Results 281 to 290 of about 1,363,692 (325)
Some of the next articles are maybe not open access.

Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives

IEEE Communications Surveys and Tutorials, 2023
Nan Sun, Ming Ding, Jiaojiao Jiang
exaly  

Cyber Attacks

Computers & Security, 2012
openaire   +1 more source

MODELLING CYBER ATTACKS

In this article, we present a model of cyber attacks which can be used to represent a cyber attack in an intuitive and concise way. With ever-increasing popularities of online services, we have seen a growing number of cyber attacks targeted towards large online service providers as well as individuals and the IoT devices.
openaire   +1 more source

Cyber-aggression, Cyberbullying, and Cyber-grooming

ACM Computing Surveys, 2022
Miljana Mladenović   +1 more
exaly  

Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy

Applied Mathematics and Computation, 2022
Qingyu Su   +4 more
semanticscholar   +1 more source

Security and Privacy in the Emerging Cyber-Physical World: A Survey

IEEE Communications Surveys and Tutorials, 2021
Zhiyuan Yu, Zack Kaplan, Qiben Yan
exaly  

Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber–Physical Systems

IEEE Internet of Things Journal, 2021
Amir Namavar Jahromi   +3 more
semanticscholar   +1 more source

Machine Learning–based Cyber Attacks Targeting on Controlled Information

ACM Computing Surveys, 2022
Chao Chen, Lei Pan, Qing-Long Han
exaly  

Home - About - Disclaimer - Privacy