Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Sharmin, Nazia"'
Autor:
Roy, Shanto, Sharmin, Nazia, Miah, Mohammad Sujan, Acosta, Jaime C, Kiekintveld, Christopher, Laszka, Aron
Adversarial reconnaissance is a crucial step in sophisticated cyber-attacks as it enables threat actors to find the weakest points of otherwise well-defended systems. To thwart reconnaissance, defenders can employ cyber deception techniques, such as
Externí odkaz:
http://arxiv.org/abs/2306.06769
Adversaries are often able to penetrate networks and compromise systems by exploiting vulnerabilities in people and systems. The key to the success of these attacks is information that adversaries collect throughout the phases of the cyber kill chain
Externí odkaz:
http://arxiv.org/abs/2105.04749
Autor:
Anjum, Iffat, Miah, Mohammad Sujan, Zhu, Mu, Sharmin, Nazia, Kiekintveld, Christopher, Enck, William, Singh, Munindar P
Publikováno v:
AAAI Workshop on Artificial Intelligence for Cyber Security (AICS), 2020
Enterprises are increasingly concerned about adversaries that slowly and deliberately exploit resources over the course of months or even years. A key step in this kill chain is network reconnaissance, which has historically been active (e.g., networ
Externí odkaz:
http://arxiv.org/abs/2002.09069
Autor:
ROY, SHANTO1 sroy10@uh.edu, SHARMIN, NAZIA2 nsharmin@miners.utep.edu, ACOSTA, JAIME C.3 jaime.c.acosta.civ@army.mil, KIEKINTVELD, CHRISTOPHER2 cdkiekintveld@utep.edu, LASZKA, ARON1 alaszka@uh.edu
Publikováno v:
ACM Computing Surveys. Jul2023, Vol. 55 Issue 6, p1-38. 38p.
Autor:
Abbas, Mohammed Faris, Mohammed, Ansam Adil, Mohammed, Akeel Abdullah, Channapattana, Shylesha, Parlak, Zekeriya
Publikováno v:
Al-Nahrain Journal for Engineering Sciences; 2024, Vol. 27 Issue 2, p207-225, 19p
This text discusses smart grid technologies including home energy management systems, demand management systems, source-side management systems and communication technologies for power supply management, and supervisory control and data acquisition.