Zobrazeno 1 - 10
of 9 805
pro vyhledávání: '"Security information and event management"'
Autor:
Akashdeep Bhardwaj, Salil Bharany, Ashraf Osman Ibrahim, Ahmad Almogren, Ateeq Ur Rehman, Habib Hamam
Publikováno v:
Egyptian Informatics Journal, Vol 27, Iss , Pp 100513- (2024)
The concept of the Internet of Things (IoT) threat surface refers to the overall susceptibility of smart devices to potential security risks. This vulnerability includes the combined impact of security weaknesses, gaps in protective measures, and pot
Externí odkaz:
https://doaj.org/article/2d802fac30d944a8b6f4fbd8f6bffbeb
Publikováno v:
IEEE Access, Vol 11, Pp 91913-91936 (2023)
Data networks and computing devices have experienced exponential growth. Within a short span of time, they have opened new digital frontiers while also bringing forth new threats. These threats have the potential to increase costs and disrupt regular
Externí odkaz:
https://doaj.org/article/9db9c1d03f2a4e76a59d3fd8a2f13b09
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IET Energy Systems Integration, Vol 4, Iss 2, Pp 159-170 (2022)
Abstract With the development of digitalisation and intelligence, the power system has been upgraded from the traditional single energy transmission and conversion system to a complex cyber‐physical power system (CPPS) with tightly coupled energy a
Externí odkaz:
https://doaj.org/article/2ea6ee07cc9b4aaa9b566faa8f39679a
Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning
Autor:
Muhammad Arsalan Paracha, Muhammad Sadiq, Junwei Liang, Muhammad Hanif Durad, Muhammad Sheeraz
Publikováno v:
Sensors, Vol 23, Iss 13, p 5829 (2023)
The advancements and reliance on digital data necessitates dependence on information technology. The growing amount of digital data and their availability over the Internet have given rise to the problem of information security. With the increase in
Externí odkaz:
https://doaj.org/article/03b762fae78543d9b6d4d243c99600a7
Publikováno v:
Cybersecurity, Vol 2, Iss 1, Pp 1-15 (2019)
Abstract Humans are commonly seen as the weakest link in corporate information security. This led to a lot of effort being put into security training and awareness campaigns, which resulted in employees being less likely the target of successful atta
Externí odkaz:
https://doaj.org/article/92e02c947260486fb0770df0bad1c294
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Miloslavskaya, Natalia
Publikováno v:
Information & Computer Security, 2018, Vol. 26, Issue 4, pp. 491-512.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-10-2017-0075
Multi-Layered Filtration Framework for Efficient Detection of Network Attacks Using Machine Learning
Autor:
Sheeraz, Muhammad Arsalan Paracha, Muhammad Sadiq, Junwei Liang, Muhammad Hanif Durad, Muhammad
Publikováno v:
Sensors; Volume 23; Issue 13; Pages: 5829
The advancements and reliance on digital data necessitates dependence on information technology. The growing amount of digital data and their availability over the Internet have given rise to the problem of information security. With the increase in