Highly accurate anomaly based intrusion detection through integration of the local outlier factor and convolutional neural network. [PDF]
Rabih R +3 more
europepmc +1 more source
DDoS attack detection in Edge-IIoT digital twin environment using deep learning approach. [PDF]
Al-Obeidat F +3 more
europepmc +1 more source
Decoding the Solution for Man-at-the-End Attacks and Reverse Engineering on IoMT Devices: An Experimental Review of Techniques and Defences. [PDF]
T AH, Sriraman H.
europepmc +1 more source
BHFVAL: Block chain-Enabled Hierarchical Federated Variational Auto encoder Framework for Secure Intrusion Detection in Vehicular Networks. [PDF]
Visuvanathan GE, Sayeed MS, Yogarayan S.
europepmc +1 more source
Software defined network intrusion system to detect malicious attacks in computer Internet of Things security using deep extractor supervised random forest technique. [PDF]
Mujahid M +4 more
europepmc +1 more source
Enhancing security in digitized healthcare system using blockchain technology. [PDF]
Gayathri D B, Sangeetha D.
europepmc +1 more source
Reliability in Building Blocks for Secure Software. [PDF]
Black PE.
europepmc +1 more source
Quantum deep learning-enhanced ethereum blockchain for cloud security: intrusion detection, fraud prevention, and secure data migration. [PDF]
Nagarjun AV, Rajkumar S.
europepmc +1 more source
ICN intrusion detection method based on GA-CNN. [PDF]
Zhang J, Wang X.
europepmc +1 more source
Related searches:
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire +1 more source

