Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Tala Tala"'
Autor:
Tala Talaei Khoei, Naima Kaabouch
Publikováno v:
Future Internet, Vol 15, Iss 10, p 332 (2023)
Machine learning techniques have emerged as a transformative force, revolutionizing various application domains, particularly cybersecurity. The development of optimal machine learning applications requires the integration of multiple processes, such
Externí odkaz:
https://doaj.org/article/c428d8a407364513adda0be69267e755
Autor:
Tala Talaei Khoei, Naima Kaabouch
Publikováno v:
Information, Vol 14, Iss 2, p 103 (2023)
Intrusion Detection Systems are expected to detect and prevent malicious activities in a network, such as a smart grid. However, they are the main systems targeted by cyber-attacks. A number of approaches have been proposed to classify and detect the
Externí odkaz:
https://doaj.org/article/000b32e4f6b24893851d45116620d959
Autor:
Tala Talaei Khoei, Shereen Ismail, Khair Al Shamaileh, Vijay Kumar Devabhaktuni, Naima Kaabouch
Publikováno v:
Applied Sciences, Vol 13, Iss 1, p 383 (2022)
GPS spoofing attacks are a severe threat to unmanned aerial vehicles. These attacks manipulate the true state of the unmanned aerial vehicles, potentially misleading the system without raising alarms. Several techniques, including machine learning, h
Externí odkaz:
https://doaj.org/article/9a1afcfc64de44f28334883bbcb9b3a3
Publikováno v:
Sensors, Vol 22, Iss 2, p 662 (2022)
Unmanned aerial vehicles are prone to several cyber-attacks, including Global Positioning System spoofing. Several techniques have been proposed for detecting such attacks. However, the recurrence and frequent Global Positioning System spoofing incid
Externí odkaz:
https://doaj.org/article/e96f73b9be844d789f6eacd962b1bfb1
Publikováno v:
Recherches Sociologiques et Anthropologiques, Vol 42, Iss 1, Pp 138-141 (2011)
Externí odkaz:
https://doaj.org/article/16ddceed0b774cb088fce459df5edb35