Results 31 to 40 of about 291,448 (281)

Research on Attack Detection of Cyber Physical Systems Based on Improved Support Vector Machine

open access: yesMathematics, 2022
Cyber physical systems (CPS), in the event of a cyber attack, can have a serious impact on the operating physical equipment. In order to improve the attack detection capability of CPS, an support vector machine (SVM) attacks detection model based on ...
Fengchun Liu   +3 more
doaj   +1 more source

Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]

open access: yes, 2014
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim   +3 more
core   +1 more source

Secure data collection method of WSN based on mobile Sink

open access: yes网络与信息安全学报, 2021
At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice. To solve this
MIAO Chunyu, FAN Yuan, GE Kaiqiang, ZHANG Xiaomeng   +1 more
doaj   +3 more sources

An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things

open access: yesInternational Journal of Distributed Sensor Networks, 2019
Internet of things (IoT) is a complex and massive wireless network, where millions of devices are connected together. These devices gather different types of data from different systems that transform human daily lives by modernizing home appliances ...
Sabeen Tahir   +2 more
doaj   +1 more source

Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]

open access: yes, 2008
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David   +3 more
core   +1 more source

Sleep Deprivation Attack Detection in Wireless Sensor Network

open access: yes, 2012
Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes.
Bhattasali, Tapalina   +2 more
core   +3 more sources

DDoS Attack Detection Based on Self-organizing Mapping Network in Software Defined Networking

open access: yesMATEC Web of Conferences, 2018
The software defined networking is a new kind of network architecture, the programmability of SDN enables hackers to easily launch DDoS attack on the network through software programming. To solve the problem, a DDoS attack detection scheme based on self-
Zhao Chanchan, Liu Feng
doaj   +1 more source

Threshold Verification Technique for Network Intrusion Detection System [PDF]

open access: yes, 2009
Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important ...
Faizal, M. A.   +5 more
core   +1 more source

Clinical Insights Into Hypercalcemia of Malignancy in Childhood

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley   +1 more source

A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

open access: yesJournal of Electrical and Computer Engineering, 2014
The Internet of Things has broad application in military field, commerce, environmental monitoring, and many other fields. However, the open nature of the information media and the poor deployment environment have brought great risks to the security of ...
Wenchao Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy