Search

Your search keyword '"Cyber-attacks"' showing total 1,418 results

Search Constraints

Start Over You searched for: Descriptor "Cyber-attacks" Remove constraint Descriptor: "Cyber-attacks"
1,418 results on '"Cyber-attacks"'

Search Results

201. Intrusion Detection Systems Using Support Vector Machines on the KDDCUP’99 and NSL-KDD Datasets: A Comprehensive Survey

202. Smart Health and Cybersecurity in the Era of Artificial Intelligence

203. Finite-time decentralized event-triggered feedback control for generalized neural networks with mixed interval time-varying delays and cyber-attacks

204. EFLM Task Force Preparation of Labs for Emergencies (TF-PLE) survey on cybersecurity.

205. AI-based Quantum-safe Cybersecurity Automation and Orchestration for edge Intelligence in Future Networks.

206. Hybrid Threats-Possible Consequences in Societal Contexts.

207. Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework

208. Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks

209. Performance Evaluation of Deep Learning Techniques in The Detection of IOT Malware

210. Hybrid cyber-attack compensation of sustainable microgrid using active disturbance rejection control strategy.

211. A Review of AI-Based Cyber-Attack Detection and Mitigation in Microgrids.

212. A comprehensive study on cybersecurity challenges and opportunities in the IoT world.

213. Cybersecurity regulatory challenges for connected and automated vehicles – State-of-the-art and future directions.

214. IoT Vulnerabilities and Attacks: SILEX Malware Case Study.

215. Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review.

216. MSGAN: multi-stage generative adversarial network-based data recovery in cyber-attacks.

217. Resilient neural network-based control of nonlinear heterogeneous multi-agent systems: a cyber-physical system approach.

218. The hidden threat of cyber-attacks – undermining public confidence in government.

219. Examining the status of CPU working load, processing load and controller bandwidth under the influence of packet-in buffer status located in Openflow switches in SDN-based IoT framework.

221. A FRAMEWORK FOR CYBER SECURITY AREAS EVALUATION IN FINANCIAL SECTOR.

222. Prospects of Cybersecurity in Smart Cities.

223. Finite-time decentralized event-triggered feedback control for generalized neural networks with mixed interval time-varying delays and cyber-attacks.

224. Leveraging Security Modeling and Information Systems Audits to Mitigate Network Vulnerabilities.

225. An ensemble deep learning based IDS for IoT using Lambda architecture

227. MODIFICAREA PEISAJULUI AMENINȚĂRILOR CIBERNETICE DATORITĂ IMPLICĂRII GRUPĂRILOR DE CYBERCRIME ÎN RĂZBOIUL RUSO-UCRAINEAN

228. Toward Attack Modeling Technique Addressing Resilience in Self-Driving Car

229. Real-Time Power System Event Detection: A Novel Instance Selection Approach

230. GAN Neural Networks Architectures for Testing Process Control Industrial Network Against Cyber-Attacks

231. Designing an Intrusion Detection for an Adjustable Speed Drive System Controlling a Critical Process

232. A Novel Framework for Smart Cyber Defence: A Deep-Dive Into Deep Learning Attacks and Defences

233. Cyber Diplomacy: A New Frontier for Global Cooperation in the Digital Age

234. Validation of a Machine Learning-Based IDS Design Framework Using ORNL Datasets for Power System With SCADA

235. Cybersecurity of Autonomous Vehicles: A Systematic Literature Review of Adversarial Attacks and Defense Models

236. The Problem of Security Protection of Strategic Objects in the Conditions of Modern Cybersecurity

237. Dynamic‐event‐based state estimation of complex networks against attacks and innovation outliers: The probability constraint case.

238. Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study.

239. Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography.

240. Integrating cyber-attacks on the continuous delay effect in coupled map car-following model under connected vehicles environment.

241. Self-Defense Strategies Against Cyber-Attacks by Non-State Actors.

242. SECURING THE DIGITAL DIPLOMACY FRONTIER: A GLOBAL PERSPECTIVE IN THE CYBER ERA WITH A FOCUS ON AZERBAIJAN.

243. ENHANCING CYBER SECURITY IN HEALTH CARE INDUSTRY BY USING ISO 27001 ACCREDITATION.

244. AI - Enabled Honeypot.

245. Optimizing BiLSTM Network Attack Prediction Based on Improved Gray Wolf Algorithm.

246. Harris-Hawk-Optimization-Based Deep Recurrent Neural Network for Securing the Internet of Medical Things.

247. Hybrid Fuzzy Rule Algorithm and Trust Planning Mechanism for Robust Trust Management in IoT-Embedded Systems Integration.

248. Machine Learning-Based Anomaly Detection in NFV: A Comprehensive Survey.

249. Design of a Wide-Area Power System Stabilizer to Tolerate Multiple Permanent Communication Failures.

250. Simplified review on cyber security threats detection in IoT environment using deep learning approach.

Catalog

Books, media, physical & digital resources