Zobrazeno 1 - 10
of 105
pro vyhledávání: '"Daesung Moon"'
Publikováno v:
Applied Sciences, Vol 14, Iss 17, p 7714 (2024)
Anomaly detection involves identifying data that deviates from normal patterns. Two primary strategies are used: one-class classification and binary classification. In Industrial Control Systems (ICS), where anomalies can cause significant damage, ti
Externí odkaz:
https://doaj.org/article/7d51d31ac5b641d5b0be08c666d133c1
Publikováno v:
IEEE Access, Vol 7, Pp 15521-15536 (2019)
New vehicles have become increasingly targeted for cyber-attacks as their rate of digitalization is accelerated. Research on vehicle hacking has highlighted the security vulnerabilities of in-vehicle controller area networks (CANs) as the biggest pro
Externí odkaz:
https://doaj.org/article/a6e4444eceea447aac565c0c9e399b4c
Publikováno v:
Symmetry, Vol 6, Iss 4, Pp 997-1010 (2014)
Here we report on the issue of Advanced Persistent Threats (APT), which use malware for the purpose of leaking the data of large corporations and government agencies. APT attacks target systems continuously by utilizing intelligent and complex techno
Externí odkaz:
https://doaj.org/article/eee16ed6648e46bcb4be088a8e47b171
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 10 (2014)
With the expansion of the Cyber-Physical System (CPS) concept, smartphones have come to constitute a competitive platform that connects humans and the surrounding physical world. Along with the communication functions and mobility of cellular phones,
Externí odkaz:
https://doaj.org/article/52bbd8720724485d8a65ba3e1bd3c905
Publikováno v:
Journal of Applied Mathematics, Vol 2014 (2014)
Internet of Things (IoT) brings telemedicine a new chance. This enables the specialist to consult the patient’s condition despite the fact that they are in different places. Medical image segmentation is needed for analysis, storage, and protection
Externí odkaz:
https://doaj.org/article/e470bc03ee284fe689e64e3d93b109cd
Publikováno v:
EURASIP Journal on Advances in Signal Processing, Vol 2009 (2009)
As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stor
Externí odkaz:
https://doaj.org/article/b10df692039a4b5bb31e7c54d5b707d5
Publikováno v:
IEICE Transactions on Information and Systems. :1872-1879
Publikováno v:
IEEE Access, Vol 7, Pp 15521-15536 (2019)
New vehicles have become increasingly targeted for cyber-attacks as their rate of digitalization is accelerated. Research on vehicle hacking has highlighted the security vulnerabilities of in-vehicle controller area networks (CANs) as the biggest pro
Publikováno v:
ICTC
This paper summarizes the attack using SIB message in 4G LTE environment as a cornerstone for vulnerability research in the future 5G environment. In addition, the overall configuration of 4G LTE environment, vulnerabilities in attach and paging proc
Publikováno v:
The Journal of Supercomputing. 75:3028-3045
Automation in cyber security can be achieved by using attack graphs. Attack graphs allow us to model possible paths that a potential attacker can use to intrude into a target network. In particular, graph representation is often used to increase visi