Results 251 to 260 of about 1,175,680 (325)
The U.S. health system vulnerabilities. [PDF]
Brantly ND.
europepmc +1 more source
Swarm-based intelligent models for developing cybersecurity frameworks with IDS. [PDF]
Kumar NS +5 more
europepmc +1 more source
Privacy preserving blockchain integrated explainable artificial intelligence with two tier optimization for cyber threat detection and mitigation in the internet of things. [PDF]
Alohali MA +7 more
europepmc +1 more source
Towards the neuromorphic Cyber-Twin: an architecture for cognitive defense in digital twin ecosystems. [PDF]
Nasir N, Al Hamadi H.
europepmc +1 more source
Quantum-Resilient Federated Learning for Multi-Layer Cyber Anomaly Detection in UAV Systems. [PDF]
Şahin CB.
europepmc +1 more source
Cyber Threats and Exploring the Sources of Cyber Threat Intelligence
Cyber threat intelligence technology becomes a necessity in the context of the exponential evolution of information systems. The methods used by malicious actors are constantly evolving, becoming more and more sophisticated over time, thus making the task of security teams more difficult.
Adelaida STĂNCIULESCU +2 more
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
NeuPot: A Neural Network-Based Honeypot for Detecting Cyber Threats in Industrial Control Systems
IEEE Transactions on Industrial Informatics, 2023Honeypots have proven to be an effective defense method for industrial control systems (ICSs). However, as attacker skills become more sophisticated, it becomes increasingly difficult to develop honeypots that can effectively recognize and respond to ...
Yao Shan, Yu Yao, Tong Zhao, Wei Yang
semanticscholar +1 more source
Cyber Threats and Nuclear Security in India
Journal of Asian Security and International Affairs, 2022State and non-state actors are increasingly using cyberspace as a platform to execute hybrid warfare. As multiple incidents in India have shown critical infrastructures, particularly nuclear infrastructures, have been lucrative targets of cyber-attacks ...
B. Poornima
semanticscholar +1 more source

