Search

Your search keyword '"Cyber-attacks"' showing total 1,418 results

Search Constraints

Start Over You searched for: Descriptor "Cyber-attacks" Remove constraint Descriptor: "Cyber-attacks"
1,418 results on '"Cyber-attacks"'

Search Results

19. A Transformer-Based Model for Network Intrusion Detection: Architecture, Classification Heads, and Transformer Blocks

21. Enhancing IoT Security: Hybrid Machine Learning Approach for IoT Attack Detection

23. Fortifying industrial cybersecurity: a novel industrial internet of things architecture enhanced by honeypot integration.

24. Event-triggered secure control for Markov jump neural networks with time-varying delays and subject to cyber-attacks via state estimation fuzzy approach.

25. SSHAA: A Python Package Index for visualizing features of SSH attacks with text mining in classification.

26. Optimizing Intrusion Detection in Edge Computing Network: A Hybrid ML Approach with Recursive Feature Elimination.

27. Enhanced IoMT security framework using group teaching optimized auto-encoder for intrusion detection.

28. D3S: A Drone Security Scoring System.

29. Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors.

30. Creating a Secure Autonomous Vehicle System Using a Neuro-Fuzzy System that Merges Artificial Neural Networks and Fuzzy Interface Systems.

31. Mutation mayfly algorithm (MMA) based feature selection and probabilistic anomaly detection model for cyber-physical systems.

32. Improving Vulnerability Management Through Process Mining.

33. Building Public Trust Through Data Privacy in Smart Cities: Policy Gaps and Governance Solutions.

34. The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations

35. Fast anomalous traffic detection system for secure vehicular communications

36. CULTIVATING RESILIENCE: A TRANSFORMATIVE APPROACH TO ENHANCING CLOUD DATA SECURITY WITH TRANSFORMER-BASED TECHNIQUES

37. Strengthening network DDOS attack detection in heterogeneous IoT environment with federated XAI learning approach

38. Fault Estimation for Semi‐Markov Jump Cyber‐Physical Control Systems With External Disturbances.

39. Cybersecurity at Sea: A Literature Review of Cyber-Attack Impacts and Defenses in Maritime Supply Chains.

40. A Machine Learning Approach toward Cyber-Physical Security of Battery Systems.

41. Navigating the Cybersecurity Landscape: Vulnerabilities, Mitigation Strategies and Future Outlooks.

42. Strengthening network DDOS attack detection in heterogeneous IoT environment with federated XAI learning approach.

43. A Real-Time and Online Dynamic Reconfiguration against Cyber-Attacks to Enhance Security and Cost-Efficiency in Smart Power Microgrids Using Deep Learning.

44. Event-triggered H∞ control of complex dynamical networks subject to stochastic cyber-attacks by new two-sided delay-dependent LKF functional.

45. Feasibility of Creating a Non-Profit and Non-Governmental Organization Cybersecurity Incident Dataset Repository Using OSINT.

46. Deep learning-empowered intrusion detection framework for the Internet of Medical Things environment.

47. Enhancing Reliability and Performance of Load Frequency Control in Aging Multi-Area Power Systems under Cyber-Attacks.

48. Leveraging Artificial Neural Networks and LightGBM for Enhanced Intrusion Detection in Automotive Systems.

49. A Joint Estimation Method of SOC and SOH for Lithium-ion Battery Considering Cyber-Attacks Based on GA-BP.

Catalog

Books, media, physical & digital resources