We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 5,884 results
  1. Data breaches in healthcare: security mechanisms for attack mitigation

    The digitalisation of healthcare has increased the risk of cyberattacks in this sector, targeting sensitive personal information. In this paper, we...

    Lili Nemec Zlatolas, Tatjana Welzer, Lenka Lhotska in Cluster Computing
    Article Open access 13 April 2024
  2. Email bombing attack detection and mitigation using machine learning

    Email bombing, a growingly prevalent and destructive cyber attack, involves inundating a target’s email inbox with subscription confirmation messages...

    Sanjeev Shukla, Manoj Misra, Gaurav Varshney in International Journal of Information Security
    Article 13 June 2024
  3. A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices

    In recent times, networks have been prone to several types of attacks, such as DDoS attacks, volumetric attacks, replay attacks, eavesdrop**, etc.,...

    Sankepally Sainath Reddy, Kosaraju Nishoak, ... U. Venkanna in Journal of Network and Systems Management
    Article 01 November 2023
  4. Cyber attack detection and mitigation process in cloud via deep hybrid model with selected feature set

    For ensuring the proper operation of CPS, it is required to obtain a solution to the security problem. Applications for cyber-physical systems (CPS)...

    Article 05 February 2024
  5. Denial-of-Service Attack Mitigation in Multi-hop 5G D2D Wireless Communication Networks Employing Double Auction Game

    The advent of Fifth-Generation (5G) networks has led to the enhancement of digital connectivity throughout the world. Device-to-Device (D2D) or...

    Debdas Barik, Judhajit Sanyal, Tuhina Samanta in Journal of Network and Systems Management
    Article 05 October 2022
  6. IoT authentication model with optimized deep Q network for attack detection and mitigation

    The Internet of Things (IoT) is a promising area in day-to-day lives, like homes, health, military, and agriculture. The expansion of IoT technology...

    Article 28 February 2022
  7. “We Must Protect the Transformers”: Understanding Efficacy of Backdoor Attack Mitigation on Transformer Models

    Recently, Neural Network based Deep Learning (DL) backdoor attacks have prompted the development of mitigation mechanisms for such attacks. Out of...
    Rohit Raj, Biplab Roy, ... Mainack Mondal in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2024
  8. A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks

    The Internet of Things (IoT) is an expanding field of computer networks where resource-constrained devices connect to the internet through various...

    Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi in International Journal of Information Security
    Article 02 November 2023
  9. Customized convolutional neural network model for IoT botnet attack detection

    The Internet of Things is a disruptive technology that has changed the face of many industries. On the contrary, the unpresidential growth of IoT has...

    Balaganesh Bojarajulu, Sarvesh Tanwar in Signal, Image and Video Processing
    Article 17 June 2024
  10. A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models

    Ensuring the security of large language models (LLMs) is an ongoing challenge despite their widespread popularity. Developers work to enhance LLMs...
    Aysan Esmradi, Daniel Wankit Yip, Chun Fai Chan in Ubiquitous Security
    Conference paper 2024
  11. Mitigation of Distributed Denial of Service (DDoS) Attack Using Network Function Virtualization (NFV)—A Survey

    One of the most damaging and widely used cyber-attacks is the Distributed Denial of Service (DDoS) attack. A large amount of attack traffic generates...
    Gajanan N. Tikhe, Pushpinder Singh Patheja in Security, Privacy and Data Analytics
    Conference paper 2023
  12. Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs

    Early attack detection is essential to ensure the security of complex networks, especially those in critical infrastructures. This is particularly...

    Armita Kazeminajafabadi, Mahdi Imani in Cybersecurity
    Article Open access 01 September 2023
  13. DDoS mitigation using blockchain and machine learning techniques

    Online services are vulnerable to Distributed Denial of Service (DDoS) attacks, which overwhelm target servers with malicious traffic. These attacks...

    Jawahar A, Kaythry P, ... Gopinaath V in Multimedia Tools and Applications
    Article 04 January 2024
  14. AI infers DoS mitigation rules

    DDoS attacks still represent a severe threat to network services. While there are more or less workable solutions to defend against these attacks,...

    Martin Zadnik, Elena Carasec in Journal of Intelligent Information Systems
    Article Open access 23 August 2022
  15. Enhancing attack resilience of cyber-physical systems through state dependency graph models

    This paper presents a method that utilizes graph theory and state modelling algorithms to perform automatic complexity analysis of the architecture...

    Konstantinos Adamos, George Stergiopoulos, ... Dimitris Gritzalis in International Journal of Information Security
    Article Open access 22 July 2023
  16. Addressing DIO Suppression Attack in RPL based IoT Networks

    The Internet of Things (IoT) has brought a revolution in technology in the last decade. IoT is susceptible to numerous internal routing attacks...
    Rajat Kumar, Jyoti Grover, ... Abhishek Verma in Information Security, Privacy and Digital Forensics
    Conference paper 2024
  17. Collaborative Blockchain Based Distributed Denial of Service Attack Mitigation Approach with IP Reputation System

    Due to the high accessibility of the internet and unsecured internet-connected devices, Distributed Denial of Service attacks (DDoS) become...
    Conference paper 2022
  18. Early detection and mitigation of TCP SYN flood attacks in SDN using chi-square test

    Software Defined Networking (SDN) is a network paradigm with the separation of the control plane from the data plane. Centralized management of the...

    P. V. Shalini, V. Radha, Sriram G. Sanjeevi in The Journal of Supercomputing
    Article 07 February 2023
  19. VANET Cluster Based Gray Hole Attack Detection and Prevention

    VANET is an emerging technology for intelligent transportation systems in smart cities. Vehicle communication raises many challenges, notably in the...

    Gurtej Kaur, Meenu Khurana, Amandeep Kaur in SN Computer Science
    Article 10 January 2024
  20. TSWA: a unique approach to overcome interest flooding attacks in the cloud using a combination of TSW and attack detection

    The prevalence of distributed denial of service (DDoS) attacks poses a significant challenge to the Internet and cloud environments, including...

    Shaik Khaja Mohiddin, Divya Midhunchakkaravarthy, Mohammed Ali Hussain in Multimedia Tools and Applications
    Article 23 September 2023
Did you find what you were looking for? Share feedback.