We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack

    Information and Communication Technologies and Internet networks are present in all aspects of social reality and are essential elements in research,...

    Joaquín Navajas-Adán, Eulàlia Badia-Gelabert, ... Rafael Mayo-García in International Journal of Information Security
    Article Open access 04 April 2024
  2. Grou** and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks

    Cyber-attacks are a continuing problem. These attacks are problematic for users who are visually impaired and cannot rely on visual cues to indicate...

    Keith S. Jones, Natalie R. Lodinger, ... Miriam Armstrong in Journal on Multimodal User Interfaces
    Article 01 November 2022
  3. Enhancing attack resilience of cyber-physical systems through state dependency graph models

    This paper presents a method that utilizes graph theory and state modelling algorithms to perform automatic complexity analysis of the architecture...

    Konstantinos Adamos, George Stergiopoulos, ... Dimitris Gritzalis in International Journal of Information Security
    Article Open access 22 July 2023
  4. A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things

    With rapid development and deployment of artificial intelligence methods, the Industrial Internet of Things (IIoT) has highly developed to fast...

    Alireza Souri, Monire Norouzi, Yousef Alsenani in Cluster Computing
    Article 02 November 2023
  5. Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree

    Billions of gadgets are already online, making the IoT an essential aspect of daily life. However, the interconnected nature of IoT devices also...

    Surjeet Dalal, Umesh Kumar Lilhore, ... Amel Ksibi in Journal of Cloud Computing
    Article Open access 29 September 2023
  6. On specification-based cyber-attack detection in smart grids

    The transformation of power grids into intelligent cyber-physical systems brings numerous benefits, but also significantly increases the surface for...

    Ă–mer Sen, Dennis van der Velde, ... Martin Henze in Energy Informatics
    Article Open access 07 September 2022
  7. Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

    There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive approach is proposed in this assessment to deal with...

    Surjeet Dalal, Poongodi Manoharan, ... Kaamran Raahemifar in Journal of Cloud Computing
    Article Open access 23 January 2023
  8. MDepthNet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement

    Develo** technologies over digitalization have become more popular and become a threat to society and cybersecurity. Generally, the phishing method...

    Anil Kumar Yamarthy, Ch Koteswararao in Cluster Computing
    Article 29 February 2024
  9. Cyber-Attack Detection Using Machine Learning Technique

    Cybersecurity is crucial for protecting users of the internet on various electronic devices in everyday life. It is crucial for safeguarding some...
    Karan Singh, Surbhi Singh, ... Ravi Shankar Jha in Cyber Security and Digital Forensics
    Conference paper 2024
  10. Salp Swarm-Artificial Neural Network Based Cyber-Attack Detection in Smart Grid

    Smart Grid (SG) can be easily attacked by smart hackers who try to corrupt the data aggregated by the acquisition system and supervisory control. The...

    Arifa Sultana, Aroop Bardalai, Kandarpa Kumar Sarma in Neural Processing Letters
    Article 09 February 2022
  11. Cyber-Attack Analysis Using Vulnerability Assessment and Penetration Testing

    Networks and systems like computers and mobile devices are not secure enough and are vulnerable to numerous types of cyber-threats. The frequency of...
    Vijayashree Budyal, A. V. Vaibhav, ... Gaonkar Unnathi in Cyber Security and Digital Forensics
    Conference paper 2024
  12. URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures

    Contrary to intuition, insecure computer network architectures are valuable assets in IT security. Indeed, such architectures (referred to as...
    Pierre-Victor Besson, Valérie Viet Triem Tong, ... Erwan Abgrall in Foundations and Practice of Security
    Conference paper 2024
  13. Locating collaborative attack targets based on physical invariants toward cyber-physical systems

    Various studies have demonstrated that the collaborative false command injection (FCI) and false sensory data injection (FDI) attacks can go...

    Peng Xun, Ziyu Yang, ... Zhu Tang in International Journal of Information Security
    Article 08 November 2023
  14. Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework

    The widespread use of smart devices and the numerous security weaknesses of networks has dramatically increased the number of cyber-attacks in the...

    Olivia Jullian, Beatriz Otero, ... Ramon Canal in Journal of Network and Systems Management
    Article Open access 04 February 2023
  15. Trust and Blame in Self-driving Cars Following a Successful Cyber Attack

    Even as our ability to counter cyber attacks improves, it is inevitable that threat actors may compromise a system through either exploited...
    Victoria Marcinkiewicz, Phillip L. Morgan in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2023
  16. Cyber-Attack Detection in Cyber-Physical Systems Using Supervised Machine Learning

    Cyber-Physical Systems (CPS) are where the physical processes are controlled by computation and other technology components. Although, the...
    Prabhat Semwal, Akansha Handa in Handbook of Big Data Analytics and Forensics
    Chapter 2022
  17. Cyber-attack Proactive Defense Using Multivariate Time Series and Machine Learning with Fuzzy Inference-based Decision System

    Cybersecurity incidents have dramatically increased in the recent years. The number of cyber-attack variants is also increasing, thus traditional...
    Rahmoune Bitit, Abdelouahid Derhab, ... Mohamed Belaoued in Machine Learning for Networking
    Conference paper 2023
Did you find what you were looking for? Share feedback.