Search
Search Results
-
Data breaches in healthcare: security mechanisms for attack mitigation
The digitalisation of healthcare has increased the risk of cyberattacks in this sector, targeting sensitive personal information. In this paper, we...
-
Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks
This article focuses on the urgent cybersecurity concerns in the Internet of Things (IoT) environment, highlighting the crucial importance of...
-
Email bombing attack detection and mitigation using machine learning
Email bombing, a growingly prevalent and destructive cyber attack, involves inundating a target’s email inbox with subscription confirmation messages...
-
Mitigation of DDoS Attack Using Moving Target Defense in SDN
Software-defined networking (SDN) is a trending networking paradigm that focuses on decoupling of the control logic from the data plane. This...
-
Attack Mitigation and Recovery in Smart Grid Control
This chapter explores the critical domain of attack mitigation and recovery within the context of smart grid control systems. As smart grids become... -
Attack Mitigation for the Corrective Controller With FPGA Implementation on a Space-borne Digital System
This article studies an attack mitigation strategy for the corrective control system of input/state asynchronous sequential machines (ASMs). The...
-
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices
In recent times, networks have been prone to several types of attacks, such as DDoS attacks, volumetric attacks, replay attacks, eavesdrop**, etc.,...
-
Cyber attack detection and mitigation process in cloud via deep hybrid model with selected feature set
For ensuring the proper operation of CPS, it is required to obtain a solution to the security problem. Applications for cyber-physical systems (CPS)...
-
A survey on cognitive radio network attack mitigation using machine learning and blockchain
Cognitive radio network is a promising technology to enhance the spectrum utilization and to resolve the spectrum scarcity issues. But the malicious...
-
A Survey: Network Attack Detection and Mitigation Techniques
Network attack detection and mitigation systems (NADMS) is developed as defending software to detect malicious cyber-attacks, safeguard critical... -
IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity
The performance of named data networking (NDN) depends on the caching efficiency of routers. Cache pollution attack (CPA) refers to colonization of...
-
Phishing Attack Types and Mitigation: A Survey
The proliferation of the internet and computing devices has drawn much attention during the Covid-19 pandemic stay home and work, and this has led... -
Denial-of-Service Attack Mitigation in Multi-hop 5G D2D Wireless Communication Networks Employing Double Auction Game
The advent of Fifth-Generation (5G) networks has led to the enhancement of digital connectivity throughout the world. Device-to-Device (D2D) or...
-
A Deep Reinforcement Learning-based DDoS Attack Mitigation Scheme for Securing Big Data in Fog-Assisted Cloud Environment
Cloud computing is supported by Fog computing paradigm for achieving local data investigation at edge devices by offering storage support,...
-
Impact Estimation of Security Attack and Mitigation Strategy using Goal-Based Threat Modeling in a Peer-to-Peer Cloud System
Addressing non-functional requirements is essential in Requirements Engineering and this also covers security requirements of any system. Threat...
-
Detection and Mitigation of ARP Spoofing Attack
The address resolution protocol (ARP) is the fundamental method of data communication in which packets are sent across the network between client and... -
IoT authentication model with optimized deep Q network for attack detection and mitigation
The Internet of Things (IoT) is a promising area in day-to-day lives, like homes, health, military, and agriculture. The expansion of IoT technology...
-
Mitigation of a poisoning attack in federated learning by using historical distance detection
Federated learning provides a way to achieve joint model training while kee** the data of every party stored locally, and it protects the data...
-
Solidity Smart Contract Vulnerabilities, Attack Scenarios, and Mitigation—A Survey
Blockchain technology has risen phenomenally in the last decade, making it the preferred platform for the transfer of digital assets. Unfortunately,... -
“We Must Protect the Transformers”: Understanding Efficacy of Backdoor Attack Mitigation on Transformer Models
Recently, Neural Network based Deep Learning (DL) backdoor attacks have prompted the development of mitigation mechanisms for such attacks. Out of...