Zobrazeno 1 - 10
of 520
pro vyhledávání: '"Hardware performance"'
Publikováno v:
IEEE Access, Vol 12, Pp 63865-63884 (2024)
Ransomware is a type of malicious software designed to encrypt a user’s important data for the purpose of extortion, with a global annual impact of billions of dollars in damages. This research proposes a side-channel-based ransomware detection met
Externí odkaz:
https://doaj.org/article/0ac05952e84641cb9927b77d5634ec3e
Publikováno v:
IEEE Access, Vol 11, Pp 51395-51407 (2023)
Ransomware often evades antivirus tools, encrypts files, and renders the target computer and its data unusable. The current approaches to detect such ransomware include monitoring processes, system calls, and file activities on the target system and
Externí odkaz:
https://doaj.org/article/ff14e7714b8d4a0f8bc988a0812a39e1
Publikováno v:
IEEE Access, Vol 11, Pp 48099-48112 (2023)
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers have proposed software-based defense approaches that can detect the security attacks. Profiling-based detectors are lightweight detection solut
Externí odkaz:
https://doaj.org/article/11025b34b91e4b969f9a6b3f5eb3696b
Publikováno v:
Energy Reports, Vol 8, Iss , Pp 11221-11234 (2022)
Distributed generation (DG) and microgrids (MG) are critical components of future power systems. However, the reliance of DGs and MG on resource-constrained embedded controllers for their operation renders them potential cyberattack targets. In this
Externí odkaz:
https://doaj.org/article/b907b67bc1b445caac89f1b7f40ba0d7
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Kumar Lalit, Singh Dushyant Kumar
Publikováno v:
Cybernetics and Information Technologies, Vol 22, Iss 3, Pp 68-81 (2022)
With the advancement in technological world, the technologies like Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) are gaining more popularity in many applications of computer vision like object classification, object dete
Externí odkaz:
https://doaj.org/article/d94e653c1e8a4e4eaf80d596967ecfac
Publikováno v:
IEEE Access, Vol 10, Pp 117597-117610 (2022)
Ransomware has been one of the biggest cyber threats against consumers in recent years. It can leverage various attack vectors while it also evolves in terms of finding more innovative ways to invade different cyber security systems. There have been
Externí odkaz:
https://doaj.org/article/2bedb475d4ac4b8794dcc2b2854d4d3f
Publikováno v:
IEEE Access, Vol 10, Pp 23511-23531 (2022)
In the aftermath of Spectre and Meltdown researchers have proposed a variety of attack detection solutions by applying machine learning to data collected from hardware performance monitoring units. Although many microarchitectural attack detection sy
Externí odkaz:
https://doaj.org/article/529e22255c1d4db09ad111ab270f215a
Publikováno v:
BenchCouncil Transactions on Benchmarks, Standards and Evaluations, Vol 2, Iss 4, Pp 100084- (2022)
Rapid business expansion of various companies has placed growing demand on office desktops recent decades. However, improper evaluation of system performance and inexplicit awareness of practical use conditions often hamper the efforts to make a cons
Externí odkaz:
https://doaj.org/article/7d35b038f4c946eb83dc970ffa706ad7