Zobrazeno 1 - 10
of 60
pro vyhledávání: '"unknown attack"'
Publikováno v:
IEEE Access, Vol 12, Pp 56461-56476 (2024)
The internet, a cornerstone of modern life, has profound implications across personal, business, and society. However, its widespread use has posed challenges, especially concerning privacy and cybersecurity. Besides, the threats on the internet are
Externí odkaz:
https://doaj.org/article/4b416d2e4dbb47dda66dd7d8de1d6102
Autor:
Tang Zhijian
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
Cybersecurity has emerged as a crucial security concern for countries worldwide, and Japan has made significant strides in this area, providing other countries with valuable lessons from its experience. In the context of global competition, this pape
Externí odkaz:
https://doaj.org/article/c157b1b292244622a04b761262e6cf76
Publikováno v:
IEEE Access, Vol 11, Pp 102381-102390 (2023)
The continuous advancement of information technology has improved user convenience but has also made it more vulnerable to cyber attacks. In particular, attackers use advanced techniques to perform new attacks. In cyber security, such attacks are def
Externí odkaz:
https://doaj.org/article/cb58f4f006c1447d92d4fe6e306273b2
Publikováno v:
IEEE Access, Vol 10, Pp 114008-114015 (2022)
Researchers have continuously sought effective ways to detect unknown (zero-day) cyberattacks in real time. Most current methods rely on pattern-recognition to identify known threats when they appear. Recently, machine learning anomaly detection tool
Externí odkaz:
https://doaj.org/article/795080a09dc743cba34652e3ac2f78fd
Publikováno v:
Symmetry, Vol 15, Iss 3, p 568 (2023)
To cope with the rising threats posed by network attacks, machine learning-based intrusion detection systems (IDSs) have been intensively researched. However, there are several issues that need to be addressed. It is difficult to deal with unknown at
Externí odkaz:
https://doaj.org/article/2c2316838596413f90ec1c3f7f21655a
Publikováno v:
IEEE Access, Vol 8, Pp 193981-193991 (2020)
In recent years, due to the frequent occurrence of network intrusions, more and more researchers have begun to focus on network intrusion detection. However, it is still a challenge to detect unknown attacks. Currently, there are two main methods of
Externí odkaz:
https://doaj.org/article/abea69ee3d394e8491bcbe4eed88ef56
Publikováno v:
Sensors, Vol 23, Iss 1, p 335 (2022)
In this study, distributed security estimation problems for networked stochastic uncertain systems subject to stochastic deception attacks are investigated. In sensor networks, the measurement data of sensor nodes may be attacked maliciously in the p
Externí odkaz:
https://doaj.org/article/a412a6ebfc714dcbb48da917e8c667fd
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.