We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. Detection and prevention of SQLI attacks and develo** compressive framework using machine learning and hybrid techniques

    A web application is a software system that provides an interface to its users through a web browser on any operating system (OS). Despite their...

    Wubetu Barud Demilie, Fitsum Gizachew Deriba in Journal of Big Data
    Article Open access 30 December 2022
  2. The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?

    This article aims to analyze the current unpredictable cyber climate. In particular, Russia’s invasion of Ukraine has heightened concerns about...

    Fabian Teichmann, Sonia R. Boticiu, Bruno S. Sergi in International Cybersecurity Law Review
    Article 13 July 2023
  3. Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards

    Due to its plug-and-play functionality and wide device support, the universal serial bus (USB) protocol has become one of the most widely used...

    Anil Kumar Chillara, Paresh Saxena, ... Krishnakumar Kesavan in International Journal of Information Security
    Article 14 March 2024
  4. Provable Dual Attacks on Learning with Errors

    Learning with Errors (LWE) is an important problem for post-quantum cryptography (PQC) that underlines the security of several NIST PQC selected...
    Amaury Pouly, Yixin Shen in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  5. Review on Wi-Fi Attacks and Detection Methods

    This work summarizes various attacks performed on Wi-Fi networks and their impacts of it with mitigations. Attacks are classified based on WPA2 and...
    R. Harish, K. Praveen in Information Technology Security
    Chapter 2024
  6. Cryptanalysis Attacks and Techniques

    This chapter covers the most important and useful cryptanalytic and cryptanalysis standards, validation methods, classification, and operations of...
    Marius Iulian Mihailescu, Stefania Loredana Nita in Pro Cryptography and Cryptanalysis with C++23
    Chapter 2023
  7. Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit

    Cryptographic integrated circuits (ICs) used to implement cryptographic algorithms have been widely applied to numerous security-critical...

    Cui** Shao, Dongyan Zhao, ... Liuqing Yang in Journal of Cryptographic Engineering
    Article 02 June 2023
  8. Strengthening KMS Security with Advanced Cryptography, Machine Learning, Deep Learning, and IoT Technologies

    This paper presents an innovative approach to strengthening Key Management Systems (KMS) against the escalating landscape of cyber threats by...

    Justin Onyarin Ogala, Shahnawaz Ahmad, ... Shabana Mehfuz in SN Computer Science
    Article 15 July 2023
  9. A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks

    IoT application uses MQTT, an application layer protocol that facilitates machine-to-machine communication using a central entity called broker. The...

    Ankit Sharma, Kriti Bhushan in Cluster Computing
    Article 05 July 2024
  10. Detecting Denial of Service attacks using machine learning algorithms

    Currently, Distributed Denial of Service Attacks are the most dangerous cyber danger. By inhibiting the server's ability to provide resources to...

    Kimmi Kumari, M. Mrunalini in Journal of Big Data
    Article Open access 28 April 2022
  11. SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks

    Phishing, a well-known cyberattack that cannot be completely eradicated from the Internet, has increased dramatically since the COVID-19 pandemic....

    Subhash Ariyadasa, Shantha Fernando, Subha Fernando in International Journal of Information Security
    Article 21 November 2023
  12. Impact Analysis to Detect and Mitigate Distributed Denial of Service Attacks with Ryu-SDN Controller: A Comparative Analysis of Four Different Machine Learning Classification Algorithms

    Today, the Distributed Denial of Service (DDoS) attacks are progressed, which appears in different profiles besides dissimilar standards, in this...

    Honey Gocher, Swapnesh Taterh, Pankaj Dadheech in SN Computer Science
    Article 17 June 2023
  13. Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations

    Vehicular ad hoc networks (VANET) facilitate vehicle to everything (V2X) communication between vehicles and road side units (RSU) to exchange safety...

    Rukhsar Sultana, Jyoti Grover, ... Sparsh Taneja in Journal of Network and Systems Management
    Article 23 May 2024
  14. New Records in Collision Attacks on SHA-2

    The SHA-2 family including SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224 and SHA512/256 is a U.S. federal standard published by NIST. Especially,...
    Yingxin Li, Fukang Liu, Gaoli Wang in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  15. Event-based sliding mode control under denial-of-service attacks

    This paper deals with the problem of estimator-based sliding mode control against denial-of-service (DoS) attacks and discrete events via a...

    Yingxin Tian, **ang Li, ... Ligang Wu in Science China Information Sciences
    Article 18 April 2022
  16. Explaining predictions and attacks in federated learning via random forests

    Artificial intelligence (AI) is used for various purposes that are critical to human life. However, most state-of-the-art AI algorithms are black-box...

    Rami Haffar, David Sánchez, Josep Domingo-Ferrer in Applied Intelligence
    Article Open access 13 April 2022
  17. Assessment of data augmentation, dropout with L2 Regularization and differential privacy against membership inference attacks

    Machine learning (ML) has revolutionized various industries, but concerns about privacy and security have emerged as significant challenges....

    Sana Ben Hamida, Hichem Mrabet, ... Abderrazak Jemai in Multimedia Tools and Applications
    Article 18 October 2023
  18. A vector convolutional deep autonomous learning classifier for detection of cyber attacks

    Nowadays with the exponential rise of traffic over large scale networks, Internet is vulnerable to increased number of cyber attacks. The cyber...

    N. G. Bhuvaneswari Amma in Cluster Computing
    Article 18 March 2022
  19. Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications

    Internet of Things (IoT) has a wide concentration in today’s technological world. It has a significant impact on smart infrastructure with a security...

    G. K. Ragesh, Ajay Kumar in The Journal of Supercomputing
    Article 26 August 2022
  20. Digital image and video watermarking: methodologies, attacks, applications, and future directions

    In recent years, internet technology has grown in advance, and multimedia data-sharing growth rates have skyrocketed. As a result, protecting...

    P. Aberna, L. Agilandeeswari in Multimedia Tools and Applications
    Article 03 June 2023
Did you find what you were looking for? Share feedback.