We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach

    The proliferation of Internet of Things (IoT) devices has revolutionized various domains, but it has also brought forth numerous security challenges....

    D. Adhimuga Sivasakthi, A. Sathiyaraj, Ramkumar Devendiran in Cluster Computing
    Article 10 January 2024
  2. An advanced security model for fog computing to tackle various attacks on the data link layer using the QQL-FHES scheme

    Fog computing provides maximum flexibility and low latency by divesting the usage of cloud resources and amenities to the end users. In rendering the...

    Article 04 May 2024
  3. Variational quantum attacks threaten advanced encryption standard based symmetric cryptography

    We propose a variational quantum attack algorithm (VQAA) for classical advanced encryption standard (AES)-like symmetric cryptography, as exemplified...

    Zeguo Wang, Shijie Wei, ... Lajos Hanzo in Science China Information Sciences
    Article 18 July 2022
  4. Modern Cryptanalysis Methods, Advanced Network Attacks and Cloud Security

    As we all know, modern cryptography is “the scientific study of strategies for safeguarding digital information, transactions, and distributed...
    Rajkumar Banoth, Rekha Regar in Classical and Modern Cryptography for Beginners
    Chapter 2023
  5. Adequate responses to cyber-attacks

    Cybersecurity has become a prominent issue for companies in all sectors. Businesses need to ensure that they have taken the necessary measures and...

    Fabian M. Teichmann, Sonia R. Boticiu in International Cybersecurity Law Review
    Article 04 April 2024
  6. Real-time detection of deception attacks in cyber-physical systems

    Detection of deception attacks is pivotal to ensure the safe and reliable operation of cyber-physical systems (CPS). Detection of such attacks needs...

    Feiyang Cai, Xenofon Koutsoukos in International Journal of Information Security
    Article 29 March 2023
  7. A novel approach detection for IIoT attacks via artificial intelligence

    The Industrial Internet of Things (IIoT) is a paradigm that enables the integration of cyber-physical systems in critical infrastructures, such as...

    Gökçe Karacayılmaz, Harun Artuner in Cluster Computing
    Article Open access 06 May 2024
  8. Cybersecurity for autonomous vehicles against malware attacks in smart-cities

    Smart Autonomous Vehicles (AVSs) are networks of Cyber-Physical Systems (CPSs) in which they wirelessly communicate with other CPSs sub-systems...

    Sana Aurangzeb, Muhammad Aleem, ... Muhammad Shaoor Siddique in Cluster Computing
    Article Open access 03 October 2023
  9. Targeted adversarial attacks on wind power forecasts

    In recent years, researchers proposed a variety of deep learning models for wind power forecasting. These models predict the wind power generation of...

    René Heinrich, Christoph Scholz, ... Malte Lehna in Machine Learning
    Article Open access 13 September 2023
  10. Channel-augmented joint transformation for transferable adversarial attacks

    Deep neural networks (DNNs) are vulnerable to adversarial examples that fool the models with tiny perturbations. Although adversarial attacks have...

    Desheng Zheng, Wu** Ke, ... Shan Yang in Applied Intelligence
    Article 14 December 2023
  11. T&TRS: robust collaborative filtering recommender systems against attacks

    In recent years, the Internet has had a main and important contribution to human life and the amount of data on the World Wide Web such as books,...

    Fatemeh Rezaimehr, Chitra Dadkhah in Multimedia Tools and Applications
    Article 18 September 2023
  12. Enhancing IoT Security: A Blockchain-Based Mitigation Framework for Deauthentication Attacks

    The proposed Blockchain-Based Mitigation of Deauthentication Attacks (BBMDA) Framework aims to enhance the security and trustworthiness of IoT...

    S. Harihara Gopalan, A. Manikandan, ... G. Sujatha in International Journal of Networked and Distributed Computing
    Article Open access 28 May 2024
  13. A survey on privacy-preserving federated learning against poisoning attacks

    Federated learning (FL) is designed to protect privacy of participants by not allowing direct access to the participants’ local datasets and training...

    Feng **a, Wenhao Cheng in Cluster Computing
    Article 01 July 2024
  14. A Reversible Medical Image Watermarking Scheme for Advanced Image Tampering Detection

    Medical image protection against tampering attacks remains an ongoing issue, despite the numerous watermarking-based solutions developed thus far....

    Victor Fedoseev, Anna Denisova in SN Computer Science
    Article 29 March 2024
  15. Spoofing attacks against vehicular FMCW radar

    The safety and security of the passengers in vehicles in the face of cyber attacks is a key concern in the automotive industry, especially with the...

    Rony Komissarov, Sharon Vaisman, Avishai Wool in Journal of Cryptographic Engineering
    Article 22 May 2023
  16. Data Poisoning Attacks and Mitigation Strategies on Federated Support Vector Machines

    Federated learning is a machine learning approach where multiple edge devices, each holding local data samples, send a locally trained model to the...

    Israt Jahan Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan in SN Computer Science
    Article 27 January 2024
  17. Secure Voice Processing Systems against Malicious Voice Attacks

    This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods...

    Kun Sun, Shu Wang in SpringerBriefs in Computer Science
    Book 2024
  18. Adversarial attacks in computer vision: a survey

    Deep learning, as an important topic of artificial intelligence, has been widely applied in various fields, especially in computer vision...

    Chao Li, Handing Wang, ... Tingsong Jiang in Journal of Membrane Computing
    Article 10 April 2024
  19. Black-box attacks on face recognition via affine-invariant training

    Deep neural network (DNN)-based face recognition has shown impressive performance in verification; however, recent studies reveal a vulnerability in...

    Bowen Sun, Hang Su, Shibao Zheng in Neural Computing and Applications
    Article 25 February 2024
  20. Timely detection of DDoS attacks in IoT with dimensionality reduction

    The exponential growth of IoT devices and their interdependency makes the technology more vulnerable to network attacks like Distributed Denial of...

    Pooja Kumari, Ankit Kumar Jain in Cluster Computing
    Article 03 April 2024
Did you find what you were looking for? Share feedback.