Zobrazeno 1 - 10
of 101
pro vyhledávání: '"Botnet attack"'
Publikováno v:
IEEE Access, Vol 12, Pp 138483-138500 (2024)
The present era is characterized by the interconnection, communication, connectivity, and data exchange of Internet of Things (IoT) devices. However, current systems often neglect to incorporate security protocols for IoT devices in the energy sector
Externí odkaz:
https://doaj.org/article/f5fbd4ed212a41ae84bfaf5c6c724585
Autor:
Moemedi Lefoane, Ibrahim Ghafir, Sohag Kabir, Irfan-Ullah Awan, Khalil El Hindi, Anand Mahendran
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 5, Pp 3904-3919 (2024)
In recent times, the proliferation of Internet of Things (IoT) technology has brought a significant shift in the digital transformation of various industries. The enabling technologies have accelerated this adoption. The possibilities unlocked by IoT
Externí odkaz:
https://doaj.org/article/619f28cd04a946e5ab2f56f0f88166a0
Autor:
Mudasir Ali, Mobeen Shahroz, Muhammad Faheem Mushtaq, Sultan Alfarhood, Mejdl Safran, Imran Ashraf
Publikováno v:
IEEE Access, Vol 12, Pp 40682-40699 (2024)
Cyber attacks are growing with the rapid development and wide use of internet technology. Botnet attack emerged as one of the most harmful attacks. Botnet identification is becoming challenging due to the numerous attack vectors and the ongoing evolu
Externí odkaz:
https://doaj.org/article/59d4e9c2de694a31add0682f60375afd
Yes
In recent times, the proliferation of Internet of Things (IoT) technology has brought a significant shift in the digital transformation of various industries. The enabling technologies have accelerated this adoption. The possibilities unlock
In recent times, the proliferation of Internet of Things (IoT) technology has brought a significant shift in the digital transformation of various industries. The enabling technologies have accelerated this adoption. The possibilities unlock
Externí odkaz:
http://hdl.handle.net/10454/19926
Autor:
Worku Gachena Negera, Friedhelm Schwenker, Degaga Wolde Feyisa, Taye Girma Debelee, Henock Mulugeta Melaku
Publikováno v:
Applied Sciences, Vol 14, Iss 10, p 3966 (2024)
This paper addresses the persistent threat of botnet attacks on IoT devices, emphasizing their continued existence despite various conventional and deep learning methodologies developed for intrusion detection. Utilizing the Bot-IoT dataset, we propo
Externí odkaz:
https://doaj.org/article/cbc4ee988dd5482489d89d578dc4ccf6
Publikováno v:
IEEE Access, Vol 11, Pp 49153-49171 (2023)
Software-Defined Networking (SDN) is an emerging architecture that enables flexible and easy management and communication of large-scale networks. It offers programmable and centralized interfaces for making complex network decisions dynamically and
Externí odkaz:
https://doaj.org/article/1e2047b1e3e14f8798d49f4a547135c0
Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks
Yes
The world has seen exponential growth in deploying Internet of Things (IoT) devices. In recent years, connected IoT devices have surpassed the number of connected non-IoT devices. The number of IoT devices continues to grow and they are beco
The world has seen exponential growth in deploying Internet of Things (IoT) devices. In recent years, connected IoT devices have surpassed the number of connected non-IoT devices. The number of IoT devices continues to grow and they are beco
Externí odkaz:
http://hdl.handle.net/10454/19101
Autor:
Vennapureddy Rajasree, Srinivasulu T.
Publikováno v:
E3S Web of Conferences, Vol 591, p 09012 (2024)
A comprehensive search for primary research published between 2014 and 2023 was carried across several databases. Studies that describe the application of machine learning (ML) and deep learning techniques for if they was carried out across several d
Externí odkaz:
https://doaj.org/article/c12c623425c54d51b73b1a15cbbbd074
Yes
Multi-stage attacks (MSAs) are among the most serious threats in cyberspace today. Criminals target big organisations and government critical infrastructures mainly for financial gain. These attacks are becoming more advanced and stealthier,
Multi-stage attacks (MSAs) are among the most serious threats in cyberspace today. Criminals target big organisations and government critical infrastructures mainly for financial gain. These attacks are becoming more advanced and stealthier,
Externí odkaz:
http://hdl.handle.net/10454/19326
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.