Search

Your search keyword '"attack mitigation"' showing total 26 results

Search Constraints

Start Over You searched for: Descriptor "attack mitigation" Remove constraint Descriptor: "attack mitigation" Database OpenAIRE Remove constraint Database: OpenAIRE
26 results on '"attack mitigation"'

Search Results

1. The Evolution of Federated Learning-Based Intrusion Detection and Mitigation: A Survey

2. Trustability for Resilient Internet of Things Services on 5G Multiple Access Edge Cloud Computing

3. An Extendable Software Architecture for Mitigating ARP Spoofing-Based Attacks in SDN Data Plane Layer

4. Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks

5. Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices

6. Decentralized Coordinated Cyber-Attack Detection and Mitigation Strategy in DC Microgrids Based on Artificial Neural Networks

7. Demonstration: A cloud-control system equipped with intrusion detection and mitigation

8. A Software-Defined Security Approach for Securing Field Zones in Industrial Control Systems

9. A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks

10. Securing a Linux Server Against Cyber Attacks

11. Attack Detection and Mitigation Using Supervised Learning and Container-Based VNF Orchestration

12. Bayesian Network Model to Distinguish between Intentional Attacks and Accidental Technical Failures: A Case Study of Floodgates

13. A survey on healthcare data security in wireless body area networks

14. Advanced metering infrastructures - security risks and mitigation

15. Reflective Attenuation of Cyber-Physical Attacks

16. A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework

17. Source-Load Coordinated Reserve Allocation Strategy Considering Cyber-Attack Risks

18. Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking

19. On the use of watermark-based schemes to detect cyber-physical attacks

20. Revisiting a watermark-based detection scheme to handle cyber-physical attacks

21. Detection and mitigation of signaling storms in mobile networks

22. Economic Denial of Sustainability Mitigation in Cloud Computing

23. Defending Vulnerable Security Protocols by Means of Attack Interference in Non-collaborative Scenarios

24. Efficient DHT attack mitigation through peers' ID distribution

25. Intrusion detection system for denial-of-service flooding attacks in SIP communication networks

26. Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)

Catalog

Books, media, physical & digital resources