Ataque MitM a puntos de recarga AC
En este artículo presentamos un ataque MitM a puntos de recarga AC que permite controlar la carga del vehículo sin que el punto de recarga lo detecte. El ataque se ha llevado a cabo tanto en entorno de laboratorio como en entorno real.
Jarauta Gastelu, Javier +4 more
openaire +3 more sources
Portfelli VaR’i hindamine mitme riskifaktori korral
Käesoleva bakalaureusetöö eesmärk on anda ülevaade investeerimisportfelli Value at Risk’i (VaR) hindamisest mitme riskifaktori korral. Tutvustatakse VaR’i mõistet ja omadusi ning põhilisi hindamismeetodeid. Mitme riskifaktoriga juhtumi puhul keskendutakse portfelli VaR’i hindamisele normaaljaotuse eeldusel.
openaire +1 more source
Evaluating Methods for High-Dimensional Mediation in Metabolomics Data. [PDF]
Hoffman SS +8 more
europepmc +1 more source
A hybrid blockchain based deep learning model for multivector attack detection in internet of things enabled healthcare systems. [PDF]
Sengan S, Shieh CS, Horng MF.
europepmc +1 more source
Security Audit of IoT Device Networks: A Reproducible Machine Learning Framework for Threat Detection and Performance Benchmarking. [PDF]
Shaikhanova A +5 more
europepmc +1 more source
A Data Rate Monitoring Approach for Cyberattack Detection in Digital Twin Communication. [PDF]
Rodrigues C +3 more
europepmc +1 more source
A dataset collected in real-world industrial control systems for network attack detection. [PDF]
Zhou X +9 more
europepmc +1 more source
Efficient detection of intrusions in TON-IoT dataset using hybrid feature selection approach. [PDF]
Dharini N, Janani VS, Katiravan J.
europepmc +1 more source
MQTT_UAD: MQTT Under Attack Dataset. A public dataset for the detection of attacks in IoT networks using MQTT protocol. [PDF]
Aveleira-Mata J +5 more
europepmc +1 more source
Dataset of SCADA traffic captures from a medical waste incinerator with injected cyberattacks. [PDF]
Al-Duwairi B +3 more
europepmc +1 more source

