We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 5,884 results
  1. OptFBFN: IOT threat mitigation in software-defined networks based on fuzzy approach

    Software-Defined Networking (SDN) has emerged as a new architectural paradigm in computer networks, aiming to enhance network capabilities and...

    B. Dhanalaxmi, Yeligeti Raju, ... Kandula Damodhar Rao in Cluster Computing
    Article 19 June 2024
  2. DDoS attack forecasting based on online multiple change points detection and time series analysis

    Attack forecasting is a proactive approach to defend against cyber-attacks, as it helps in predicting future threats beforehand. In this paper, we...

    Rahmoune Bitit, Abdelouahid Derhab, ... Farrukh Aslam Khan in Multimedia Tools and Applications
    Article 23 November 2023
  3. Defending Against Vishing Attacks: A Comprehensive Review for Prevention and Mitigation Techniques

    Vishing attacks, or voice phishing attacks, are a type of social engineering attack in which attackers use voice communication channels, such as...
    Shaikh Ashfaq, Pankaj Chandre, ... Parikshit Mahalle in Cyber Security and Digital Forensics
    Conference paper 2024
  4. Real-Time Mitigation of Trust-Related Attacks in Social IoT

    The social Internet of Things (Social IoT) introduces novel ways to enhance IoT networks and service discovery through social contexts. However,...
    Mariam Masmoudi, Ikram Amous, ... Florence Sèdes in Model and Data Engineering
    Conference paper 2024
  5. Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

    The adoption and popularization of mobile devices, such as smartphones and tablets, accentuated after the second decade of this century, has been...

    Francisco T. Chimuco, João B. F. Sequeiros, ... Pedro R. M. Inácio in International Journal of Information Security
    Article Open access 17 February 2023
  6. Software Mitigation of RISC-V Spectre Attacks

    Speculative attacks are still an active threat today that, even if initially focused on the x86 platform, reach across all modern hardware...
    Conference paper 2024
  7. Guide to develo** case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment

    Critical infrastructure mainly performs its role through an industrial control system (ICS). Organizations conduct cyber exercises between red and...

    Donghyun Kim, Seungho Jeon, ... Jung Taek Seo in The Journal of Supercomputing
    Article Open access 14 June 2024
  8. Reflector Saturation in Amplified Reflection Denial of Service Attack Abusing CLDAP and Memcache Protocols

    Amplified reflection distributed denial-of-service (AR-DDoS) attacks have been prevalent in the last ten years. AR-DDoS attacks are volumetric...
    João José Costa Gondim, Robson de Oliveira Albuquerque in Advanced Research in Technologies, Information, Innovation and Sustainability
    Conference paper 2024
  9. LDES: detector design for version number attack detection using linear temporal logic based on discrete event system

    The Internet Engineering Task Force (IETF) has defined routing protocols for low power and lossy networks (RPL) for constrained devices. RPL...

    Abhay Deep Seth, Santosh Biswas, Amit Kumar Dhar in International Journal of Information Security
    Article 17 March 2023
  10. Toward Joining DDoS Mitigation and Image Segmentation

    Samuel Kopmann, Hauke Heseding, Martina Zitterbart in Datenschutz und Datensicherheit - DuD
    Article 25 July 2023
  11. Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0

    Threat models and attack graphs have been used more than 20 years by enterprises and organizations for map** the actions of potential adversaries,...

    George Stergiopoulos, Panagiotis Dedousis, Dimitris Gritzalis in International Journal of Information Security
    Article 27 February 2021
  12. DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN

    The RPL routing protocol is susceptible to Selective Forwarding Attack (SFA), wherein malicious nodes selectively forward certain packets while...

    V. R. Rajasekar, S. Rajkumar in Cluster Computing
    Article 07 June 2024
  13. Zero-day attack detection: a systematic literature review

    With the continuous increase in cyberattacks over the past few decades, the quest to develop a comprehensive, robust, and effective intrusion...

    Rasheed Ahmad, Izzat Alsmadi, ... Lo’ai Tawalbeh in Artificial Intelligence Review
    Article 27 February 2023
  14. Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation

    Advanced Persistent Threats (APTs) are stealthy, multi-step attacks tailored to a specific target. Often described as ’low and slow’, APTs remain...

    Aida Akbarzadeh, Laszlo Erdodi, ... Tore Geir Soltvedt in International Journal of Information Security
    Article Open access 14 May 2024
  15. Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree

    Billions of gadgets are already online, making the IoT an essential aspect of daily life. However, the interconnected nature of IoT devices also...

    Surjeet Dalal, Umesh Kumar Lilhore, ... Amel Ksibi in Journal of Cloud Computing
    Article Open access 29 September 2023
  16. Attack–defense tree-based analysis and optimal defense synthesis for system design

    Attack–defense trees (ADTrees) are widely used in the security analysis of software systems. In this work, we introduce a novel approach to analyze...

    Baoluo Meng, Arjun Viswanathan, ... Michael Durling in Innovations in Systems and Software Engineering
    Article 23 March 2024
  17. An efficient centralized DDoS attack detection approach for Software Defined Internet of Things

    Both software defined networks and the Internet of Things are new topics that are being heavily employed in the information technology industry and...

    Pinkey Chauhan, Mithilesh Atulkar in The Journal of Supercomputing
    Article 07 February 2023
  18. Design and implementation of Denial-of-Service attack in network of multiprocessor systems-on-chip with anomaly detection approach

    IoT architecture based on the multiprocessor system-on-chip (MPSoC) is widely used because of the third-party intellectual property cores (3PIPs)...

    Article 18 May 2024
  19. Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data

    When protecting the Industrial Control Systems against cyber attacks, it is important to have as much information as possible to allocate defensive...

    Engla Rencelj Ling, Mathias Ekstedt in SN Computer Science
    Article Open access 08 April 2023
  20. Attacks on ML Systems: From Security Analysis to Attack Mitigation

    The past several years have witnessed rapidly increasing use of machine learning (ML) systems in multiple industry sectors. Since security analysis...
    Qingtian Zou, Lan Zhang, ... Peng Liu in Information Systems Security
    Conference paper 2022
Did you find what you were looking for? Share feedback.