We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 5,884 results
  1. CADS-ML/DL: efficient cloud-based multi-attack detection system

    With the increasing adoption of cloud computing, securing cloud-based systems and applications has become a critical concern for almost every...

    Saida Farhat, Manel Abdelkader, ... Faouzi Zarai in International Journal of Information Security
    Article 13 July 2023
  2. Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems

    Modern automobiles are equipped with connectivity features to enhance the user’s comfort. Bluetooth is one such communication technology that is used...

    Vishnu Renganathan, Ekim Yurtsever, ... Aylin Yener in Cybersecurity
    Article Open access 04 October 2022
  3. Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine

    Server-side malware is one of the prevalent threats that can affect a large number of clients who visit the compromised server. In this paper, we...
    Bora Lee, Kyungchan Lim, ... Yonghwi Kwon in Information Security Applications
    Conference paper 2023
  4. Modelling and Impact Analysis of Antipode Attack in Bufferless On-Chip Networks

    With advancements in VLSI technology, Tiled Chip Multicore Processors (TCMP) with packet switching Network-on-Chip (NoC) have evolved as the backbone...

    Rose George Kunthara, V. R. Josna, ... John Jose in SN Computer Science
    Article 25 March 2023
  5. Attack Vectors

    The first step in establishing a secure cloud environment is understanding the threats it’s likely to encounter. The attack vectors that your...
    Morey J. Haber, Brian Chappell, Christopher Hills in Cloud Attack Vectors
    Chapter 2022
  6. Application and Mitigation of the Evasion Attack against a Deep Learning Based IDS for IoT

    An Internet of Things (IoT) network is characterized by ad-hoc connectivity and varying traffic patterns where the routing topology evolves over time...
    Nicholas Lurski, Mohamed Younis in Machine Learning for Networking
    Conference paper 2022
  7. Small-signal stability and robustness analysis for microgrids under time-constrained DoS attacks and a mitigation adaptive secondary control method

    With the close integration of cyber and power systems, the consensus-based secondary frequency control in a microgrid is increasingly vulnerable to...

    Qiuye Sun, Bingyu Wang, ... Shiyan Hu in Science China Information Sciences
    Article 26 April 2022
  8. Slow Subscribers: a novel IoT-MQTT based denial of service attack

    MQTT, a popular IoT messaging protocol, is frequently associated with numerous vulnerabilities, the majority of which are critical. Many IoT devices...

    Yifeng Liu, Eyhab Al-Masri in Cluster Computing
    Article 09 November 2022
  9. Optimized graph transformer with molecule attention network based multi class attack detection framework for enhancing privacy and security in WSN

    In today's rapidly evolving network landscape, cybersecurity has become increasingly crucial. However, wireless sensor networks face unique...

    M. Anoop, L. William Mary, ... W. S. Kiran in Multimedia Tools and Applications
    Article 15 June 2024
  10. Early web application attack detection using network traffic analysis

    The number of deployed web applications and the number of web-based attacks in the last decade are constantly increasing. One group of tools that...

    Branislav Rajić, Žarko Stanisavljević, Pavle Vuletić in International Journal of Information Security
    Article 26 October 2022
  11. A survey on run-time packers and mitigation techniques

    The battle between malware analysts and malware authors is a never-ending challenge with the advent of complex malware such as polymorphic,...

    Ehab Alkhateeb, Ali Ghorbani, Arash Habibi Lashkari in International Journal of Information Security
    Article 01 November 2023
  12. IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks

    Wireless Sensor Networks (WSNs) play a vital role in various applications, necessitating robust network security to protect sensitive data. Intrusion...

    Vandana Shakya, Jaytrilok Choudhary, Dhirendra Pratap Singh in Multimedia Tools and Applications
    Article 08 February 2024
  13. Intelligent Solutions for Attack Mitigation in Zero-Trust Environments

    Many of today’s smart devices are rushed to market with little consideration for basic security and privacy protection, making them easy targets for...
    Mikhail Zolotukhin, Timo Hämäläinen, Pyry Kotilainen in Cyber Security
    Chapter 2022
  14. Attack and anomaly prediction in networks-on-chip of multiprocessor system-on-chip-based IoT utilizing machine learning approaches

    The proliferation of multiprocessor system-on-chip (MPSoC) architectures within the Internet of Things (IoT) has introduced notable security...

    Mohammed Sadoon Hathal, Basma Mohammed Saeed, ... Firas Mahmood Mustafa in Service Oriented Computing and Applications
    Article 08 May 2024
  15. Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and Their Mitigation

    Intrusion Detection Systems (IDS) are essential tools to protect network security from malicious traffic. IDS have recently made significant...
    Hassan Chaitou, Thomas Robert, ... Laurent Pautet in E-Business and Telecommunications
    Conference paper 2023
  16. A novel botnet attack detection for IoT networks based on communication graphs

    Abstract

    Intrusion detection systems have been proposed for the detection of botnet attacks. Various types of centralized or distributed cloud-based...

    David Concejal Muñoz, Antonio del-Corte Valiente in Cybersecurity
    Article Open access 03 December 2023
  17. DDoS attack detection using MLP and Random Forest Algorithms

    Distributed Denial of Service (DDoS) attacks continue to be the most dangerous over the Internet. With the rapid advancement of information and...

    Ashfaq Ahmad Najar, S. Manohar Naik in International Journal of Information Technology
    Article 02 June 2022
  18. Belief-DDoS: step** up DDoS attack detection model using DBN algorithm

    Distributed Denial of Services (DDoS) attacks severely impact various systems. Traditional approaches like signature-based and scrubbing methods...

    Putra Wanda, Marselina Endah Hiswati in International Journal of Information Technology
    Article 11 December 2023
  19. Measuring and achieving test coverage of attack simulations extended version

    Designing secure and reliable systems is a difficult task. Threat modeling is a process that supports the secure design of systems by easing the...

    Simon Hacks, Linus Persson, Nicklas Hersén in Software and Systems Modeling
    Article 17 September 2022
  20. Optimized Edge-cCCN Based Model for the Detection of DDoS Attack in IoT Environment

    In the context of the Internet of Things (IoT), safeguarding against Distributed Denial of Service (DDoS) attacks is critical. This paper introduces...
    Brij B. Gupta, Akshat Gaurav, ... Varsha Arya in Edge Computing – EDGE 2023
    Conference paper 2024
Did you find what you were looking for? Share feedback.