Search

Your search keyword '"attack mitigation"' showing total 119 results

Search Constraints

Start Over You searched for: Descriptor "attack mitigation" Remove constraint Descriptor: "attack mitigation"
119 results on '"attack mitigation"'

Search Results

1. An Intelligent System Using Deep Learning-Based Link Quality Prediction and Optimization Enabled Secure Communication in UAV Network.

2. Shielding secrets: developing an enigmatic defense system with deep learning against side channel attacks.

3. Detection, reconstruction and mitigation of deception attacks in nonlinear cyber‐physical systems.

4. Shielding secrets: developing an enigmatic defense system with deep learning against side channel attacks

6. Attack Mitigation and Recovery in Smart Grid Control

8. TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network.

9. Securing Underwater Wireless Sensor Networks: A Review of Attacks and Mitigation Techniques

10. Inter and Intra Domain DDoS Attack Mitigation for Software Defined Network Based on Hyperledger Fabric Blockchain Technology.

11. Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case.

12. Mitigation of attacks via improved network security in IOT network environment using RNN

13. Resilience-by-design in Adaptive Multi-agent Traffic Control Systems.

14. An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment.

15. A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems

16. Attack Resilient Cloud-Based Control Systems for Industry 4.0

19. Design and analysis of anomaly detection and mitigation schemes for Distributed Denial of Service attacks in Software Defined Network : an investigation into the security vulnerabilities of Software Defined Network and the design of efficient detection and mitigation techniques for DDoS attack using machine learning techniques

20. LRDADF: An AI enabled framework for detecting low-rate DDoS attacks in cloud computing environments

21. Applications of attack mitigation mechanisms in energy networks, attack detection and preventive methods for security in the smart grid

22. A Novel IoT Architecture, Assessment of Threats and Their Classification with Machine Learning Solutions.

23. Trustability for Resilient Internet of Things Services on 5G Multiple Access Edge Cloud Computing.

24. Malicious attack detection approach in cloud computing using machine learning techniques.

26. DDoS ATTACK MITIGATION WITH INTRUSION DETECTION SYSTEM (IDS) USING TELEGRAM BOTS

27. The Evolution of Federated Learning-Based Intrusion Detection and Mitigation: A Survey.

28. Intelligent agent and optimization-based deep residual network to secure communication in UAV network.

29. From Creation to Exploitation: The Oracle Lifecycle

30. Cybersecurity in supply chain systems: the farm-to-fork use case

31. Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study

32. Analysis of Network Flow for Mitigation of DDoS Attacks in a Cloud Environment

33. Reflective Attenuation of Cyber-Physical Attacks

34. An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment

35. An Extendable Software Architecture for Mitigating ARP Spoofing-Based Attacks in SDN Data Plane Layer.

36. MP-GUARD: A novel multi-pronged intrusion detection and mitigation framework for scalable SD-IoT networks using cooperative monitoring, ensemble learning, and new P4-extracted feature set.

37. A network intrusion detection system in cloud computing environment using dragonfly improved invasive weed optimization integrated Shepard convolutional neural network.

38. Cybersecurity Policies for Network Switching Devices in Hospital Data Centers: A Case Study.

39. IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN

40. Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation

41. Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks

42. Attack Detection and Mitigation in Industrial IoT: An Optimized Ensemble Approach.

43. Performance and Features: Mitigating the Low-Rate TCP-Targeted DoS Attack via SDN.

44. Hybrid Multilayer Network Traceback to the Real Sources of Attack Devices

45. Trustability for Resilient Internet of Things Services on 5G Multiple Access Edge Cloud Computing

46. A survey on healthcare data security in wireless body area networks.

47. Adaptive caches as a defense mechanism against cache side-channel attacks.

48. A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks

49. A Software-Defined Security Approach for Securing Field Zones in Industrial Control Systems

50. Source-Load Coordinated Reserve Allocation Strategy Considering Cyber-Attack Risks

Catalog

Books, media, physical & digital resources