We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 10,000 results
  1. Retaliating against cyber-attacks: a decision-taking framework for policy-makers and enforcers of international and cybersecurity law

    Cyber warfare is a reality taking on increasing importance. Governments, state-sponsored actors, and non-state sponsored actors have used...

    Sozon Leventopoulos, Kosmas Pipyros, Dimitris Gritzalis in International Cybersecurity Law Review
    Article Open access 27 March 2024
  2. Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review

    The Internet of Things (IoT) has emerged as an inevitable part of human life, that includes online learning, smart homes, smart cars, smart grids,...

    Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil in The Journal of Supercomputing
    Article 19 December 2023
  3. A multi-layered security model to counter social engineering attacks: a learning-based approach

    Social engineering is a malicious technique that leverages deception and manipulation to exploit the cognitive biases and heuristics of human...

    Luke Edwards, Muhammad Zahid Iqbal, Mahmudul Hassan in International Cybersecurity Law Review
    Article 18 April 2024
  4. Ambiguity attacks on the digital image watermarking using discrete wavelet transform and singular value decomposition

    In this paper, we present two ambiguity attacks on a watermarking algorithm based on discrete wavelet transform (DWT) and singular value...

    Amar El Maadi, Khaled Loukhaoukha, ... Noureddine Mehallegue in Multimedia Tools and Applications
    Article 03 April 2024
  5. Trans-IFFT-FGSM: a novel fast gradient sign method for adversarial attacks

    Deep neural networks (DNNs) are popular in image processing but are vulnerable to adversarial attacks, which makes their deployment in...

    Muhammad Luqman Naseem in Multimedia Tools and Applications
    Article 09 February 2024
  6. Potential cyber threats of adversarial attacks on autonomous driving models

    Autonomous Vehicles (CAVs) are currently seen as a viable alternative to traditional vehicles. However, CAVs will face serious cyber threats because...

    Article 05 June 2023
  7. An integrated SDN framework for early detection of DDoS attacks in cloud computing

    Cloud computing is a rapidly advancing technology with numerous benefits, such as increased availability, scalability, and flexibility. Relocating...

    Asha Varma Songa, Ganesh Reddy Karri in Journal of Cloud Computing
    Article Open access 20 March 2024
  8. Design optimization-based software-defined networking scheme for detecting and preventing attacks

    In this paper, we design a Spider Monkey-based Elman Spike Neural Network (SM-ESNN) to identify intrusion threats in Software Defined Networks (SDN)....

    Panem Charanarur, Bui Thanh Hung, ... S. Siva Shankar in Multimedia Tools and Applications
    Article 06 February 2024
  9. A systematic analysis of deep learning methods and potential attacks in internet-of-things surfaces

    The usage of intelligent IoT devices is exponentially rising, and so the possibility of attacks in the IoT surfaces. The deep leaning algorithms are...

    Ahmed Barnawi, Shivani Gaba, ... Neeraj Kumar in Neural Computing and Applications
    Article 02 June 2023
  10. Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation

    Advanced Persistent Threats (APTs) are stealthy, multi-step attacks tailored to a specific target. Often described as ’low and slow’, APTs remain...

    Aida Akbarzadeh, Laszlo Erdodi, ... Tore Geir Soltvedt in International Journal of Information Security
    Article Open access 14 May 2024
  11. GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks

    Nowadays, the growth of internet users has led to a significant increase in identity fraud security risks. One of the common forms of identity fraud...

    Fabrice Mvah, Vianney Kengne Tchendji, ... Charles Kamhoua in International Journal of Information Security
    Article 26 August 2023
  12. SDDA-IoT: storm-based distributed detection approach for IoT network traffic-based DDoS attacks

    In the world of connected devices, there is huge growth of less secure Internet of Things (IoT) devices, and the ease of performing sophisticated...

    Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil in Cluster Computing
    Article 29 February 2024
  13. Towards the universal defense for query-based audio adversarial attacks on speech recognition system

    Recently, studies show that deep learning-based automatic speech recognition (ASR) systems are vulnerable to adversarial examples (AEs), which add a...

    Feng Guo, Zheng Sun, ... Lei Ju in Cybersecurity
    Article Open access 05 August 2023
  14. Formal verification for security and attacks in IoT physical layer

    IoT devices are more important than ever. In a connected world, IoT devices have many uses. They are no longer merely used at work; they are part of...

    Zinah Hussein Toman, Lazhar Hamel, ... Dalton Cézane Gomes Valadares in Journal of Reliable Intelligent Environments
    Article 06 May 2023
  15. SeBROP: blind ROP attacks without returns

    Currently, security-critical server programs are well protected by various defense techniques, such as Address Space Layout Randomization(ASLR),...

    Tianning Zhang, Miao Cai, ... Hao Huang in Frontiers of Computer Science
    Article 06 January 2022
  16. Detection of cyber-attacks on smart grids using improved VGG19 deep neural network architecture and Aquila optimizer algorithm

    This study introduces an innovative smart grid (SG) intrusion detection system, integrating Game Theory, swarm intelligence, and deep learning (DL)...

    Ahmed Abdulmunem Mhmood, Özgür Ergül, Javad Rahebi in Signal, Image and Video Processing
    Article 17 November 2023
  17. Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques

    Adversarial attacks have recently gained popularity due to their simplicity, impact, and applicability to a wide range of machine learning scenarios....

    Christian López, Jesús Solano, ... Martín Ochoa in International Journal of Information Security
    Article 11 June 2023
  18. Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures

    Nowadays, blockchain has become increasingly popular due to its promise of supporting critical business services in various areas. Blockchain...

    Ahlem Hamdi, Lamia Fourati, Samiha Ayed in International Journal of Information Security
    Article 14 October 2023
  19. Safety-critical computer vision: an empirical survey of adversarial evasion attacks and defenses on computer vision systems

    Considering the growing prominence of production-level AI and the threat of adversarial attacks that can poison a machine learning model against a...

    Charles Meyers, Tommy Löfstedt, Erik Elmroth in Artificial Intelligence Review
    Article Open access 23 June 2023
  20. A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)

    Phishing attacks pose a significant threat to online security, utilizing fake websites to steal sensitive user information. Deep learning techniques,...

    Mustafa Ahmed Elberri, Ümit Tokeşer, ... Jose Manuel Lopez-Guede in International Journal of Information Security
    Article Open access 05 May 2024
Did you find what you were looking for? Share feedback.