We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Data breaches in healthcare: security mechanisms for attack mitigation

    The digitalisation of healthcare has increased the risk of cyberattacks in this sector, targeting sensitive personal information. In this paper, we...

    Lili Nemec Zlatolas, Tatjana Welzer, Lenka Lhotska in Cluster Computing
    Article Open access 13 April 2024
  2. Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks

    This article focuses on the urgent cybersecurity concerns in the Internet of Things (IoT) environment, highlighting the crucial importance of...

    Sonam Bhardwaj, Mayank Dave in Telecommunication Systems
    Article 15 February 2024
  3. Email bombing attack detection and mitigation using machine learning

    Email bombing, a growingly prevalent and destructive cyber attack, involves inundating a target’s email inbox with subscription confirmation messages...

    Sanjeev Shukla, Manoj Misra, Gaurav Varshney in International Journal of Information Security
    Article 13 June 2024
  4. Mitigation of DDoS Attack Using Moving Target Defense in SDN

    Software-defined networking (SDN) is a trending networking paradigm that focuses on decoupling of the control logic from the data plane. This...

    Rochak Swami, Mayank Dave, Virender Ranga in Wireless Personal Communications
    Article 13 June 2023
  5. Attack Mitigation and Recovery in Smart Grid Control

    This chapter explores the critical domain of attack mitigation and recovery within the context of smart grid control systems. As smart grids become...
    Amulya Sreejith, K. Shanti Swarup in Cyber-Security for Smart Grid Control
    Chapter 2024
  6. Attack Mitigation for the Corrective Controller With FPGA Implementation on a Space-borne Digital System

    This article studies an attack mitigation strategy for the corrective control system of input/state asynchronous sequential machines (ASMs). The...

    Article 25 September 2023
  7. A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices

    In recent times, networks have been prone to several types of attacks, such as DDoS attacks, volumetric attacks, replay attacks, eavesdrop**, etc.,...

    Sankepally Sainath Reddy, Kosaraju Nishoak, ... U. Venkanna in Journal of Network and Systems Management
    Article 01 November 2023
  8. Cyber attack detection and mitigation process in cloud via deep hybrid model with selected feature set

    For ensuring the proper operation of CPS, it is required to obtain a solution to the security problem. Applications for cyber-physical systems (CPS)...

    Article 05 February 2024
  9. A survey on cognitive radio network attack mitigation using machine learning and blockchain

    Cognitive radio network is a promising technology to enhance the spectrum utilization and to resolve the spectrum scarcity issues. But the malicious...

    I. Evelyn Ezhilarasi, J. Christopher Clement, Joseph M. Arul in EURASIP Journal on Wireless Communications and Networking
    Article Open access 30 September 2023
  10. A Survey: Network Attack Detection and Mitigation Techniques

    Network attack detection and mitigation systems (NADMS) is developed as defending software to detect malicious cyber-attacks, safeguard critical...
    Om Shinde, Varad Kulkarni, ... R. C. Jaiswal in Smart Trends in Computing and Communications
    Conference paper 2024
  11. IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity

    The performance of named data networking (NDN) depends on the caching efficiency of routers. Cache pollution attack (CPA) refers to colonization of...

    Naveen Kumar, Shashank Srivastava in Arabian Journal for Science and Engineering
    Article 31 May 2023
  12. Phishing Attack Types and Mitigation: A Survey

    The proliferation of the internet and computing devices has drawn much attention during the Covid-19 pandemic stay home and work, and this has led...
    Mohammed Fahad Alghenaim, Nur Azaliah Abu Bakar, ... Gamal Alkawsi in Data Science and Emerging Technologies
    Conference paper 2023
  13. Denial-of-Service Attack Mitigation in Multi-hop 5G D2D Wireless Communication Networks Employing Double Auction Game

    The advent of Fifth-Generation (5G) networks has led to the enhancement of digital connectivity throughout the world. Device-to-Device (D2D) or...

    Debdas Barik, Judhajit Sanyal, Tuhina Samanta in Journal of Network and Systems Management
    Article 05 October 2022
  14. A Deep Reinforcement Learning-based DDoS Attack Mitigation Scheme for Securing Big Data in Fog-Assisted Cloud Environment

    Cloud computing is supported by Fog computing paradigm for achieving local data investigation at edge devices by offering storage support,...

    Sengathir Janakiraman, M. Deva Priya in Wireless Personal Communications
    Article 26 April 2023
  15. Impact Estimation of Security Attack and Mitigation Strategy using Goal-Based Threat Modeling in a Peer-to-Peer Cloud System

    Addressing non-functional requirements is essential in Requirements Engineering and this also covers security requirements of any system. Threat...

    Sanghamitra De, Mridul Sankar Barik, Indrajit Banerjee in Journal of The Institution of Engineers (India): Series B
    Article 10 August 2022
  16. Detection and Mitigation of ARP Spoofing Attack

    The address resolution protocol (ARP) is the fundamental method of data communication in which packets are sent across the network between client and...
    Swati Jadhav, Arjun Thakur, ... Sankalp Chordia in International Conference on Innovative Computing and Communications
    Conference paper 2023
  17. IoT authentication model with optimized deep Q network for attack detection and mitigation

    The Internet of Things (IoT) is a promising area in day-to-day lives, like homes, health, military, and agriculture. The expansion of IoT technology...

    Article 28 February 2022
  18. Mitigation of a poisoning attack in federated learning by using historical distance detection

    Federated learning provides a way to achieve joint model training while kee** the data of every party stored locally, and it protects the data...

    Zhaosen Shi, Xuyang Ding, ... Canran Li in Annals of Telecommunications
    Article 26 October 2022
  19. Solidity Smart Contract Vulnerabilities, Attack Scenarios, and Mitigation—A Survey

    Blockchain technology has risen phenomenally in the last decade, making it the preferred platform for the transfer of digital assets. Unfortunately,...
    Conference paper 2023
  20. “We Must Protect the Transformers”: Understanding Efficacy of Backdoor Attack Mitigation on Transformer Models

    Recently, Neural Network based Deep Learning (DL) backdoor attacks have prompted the development of mitigation mechanisms for such attacks. Out of...
    Rohit Raj, Biplab Roy, ... Mainack Mondal in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2024
Did you find what you were looking for? Share feedback.