyber Attacks and Methods of Prevention of Cyber Attacks
2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), 2023Sourabh Purkait, Madhavi Damle
openaire +1 more source
Cyber Attack! Is a Counter Attack Warranted?
Information Security Journal: A Global Perspective, 2011Organizations are under constant attack by developers and users of worms, botnets, and malware. These attacks are designed to do bring down an organization's systems with denial of service attacks, install rootkits, steal intellectual or financial data, ruin an organization's reputation, and so forth.
openaire +1 more source
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
ACM Computing Surveys, 2022Ishai Rosenberg +2 more
exaly
Machine Learning–based Cyber Attacks Targeting on Controlled Information
ACM Computing Surveys, 2022Chao Chen, Lei Pan, Qing-Long Han
exaly
A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges
IEEE/CAA Journal of Automatica Sinica, 2022MengChu Zhou, Abdullah Abusorrah
exaly
A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
Electronics (Switzerland), 2023Ă–mer Aslan +2 more
exaly

