Results 11 to 20 of about 14,082 (218)

Spatiotemporal Patterns and Predictability of Cyberattacks [PDF]

open access: yes, 2015
Y.C.L. was supported by Air Force Office of Scientific Research (AFOSR) under grant no. FA9550-10-1-0083 and Army Research Office (ARO) under grant no. W911NF-14-1-0504. S.X. was supported by Army Research Office (ARO) under grant no.
Chen, Y Z   +3 more
core   +5 more sources

Study on Cyber Attack Damage Assessment Framework

open access: yesIEEE Access, 2022
Cyberspace has expanded as a result of the rapid spread of the Internet. This expansion has led to a change from conventional warfare to a form that includes cyber warfare.
Sungjoong Kim   +4 more
doaj   +1 more source

Confronting the Threat: Analysis of the Impact of MaDIoT Attacks in Two Power System Models

open access: yesEnergies, 2023
The increasing penetration of Internet of Things (IoT) devices at the consumer level of power systems also increases the surface of attack for the so-called Manipulation of Demand through IoT (MaDIoT) attacks.
Néstor Rodríguez-Pérez   +4 more
doaj   +1 more source

M.A.D. AGAIN?

open access: yesObrana a Strategie, 2022
The article introduces a new meaning of the acronym M.A.D. (Mutually Assured Destruction) in the field of security. From the original connection with nuclear issues, its use is moving to the area of cyberspace.
Aleš Tesař   +2 more
doaj   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Technique for IoT malware detection based on control flow graph analysis

open access: yesРадіоелектронні і комп'ютерні системи, 2022
The Internet of Things (IoT) refers to the millions of devices around the world that are connected to the Internet. Insecure IoT devices designed without proper security features are the targets of many Internet threats.
Kira Bobrovnikova   +4 more
doaj   +1 more source

A Nonlinear Systems Framework for Cyberattack Prevention for Chemical Process Control Systems †

open access: yesMathematics, 2018
Recent cyberattacks against industrial control systems highlight the criticality of preventing future attacks from disrupting plants economically or, more critically, from impacting plant safety.
Helen Durand
doaj   +1 more source

Information-extreme machine learning of a cyber attack detection system

open access: yesРадіоелектронні і комп'ютерні системи, 2022
The study aims to increase the functional efficiency of a machine learning cyber attack detection system. An information-extreme machine learning method of the cyberattack detection system with optimization of control tolerances for recognition features ...
Anatoliy Dovbysh   +4 more
doaj   +1 more source

Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management

open access: yesFuture Internet, 2020
Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection ...
In Lee
doaj   +1 more source

Toward Network-based DDoS Detection in Software-defined Networks [PDF]

open access: yes, 2018
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy