Search

Your search keyword '"attack mitigation"' showing total 29 results

Search Constraints

Start Over You searched for: Descriptor "attack mitigation" Remove constraint Descriptor: "attack mitigation" Database Complementary Index Remove constraint Database: Complementary Index
29 results on '"attack mitigation"'

Search Results

1. An Intelligent System Using Deep Learning-Based Link Quality Prediction and Optimization Enabled Secure Communication in UAV Network.

2. Shielding secrets: developing an enigmatic defense system with deep learning against side channel attacks.

3. Detection, reconstruction and mitigation of deception attacks in nonlinear cyber‐physical systems.

5. TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network.

6. Inter and Intra Domain DDoS Attack Mitigation for Software Defined Network Based on Hyperledger Fabric Blockchain Technology.

7. Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case.

8. Resilience-by-design in Adaptive Multi-agent Traffic Control Systems.

9. An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment.

10. A Novel IoT Architecture, Assessment of Threats and Their Classification with Machine Learning Solutions.

11. Trustability for Resilient Internet of Things Services on 5G Multiple Access Edge Cloud Computing.

12. Malicious attack detection approach in cloud computing using machine learning techniques.

13. The Evolution of Federated Learning-Based Intrusion Detection and Mitigation: A Survey.

14. Intelligent agent and optimization-based deep residual network to secure communication in UAV network.

15. An Extendable Software Architecture for Mitigating ARP Spoofing-Based Attacks in SDN Data Plane Layer.

16. A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural network.

17. Cybersecurity Policies for Network Switching Devices in Hospital Data Centers: A Case Study.

18. Performance and Features: Mitigating the Low-Rate TCP-Targeted DoS Attack via SDN.

19. A survey on healthcare data security in wireless body area networks.

20. Adaptive caches as a defense mechanism against cache side-channel attacks.

21. A Zoning-Based Secure Control Approach Against Actuator Attacks in Industrial Cyber-Physical Systems.

22. Mitigating Attacks With Nonlinear Dynamics on Actuators in Cyber-Physical Mechatronic Systems.

23. Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition.

24. FMD: A DoS mitigation scheme based on flow migration in software‐defined networking.

25. On the use of watermark-based schemes to detect cyber-physical attacks.

26. Taming Mr Hayes: Mitigating signaling based attacks on smartphones.

27. A rule based DDoS detection and mitigation technique.

28. A distributed attack detection and mitigation framework.

29. On detecting and mitigating phishing attacks through featureless machine learning techniques.

Catalog

Books, media, physical & digital resources