Zobrazeno 1 - 10
of 1 303
pro vyhledávání: '"Network attack"'
Publikováno v:
Engineering, Construction and Architectural Management, 2023, Vol. 31, Issue 9, pp. 3773-3800.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ECAM-10-2022-0959
Autor:
Edelman, R. David
Publikováno v:
Rethinking Cyber Warfare: The International Relations of Digital Disruption.
Externí odkaz:
https://doi.org/10.1093/9780197509715.003.0003
Autor:
Hoang Thi Phuong
Publikováno v:
Tạp chí Khoa học, Vol 53, Iss 2A, Pp 5-14 (2024)
This paper focuses on proposing a network intrusion detection model applying fundamental machine learning techniques to enhance early detection of network intrusions (rapid detection of attack behaviors) for improved efficiency in preventing netwo
Externí odkaz:
https://doaj.org/article/34949f9dc0b94f2b80e1014181d59209
Publikováno v:
International Journal of Intelligent Computing and Cybernetics, 2023, Vol. 17, Issue 1, pp. 38-60.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJICC-05-2023-0121
Publikováno v:
Frontiers in Energy Research, Vol 12 (2024)
In today’s digital age, multi-energy systems (MES) have become an indispensable part of the social infrastructure, providing people with diversified energy support such as electricity, gas, water and so on. However, with the increasing popularity a
Externí odkaz:
https://doaj.org/article/fedf9098e6f24976b51db755b06f7c10
Publikováno v:
Proceedings on Engineering Sciences, Vol 6, Iss 1, Pp 311-320 (2024)
Effective intrusion detection systems (IDS) are becoming essential for maintaining computer network security due to the growing complexity of cyber-attacks. Machine Learning (ML) can increase the effectiveness of intrusion detection technology, which
Externí odkaz:
https://doaj.org/article/f4eea0a4cd9241769880e1da3e25f2e6
Publikováno v:
IET Communications, Vol 18, Iss 4, Pp 297-308 (2024)
Abstract In today's digital landscape, cybercriminals are constantly evolving their tactics, making it challenging for traditional cybersecurity methods to keep up. To address this issue, this study explores the potential of knowledge graph reasoning
Externí odkaz:
https://doaj.org/article/aac27af52673405a9405e4a39cb10493
Publikováno v:
AIMS Mathematics, Vol 9, Iss 1, Pp 1535-1561 (2024)
With the widespread application of smart devices, the security of internet of things (IoT) systems faces entirely new challenges. The IoT data stream operates in a non-stationary, dynamic environment, making it prone to concept drift. This paper focu
Externí odkaz:
https://doaj.org/article/ea883216cb424d21a7448be27c8dd861
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-17 (2024)
Abstract In the context of cloud computing, network attackers usually exhibit complex, dynamic, and diverse behavior characteristics. Existing research methods, such as Bayesian attack graphs, lack evidence correlation and real-time reflection of the
Externí odkaz:
https://doaj.org/article/f02a1111eb7c4229b2dfd1247063db97
Autor:
Miada Almasre, Alanoud Subahi
Publikováno v:
Journal of Sensor and Actuator Networks, Vol 13, Iss 5, p 62 (2024)
The increased use of Internet of Things (IoT) devices has led to greater threats to privacy and security. This has created a need for more effective cybersecurity applications. However, the effectiveness of these systems is often limited by the lack
Externí odkaz:
https://doaj.org/article/60bca010a4d5444bb39c1d34c9e500c6