Search

Your search keyword '"cyber-attack detection"' showing total 117 results

Search Constraints

Start Over You searched for: Descriptor "cyber-attack detection" Remove constraint Descriptor: "cyber-attack detection"
117 results on '"cyber-attack detection"'

Search Results

1. Detection of Cyber-Attacks in a Discrete Event System Based on Deep Learning.

2. An Advanced Filter-based Supervised Threat Detection Framework on Large Databases.

3. A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things.

4. An Efficient Cluster Based Multi-Label Classification Model for Advanced Persistent Threat Attacks Detecting.

7. Cyber attack detection in monitoring on optoelectronics devices using deep learning model and cloud computing network.

8. Detection of Cyber-Attacks in a Discrete Event System Based on Deep Learning

9. 5G Wireless Network-Based Cybersecurity Analysis Using Software Defined Phy_HetNets and Boltzmann Encoder Convolutional Basis Neural Network

10. Detecting Cyber-Attacks on Internet of Things Devices: An Effective Preprocessing Method

13. Blockchain-oriented approach for detecting cyber-attack transactions

14. Machine Learning-Based Cyber-Attack Detection in Photovoltaic Farms

15. Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks

16. Blockchain-oriented approach for detecting cyber-attack transactions.

18. Deep clustering hierarchical latent representation for anomaly-based cyber-attack detection.

19. Cyber Attack Detection and Trust Management Toolkit for Defence-Related Microgrids

20. Intelligent Self-reliant Cyber-Attacks Detection and Classification System for IoT Communication Using Deep Convolutional Neural Network

21. Effective Detection of Cyber Attack in a Cyber-Physical Power Grid System

24. A Two-stage Kalman Filter for Cyber-attack Detection in Automatic Generation Control System

25. Cyber-Attack Detection and Countermeasure for Distributed Electric Springs for Smart Grid Applications

26. Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems.

27. Stochastic fault and cyber-attack detection and consensus control in multi-agent systems.

29. Application of Artificial Neural Network for Cyber-Attack Detection in Water Distribution Systems as Cyber Physical Systems

30. SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks

31. Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems.

32. Predicting future community intrusions using a novel type and encryption mechanism architecture for attack node mitigation.

33. Online detection of cyber‐incidents in additive manufacturing systems via analyzing multimedia signals.

34. Intelligent Situational-Awareness Architecture for Hybrid Emergency Power Systems in More Electric Aircraft

35. Accurate Detection of False Data Injection Attacks in Renewable Power Systems Using Deep Learning

36. A Secured Advanced Management Architecture in Peer-to-Peer Energy Trading for Multi-Microgrid in the Stochastic Environment

37. Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack

38. Cyber-attack Detection Strategy Based on Distribution System State Estimation

39. Human Augmentation of UAV Cyber-Attack Detection

41. Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems.

42. Simultaneous Cyber-Attack Detection and Radar Sensor Health Monitoring in Connected ACC Vehicles.

43. Sequential Attack Detection in Recommender Systems.

44. Fourier Singular Values-Based False Data Injection Attack Detection in AC Smart-Grids.

45. Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems

46. Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems

47. Improvement of Cyber-Attack Detection Accuracy from Urban Water Systems Using Extreme Learning Machine.

48. Multi‐objective‐based feature selection for DDoS attack detection in IoT networks.

50. Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks.

Catalog

Books, media, physical & digital resources