Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Azril Azam Abdul Rahim"'
Cyber-attacks are launched through the exploitation of some existing vulnerabilities in the software, hardware, system and/or network. Machine learning algorithms can be used to forecast the number of post release vulnerabilities. Traditional neural
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e45145573cbd099fc80cb6cce6f59f98
https://zenodo.org/record/5152657
https://zenodo.org/record/5152657
Publikováno v:
2020 8th International Conference on Information Technology and Multimedia (ICIMU).
Securing and protecting Supervisory Control and Data Acquisition (SCADA) systems have been an active topic of research for the past decades due to the catastrophic and disastrous consequences when these systems are breached or compromised. Therefore,
Publikováno v:
2020 8th International Conference on Information Technology and Multimedia (ICIMU).
Cyber Threat Intelligence (CTI) is a concept for information about cyber threats which were analysed, structured, and refined. This information is used to help organizations to understand the current risk that have different levels that might bring h