Zobrazeno 1 - 10
of 203
pro vyhledávání: '"insider attacks"'
Autor:
Marc Dib, Samuel Pierre
Publikováno v:
IEEE Access, Vol 11, Pp 86848-86858 (2023)
Data security is an increasingly important issue in 2023. Whether about user privacy, data availability, or integrity, consumer information is getting targeted by cyber-pirates for various motives. Many strategies and tools have been developed to kee
Externí odkaz:
https://doaj.org/article/bbd85aa53b8a4d2ea36554ef6c303bb1
Publikováno v:
IEEE Access, Vol 10, Pp 6629-6649 (2022)
In recent decades, cyber security issues in IEC 61850-compliant substation automation systems (SASs) have become growing concerns. Many researchers have developed various strategies to detect malicious behaviours of SASs during the system operational
Externí odkaz:
https://doaj.org/article/e457d79a04a745f99d9ca8e3ae12ac39
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 9, Pp 137260-137280 (2021)
Collaborative Intrusion Detection Systems are considered an effective defense mechanism for large, intricate, and multilayered Industrial Internet of Things against many cyberattacks. However, while a Collaborative Intrusion Detection System successf
Externí odkaz:
https://doaj.org/article/3481753fdff64d75a5a7c999e288ec13
Publikováno v:
IEEE Access, Vol 9, Pp 159587-159597 (2021)
Vehicular Ad-hoc Networks (VANETs) are a type of Internet of Things system where groups of vehicles communicate with each other and traffic monitoring infrastructure in order to provide safety and quality of life improvements for drivers and others i
Externí odkaz:
https://doaj.org/article/c59e390f09d7435a838c9eb5ce282413
Publikováno v:
International Journal of Mathematical, Engineering and Management Sciences, Vol 4, Iss 3, Pp 654-670 (2019)
Security is a critical factor for any of the computing platforms. Cloud computing is a new computing environment but still, its basic technology is the Internet. Thus, Cloud computing environment not only has the threats of its own but it is also pro
Externí odkaz:
https://doaj.org/article/a3ee5a12452440d6bea4f66b64dfe28f
Publikováno v:
IEEE Access, Vol 8, Pp 11743-11753 (2020)
Internet of Things (IoTs) are set to revolutionize our lives and are widely being adopted nowadays. The IoT devices have a range of applications including smart homes, smart industrial networks and healthcare. Since these devices are responsible for
Externí odkaz:
https://doaj.org/article/c439f14a67e44b5d82e26fbab1836748
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Xirong Ning, Jin Jiang
Publikováno v:
IET Cyber-Physical Systems (2020)
Insider attacks are one of the most serious threats for cyber-physical systems, they have potentials to inflict destructive damages on physical processes while remaining stealthy. This study dissects several insider attacks by examining their modes o
Externí odkaz:
https://doaj.org/article/5e09901ffc1543d7b6c062506ee3e623