Results 51 to 60 of about 185,090 (283)

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Mitigation of Distributed Denial of Service Attacks in the Cloud

open access: yesCybernetics and Information Technologies, 2017
Cybersecurity attacks resulting in loss of availability of cloud services can have significantly higher impact than those in the traditional stand-alone enterprise setups.
Alosaimi Wael   +4 more
doaj   +1 more source

Intelligent Detection of Distributed Denial of Service Attacks: A Supervised Machine Learning and Ensemble Approach

open access: yesIraqi Journal for Computer Science and Mathematics, 2023
The rapid growth of IoT, smart devices, and 5G networks has increased the prevalence and complexity of Distributed Denial of Service (DDoS) attacks, posing significant challenges to cybersecurity.
Mustafa S. Ibrahim Alsumaidaie   +2 more
doaj   +1 more source

Acoustic Denial of Service Attacks on HDDs

open access: yesCoRR, 2017
8 pages, 8 ...
Mohammad Shahrad   +5 more
openaire   +2 more sources

Identification of Repeated Denial of Service Attacks [PDF]

open access: yesProceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006
Denial of Service attacks have become a weapon for extortion and vandalism causing damages in the millions of dollars to commercial and government sites. Legal prosecution is a powerful deterrent, but requires attribution of attacks, currently a difficult task.
Alefiya Hussain   +2 more
openaire   +1 more source

Identifying Systemic Lupus Erythematosus From Serum Proteomic Profiles Using Machine Learning and Genetic Risk Stratification

open access: yesArthritis &Rheumatology, EarlyView.
Objective Proteome‐wide risk models for lupus remain underexplored. We developed classification models to identify lupus from serum proteomic profiles. Methods Patients with lupus and individuals with other autoimmune diseases in the UK Biobank were included.
Mehmet Hocaoǧlu   +2 more
wiley   +1 more source

Denial of service attacks and challenges in broadband wireless networks [PDF]

open access: yes, 2008
Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN).
Khan, MA, Khan, S, Loo, KK, Naeem, T
core   +1 more source

Distributed Denial of Service is a Scalability Problem

open access: yes, 2011
Distributed denial of service attacks are often considered a security problem. While this may be the way to view the problem with today's Internet, new network architectures attempting to address the issue should view it as a scalability problem.
Chung, Yoo
core   +1 more source

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

IoT Botnets Analysis [PDF]

open access: yes, 2017
A botnet is a set of connected devices which have been infected with malware that allows an attacker to gain remote control and coordinate their actions. Attackers most commonly use their botnets to launch DDoS (Distributed Denial of Service) attacks
Dushenok, M. S.   +2 more
core  

Home - About - Disclaimer - Privacy