Zobrazeno 1 - 10
of 155
pro vyhledávání: '"Frederick T. Sheldon"'
Publikováno v:
Sensors, Vol 24, Iss 14, p 4737 (2024)
Multiplayer online video games are a multibillion-dollar industry, to which widespread cheating presents a significant threat. Game designers compromise on game security to meet demanding performance targets, but reduced security increases the risk o
Externí odkaz:
https://doaj.org/article/d0e3743987b0427a9e3d6e087aed92ea
Autor:
Mazen Gazzan, Frederick T. Sheldon
Publikováno v:
Information, Vol 15, Iss 5, p 262 (2024)
Ransomware poses a significant threat by encrypting files or systems demanding a ransom be paid. Early detection is essential to mitigate its impact. This paper presents an Uncertainty-Aware Dynamic Early Stopping (UA-DES) technique for optimizing De
Externí odkaz:
https://doaj.org/article/8d1f742b7d184318b415118ac311d82c
Publikováno v:
Future Internet, Vol 16, Iss 4, p 110 (2024)
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhe
Externí odkaz:
https://doaj.org/article/d79c0209e2a7426ea42a26137da0cd73
Autor:
Mazen Gazzan, Frederick T. Sheldon
Publikováno v:
Information, Vol 15, Iss 4, p 194 (2024)
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber–Physical Systems. This study addresses the need to detect early ransomware behavior when only limit
Externí odkaz:
https://doaj.org/article/092c7b896db64661a368eeab86eb5ef2
Publikováno v:
Sensors, Vol 24, Iss 6, p 1728 (2024)
Early detection of ransomware attacks is critical for minimizing the potential damage caused by these malicious attacks. Feature selection plays a significant role in the development of an efficient and accurate ransomware early detection model. In t
Externí odkaz:
https://doaj.org/article/aa00a9a531554ede9bf44dbe0afe6b4a
Publikováno v:
Algorithms, Vol 17, Iss 3, p 99 (2024)
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infra
Externí odkaz:
https://doaj.org/article/9b28705af6b24293b81e4c809cc91c5d
Autor:
Mazen Gazzan, Frederick T. Sheldon
Publikováno v:
Future Internet, Vol 15, Iss 10, p 318 (2023)
Recent ransomware attacks threaten not only personal files but also critical infrastructure like smart grids, necessitating early detection before encryption occurs. Current methods, reliant on pre-encryption data, suffer from insufficient and rapidl
Externí odkaz:
https://doaj.org/article/447183507f1b4f96a34125a748060ccc
Autor:
Ananth A. Jillepalli, Daniel Conte De Leon, Jim Alves-Foss, Clinton L. Jeffery, Frederick T. Sheldon
Publikováno v:
IEEE Access, Vol 10, Pp 83755-83792 (2022)
Due to the characteristics and connectivity of today’s critical infrastructure systems, cyber-attacks on these systems are currently difficult to prevent in an efficient and sustainable manner. Prevention and mitigation strategies need accurate ide
Externí odkaz:
https://doaj.org/article/4774f16c064a4abd82122e1f39baadb8
Publikováno v:
Sensors, Vol 23, Iss 9, p 4355 (2023)
Ransomware is a type of malware that employs encryption to target user files, rendering them inaccessible without a decryption key. To combat ransomware, researchers have developed early detection models that seek to identify threats before encryptio
Externí odkaz:
https://doaj.org/article/21b8115f3e42415c8ba3e418de4b00c7
Autor:
Mazen Gazzan, Frederick T. Sheldon
Publikováno v:
Future Internet, Vol 15, Iss 4, p 144 (2023)
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems, which control critical infrastructure such as power plants and water treatment facilities, have unique characteristics that make them vulnerable to ransomw
Externí odkaz:
https://doaj.org/article/9c6eed6ab7a544cea5788926c6690d9d