Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Arkadiusz Warzynski"'
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-18 (2024)
Abstract The botnet attack is one of the coordinated attack types that can infect Internet of Things (IoT) devices and cause them to malfunction. Botnets can steal sensitive information from IoT devices and control them to launch another attack, such
Externí odkaz:
https://doaj.org/article/54b1610e15d441089943d7d08117b86b
Regional Center of Cybersecurity anomaly detection module efficiency in network monitoring scenarios
Publikováno v:
2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE).
Publikováno v:
2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE).
Publikováno v:
Proceedings of the 27th International Conference on Systems Engineering, ICSEng 2020 ISBN: 9783030657956
In recent years the development of complex Internet of Things (IoT) systems and their increased use has resulted in the growing importance of communication services, which task has been to provide uninterrupted and undisturbed communication between n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::344f1c67ec6a86052e33bcb102a986d9
https://doi.org/10.1007/978-3-030-65796-3_20
https://doi.org/10.1007/978-3-030-65796-3_20
Publikováno v:
Proceedings of the 27th International Conference on Systems Engineering, ICSEng 2020 ISBN: 9783030657956
Popularity of Internet of Things (IoT) systems are growing and becoming important role in everyday life. Development of hardware, network infrastructure and software solutions provide an opportunity to take on more responsibility and perform more com
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c2be80235ae720e923dc5e6db3dfd765
https://doi.org/10.1007/978-3-030-65796-3_19
https://doi.org/10.1007/978-3-030-65796-3_19
Publikováno v:
WETICE
The goal of the work is to present a preliminary result of research about trade-off between privacy and utility in network traces. The study is considered in context of anomaly detection module with using neural network. The paper presents work in pr
Publikováno v:
Developments of Artificial Intelligence Technologies in Computation and Robotics.
Autor:
Grzegorz Kołaczek, Arkadiusz Warzynski
Publikováno v:
INISTA
Intrusion detection systems define an important and dynamic research area for cybersecurity. The role of Intrusion Detection System within security architecture is to improve a security level by identification of all malicious and also suspicious eve