Search

Your search keyword '"Attack detection"' showing total 1,254 results

Search Constraints

Start Over You searched for: Descriptor "Attack detection" Remove constraint Descriptor: "Attack detection"
1,254 results on '"Attack detection"'

Search Results

1. FLOLSTM: Fuzzy logic‐driven optimized LSTM for improved malicious traffic detection in hypervisor environments.

2. Securing IIoT operations with recurrent federated network-based enhanced local search grasshopper.

3. Random forest with differential privacy in federated learning framework for network attack detection and classification.

4. Secured web application based on CapsuleNet and OWASP in the cloud.

5. Detection‐based resilient control for cyber‐physical systems against two‐channel false data injection attacks.

6. IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks.

7. Security Assessment Framework for DDOS Attack Detection via Deep Learning.

8. Optimizing CNN-LSTM for the Localization of False Data Injection Attacks in Power Systems.

9. The OX Optimizer: A Novel Optimization Algorithm and Its Application in Enhancing Support Vector Machine Performance for Attack Detection.

10. An automatic unsupervised complex event processing rules generation architecture for real-time IoT attacks detection.

11. A trusted computing framework for cloud data security using role-based access and pattern recognition.

12. Attack detection model for BCoT based on contrastive variational autoencoder and metric learning.

13. Exploring the landscape of network security: a comparative analysis of attack detection strategies.

14. Wormhole attack detection and mitigation model for Internet of Things and WSN using machine learning.

15. Reversible image authentication using a central folding strategy with two images.

16. Detection and mitigation of DDoS attacks based on multi-dimensional characteristics in SDN.

17. Corporate network anomaly detection methodology utilizing machine learning algorithms.

18. A machine learning-enhanced endpoint detection and response framework for fast and proactive defense against advanced cyber attacks.

19. Method for countering strategic attacks in zero-boundary trusted networks.

20. Federated Learning-Based Security Attack Detection for Multi-Controller Software-Defined Networks.

21. HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach.

22. Machine Learning-Driven Detection of Cross-Site Scripting Attacks.

23. Optimized Bi-LSTM: a novel approach for attack detection in industrial IoT.

24. Adaptive weighted kernel support vector machine-based circle search approach for intrusion detection in IoT environments.

25. Attack detection model for BCoT based on contrastive variational autoencoder and metric learning

26. Detection and mitigation of DDoS attacks based on multi-dimensional characteristics in SDN

28. A Long Short-Term Memory Learning Based Malicious Node Detection for Clustering in Wireless Sensor Networks

30. Cache Side-Channel Attacks Detection for AES Encryption Based on Machine Learning

31. Machine Learning-Based Systems for Intrusion Detection in VANETs

32. Comparative Analysis of AI-Based Methods for Enhancing Cybersecurity Monitoring Systems

33. Neurosymbolic Learning in the XAI Framework for Enhanced Cyberattack Detection with Expert Knowledge Integration

34. Detection of Suspicious Activities at Hypervisor in Cloud Computing: A Brief Study

35. Construction of Power System Communication Network Based on Edge Computing

36. DQN-Based Sensor Attack Detection for Quadrotor

37. Attack Detecting for the Multi-robots Systems: An Integrated Cyber-Physical Approach

38. A Decomposed Encryption-Decryption Scheme for Deception Attack Detection and Privacy-Preserving

39. Trust-Centric and Attack-Resistant Recommender System

40. Machine Learning-Based Attack Detection

41. Naive Bayes Classifier-Based Smishing Detection Framework to Reduce Cyber Attack

43. Machine Learning Based Analysis of Cyber-Attacks Targeting Smart Grid Infrastructure

44. Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection

45. A Survey on Cybersecurity Techniques Toward Convolutional Neural Network

46. Deep Learning for Biometric Attack Detection and Recognition

48. A Survey on DDoS Detection Using Deep Learning in Software Defined Networking

49. Detection of Man-in-the-Middle Attack Through Artificial Intelligence Algorithm

50. A novel approach detection for IIoT attacks via artificial intelligence.

Catalog

Books, media, physical & digital resources