Zeitschriftenartikel zum Thema „Attack Detection Automation“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Attack Detection Automation" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Wressnegger, Christian. „Efficient machine learning for attack detection“. it - Information Technology 62, Nr. 5-6 (16.12.2020): 279–86. http://dx.doi.org/10.1515/itit-2020-0015.
Der volle Inhalt der QuelleBeshah, Yonas Kibret, Surafel Lemma Abebe und Henock Mulugeta Melaku. „Drift Adaptive Online DDoS Attack Detection Framework for IoT System“. Electronics 13, Nr. 6 (07.03.2024): 1004. http://dx.doi.org/10.3390/electronics13061004.
Der volle Inhalt der QuelleOkello, Fredrick Ochieng, Dennis Kaburu und Ndia G. John. „Automation-Based User Input Sql Injection Detection and Prevention Framework“. Computer and Information Science 16, Nr. 2 (02.05.2023): 51. http://dx.doi.org/10.5539/cis.v16n2p51.
Der volle Inhalt der QuelleHoush, Mashor, Noy Kadosh und Jack Haddad. „Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks“. Sensors 22, Nr. 16 (12.08.2022): 6035. http://dx.doi.org/10.3390/s22166035.
Der volle Inhalt der QuelleKarthik Krishnan, T., S. Sridevi, G. Bindu und R. Anandan. „Comparison and detail study of attacks and detection methods for wireless sensor network“. International Journal of Engineering & Technology 7, Nr. 2.21 (20.04.2018): 405. http://dx.doi.org/10.14419/ijet.v7i2.21.12453.
Der volle Inhalt der QuelleYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang und Zhihao Liang. „Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study“. Transactions on Computer Science and Intelligent Systems Research 3 (10.04.2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.
Der volle Inhalt der QuelleSztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny und Zuzanna Górecka. „Controller Cyber-Attack Detection and Isolation“. Sensors 23, Nr. 5 (03.03.2023): 2778. http://dx.doi.org/10.3390/s23052778.
Der volle Inhalt der QuelleBinbusayyis, Adel. „Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers“. Mathematics 12, Nr. 11 (31.05.2024): 1720. http://dx.doi.org/10.3390/math12111720.
Der volle Inhalt der QuelleKim, Ye-Eun, Yea-Sul Kim und Hwankuk Kim. „Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network“. Sensors 22, Nr. 10 (18.05.2022): 3819. http://dx.doi.org/10.3390/s22103819.
Der volle Inhalt der QuelleOruganti, Rakesh, Jeeshitha J und Rama Koteswara Rao G. „A Extensive Study on DDosBotnet Attacks in Multiple Environments Using Deep Learning and Machine Learning Techniques“. ECS Transactions 107, Nr. 1 (24.04.2022): 15181–93. http://dx.doi.org/10.1149/10701.15181ecst.
Der volle Inhalt der QuelleLeal Piedrahita, Erwin Alexander. „Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations“. Ciencia e Ingeniería Neogranadina 30, Nr. 1 (12.11.2019): 75–88. http://dx.doi.org/10.18359/rcin.4236.
Der volle Inhalt der QuelleAlotaibi, Nouf Saeed, Hassan Ibrahim Ahmed und Samah Osama M. Kamel. „Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City“. Sensors 23, Nr. 16 (12.08.2023): 7135. http://dx.doi.org/10.3390/s23167135.
Der volle Inhalt der QuelleAslam, Muhammad Muzamil, Zahoor Ahmed, Liping Du, Muhammad Zohaib Hassan, Sajid Ali und Muhammad Nasir. „An Overview of Recent Advances of Resilient Consensus for Multiagent Systems under Attacks“. Computational Intelligence and Neuroscience 2022 (02.08.2022): 1–26. http://dx.doi.org/10.1155/2022/6732343.
Der volle Inhalt der QuelleHtwe, Chaw Su, Zin Thu Thu Myint und Yee Mon Thant. „IoT Security Using Machine Learning Methods with Features Correlation“. Journal of Computing Theories and Applications 2, Nr. 2 (18.08.2024): 151–63. http://dx.doi.org/10.62411/jcta.11179.
Der volle Inhalt der QuelleOluwakemi, Oduwole Omolara, Muhammad, Umar Abdullahi und Kene Tochukwu Anyachebelu. „Comparative Evaluation of Machine Learning Algorithms for Intrusion Detection“. Asian Journal of Research in Computer Science 16, Nr. 4 (20.09.2023): 8–22. http://dx.doi.org/10.9734/ajrcos/2023/v16i4366.
Der volle Inhalt der QuelleAlkahtani, Hasan, und Theyazn H. H. Aldhyani. „Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems“. Electronics 11, Nr. 11 (27.05.2022): 1717. http://dx.doi.org/10.3390/electronics11111717.
Der volle Inhalt der QuelleChoi, In-Sun, Junho Hong und Tae-Wan Kim. „Multi-Agent Based Cyber Attack Detection and Mitigation for Distribution Automation System“. IEEE Access 8 (2020): 183495–504. http://dx.doi.org/10.1109/access.2020.3029765.
Der volle Inhalt der QuelleDAMANIK, HILLMAN AKHYAR, und MERRY ANGGRAENI. „Pola Pengelompokan dan Pencegahan Public Honeypot menggunakan Teknik K-Means dan Automation Shell-Script“. ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 12, Nr. 1 (17.01.2024): 65. http://dx.doi.org/10.26760/elkomika.v12i1.65.
Der volle Inhalt der QuelleAlshamsi, Omar, Khaled Shaalan und Usman Butt. „Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach“. Information 15, Nr. 10 (13.10.2024): 631. http://dx.doi.org/10.3390/info15100631.
Der volle Inhalt der QuelleWei, Min, Kee Wook Rim und Kee Cheon Kim. „An Intrusion Detection Scheme for Home Wireless Sensor Networks“. Applied Mechanics and Materials 121-126 (Oktober 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.
Der volle Inhalt der QuelleKasturi, Santanam, Xiaolong Li, Peng Li und John Pickard. „A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems“. American Journal of Networks and Communications 13, Nr. 1 (07.03.2024): 19–29. http://dx.doi.org/10.11648/j.ajnc.20241301.12.
Der volle Inhalt der QuelleKhan, Zulfiqar Ali, und Akbar Siami Namin. „A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology“. Electronics 11, Nr. 23 (24.11.2022): 3892. http://dx.doi.org/10.3390/electronics11233892.
Der volle Inhalt der QuelleLu, Kang-Di, Guo-Qiang Zeng, Xizhao Luo, Jian Weng, Weiqi Luo und Yongdong Wu. „Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System“. IEEE Transactions on Industrial Informatics 17, Nr. 11 (November 2021): 7618–27. http://dx.doi.org/10.1109/tii.2021.3053304.
Der volle Inhalt der QuelleGuo, Hui Ling. „Research on Rule Extraction Technology Based on Genetic Algorithm in Intrusion Detection“. Advanced Materials Research 760-762 (September 2013): 857–61. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.857.
Der volle Inhalt der QuelleMeleshko, Alexey, Anton Shulepov, Vasily Desnitsky, Evgenia Novikova und Igor Kotenko. „Visualization Assisted Approach to Anomaly and Attack Detection in Water Treatment Systems“. Water 14, Nr. 15 (29.07.2022): 2342. http://dx.doi.org/10.3390/w14152342.
Der volle Inhalt der QuelleBarletta, Vita Santa, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera und Manuel Ángel Serrano Martín. „V-SOC4AS: A Vehicle-SOC for Improving Automotive Security“. Algorithms 16, Nr. 2 (14.02.2023): 112. http://dx.doi.org/10.3390/a16020112.
Der volle Inhalt der QuelleT, Sowmika, Rohith Paul L und Malathi G. „IOT Based Smart Rodent Detection and Fire Alert System in Farmland“. International Research Journal of Multidisciplinary Technovation 2, Nr. 3 (30.05.2020): 1–6. http://dx.doi.org/10.34256/irjmt2031.
Der volle Inhalt der QuelleRao, Alwal Keerthan, und T. Rajashekar Reddy. „AUTONOMOUS MISSILE DEFENSE SYSTEM: INTEGRATING ADVANCED SONAR-BASED TRACKING FOR PRECISE DETECTION“. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 14, Nr. 2 (09.03.2023): 1055–60. http://dx.doi.org/10.61841/turcomat.v14i2.14332.
Der volle Inhalt der QuelleB, Vivekanadam. „IoT based Smart Grid Attack Resistance in AC and DC State Estimation“. Journal of Electrical Engineering and Automation 2, Nr. 3 (19.01.2021): 118–22. http://dx.doi.org/10.36548/jeea.2020.3.002.
Der volle Inhalt der QuelleIlokanuno, Ogochukwu A. „Smart Meter Tampering Detection Using IoT Based Unsupervised Machine Learning“. International Journal for Research in Applied Science and Engineering Technology 12, Nr. 4 (30.04.2024): 5434–45. http://dx.doi.org/10.22214/ijraset.2024.61153.
Der volle Inhalt der QuelleFeng, Tao, und Bugang Zhang. „Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB“. Information 14, Nr. 12 (08.12.2023): 653. http://dx.doi.org/10.3390/info14120653.
Der volle Inhalt der QuelleHassan, Jawad, Muhammad Kamran Abid, Mughees Ahmad, Ali Ghulam, Muhammad Salman Fakhar und Muhammad Asif. „A Survey on Blockchain-based Intrusion Detection Systems for IoT“. VAWKUM Transactions on Computer Sciences 11, Nr. 1 (02.05.2023): 138–51. http://dx.doi.org/10.21015/vtcs.v11i1.1385.
Der volle Inhalt der QuelleAgnew, Dennis, Nader Aljohani, Reynold Mathieu, Sharon Boamah, Keerthiraj Nagaraj, Janise McNair und Arturo Bretas. „Implementation Aspects of Smart Grids Cyber-Security Cross-Layered Framework for Critical Infrastructure Operation“. Applied Sciences 12, Nr. 14 (07.07.2022): 6868. http://dx.doi.org/10.3390/app12146868.
Der volle Inhalt der QuelleDixit, Priyanka, Rashi Kohli, Angel Acevedo-Duque, Romel Ramon Gonzalez-Diaz und Rutvij H. Jhaveri. „Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection“. Security and Communication Networks 2021 (14.06.2021): 1–23. http://dx.doi.org/10.1155/2021/5561816.
Der volle Inhalt der QuelleWang, Lijun, Xian Guo, Xiaofan Zhang und Zhanhui Gang. „Industrial Information Security Detection and Protection: Monitoring and Warning Platform Architecture Design and Cryptographic Antitheft Technology System Upgrade“. Journal of Sensors 2022 (25.08.2022): 1–11. http://dx.doi.org/10.1155/2022/1263330.
Der volle Inhalt der QuelleSöğüt, Esra, und O. Ayhan Erdem. „A Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems“. Applied Sciences 13, Nr. 10 (13.05.2023): 5993. http://dx.doi.org/10.3390/app13105993.
Der volle Inhalt der QuelleAravamudhan, Parthiban, und Kanimozhi T. „A novel adaptive network intrusion detection system for internet of things“. PLOS ONE 18, Nr. 4 (21.04.2023): e0283725. http://dx.doi.org/10.1371/journal.pone.0283725.
Der volle Inhalt der QuelleAlshahrani, Hani, Attiya Khan, Muhammad Rizwan, Mana Saleh Al Reshan, Adel Sulaiman und Asadullah Shaikh. „Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network“. Sustainability 15, Nr. 11 (02.06.2023): 9001. http://dx.doi.org/10.3390/su15119001.
Der volle Inhalt der QuelleShalaginov, Andrii, und Muhammad Ajmal Azad. „Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications“. Future Internet 13, Nr. 11 (27.10.2021): 272. http://dx.doi.org/10.3390/fi13110272.
Der volle Inhalt der QuelleAlmuqren, Latifah, Sumayh S. Aljameel, Hamed Alqahtani, Saud S. Alotaibi, Manar Ahmed Hamza und Ahmed S. Salama. „A White Shark Equilibrium Optimizer with a Hybrid Deep-Learning-Based Cybersecurity Solution for a Smart City Environment“. Sensors 23, Nr. 17 (24.08.2023): 7370. http://dx.doi.org/10.3390/s23177370.
Der volle Inhalt der QuelleBannikuppe Srinivasiah, Venkatesh Prasad, Roopashree Hejjaji Ranganathasharma und Venkatesh Ramanna. „Multi-objective-trust aware improved grey wolf optimization technique for uncovering adversarial attacks in WSNs“. Indonesian Journal of Electrical Engineering and Computer Science 36, Nr. 1 (01.10.2024): 375. http://dx.doi.org/10.11591/ijeecs.v36.i1.pp375-391.
Der volle Inhalt der QuelleRai, Ankush, und Jagadeesh Kannan R. „MICROTUBULE BASED NEURO-FUZZY NESTED FRAMEWORK FOR SECURITY OF CYBER PHYSICAL SYSTEM“. Asian Journal of Pharmaceutical and Clinical Research 10, Nr. 13 (01.04.2017): 230. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19646.
Der volle Inhalt der QuelleMazur-Milecka, Magdalena, Jacek Ruminski, Wojciech Glac und Natalia Glowacka. „Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents“. Applied Sciences 11, Nr. 14 (20.07.2021): 6644. http://dx.doi.org/10.3390/app11146644.
Der volle Inhalt der QuelleKasturi, Santanam, Xiaolong Li, Peng Li und John Pickard. „On the Benefits of Vulnerability Data Consolidation in Application Security“. International Conference on Cyber Warfare and Security 19, Nr. 1 (21.03.2024): 455–62. http://dx.doi.org/10.34190/iccws.19.1.2086.
Der volle Inhalt der QuelleLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi und Lian-Fen Huang Ying-Min Zhang. „FASSFuzzer—An Automated Vulnerability Detection System for Android System Services“. 電腦學刊 33, Nr. 2 (April 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Der volle Inhalt der QuelleLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi und Lian-Fen Huang Ying-Min Zhang. „FASSFuzzer—An Automated Vulnerability Detection System for Android System Services“. 電腦學刊 33, Nr. 2 (April 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Der volle Inhalt der QuelleWang, Dongzhihan, Guijin Ma und Xiaorui Liu. „An intelligent recognition framework of access control system with anti-spoofing function“. AIMS Mathematics 7, Nr. 6 (2022): 10495–512. http://dx.doi.org/10.3934/math.2022585.
Der volle Inhalt der QuelleKaropoulos, Georgios, Georgios Kambourakis, Efstratios Chatzoglou, José L. Hernández-Ramos und Vasileios Kouliaridis. „Demystifying In-Vehicle Intrusion Detection Systems: A Survey of Surveys and a Meta-Taxonomy“. Electronics 11, Nr. 7 (29.03.2022): 1072. http://dx.doi.org/10.3390/electronics11071072.
Der volle Inhalt der QuelleIbraheem, Manar Khalid Ibraheem, Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed und Ahmed Fakhfakh. „A Security-Enhanced Energy Conservation with Enhanced Random Forest Classifier for Low Execution Time Framework (S-2EC-ERF) for Wireless Sensor Networks“. Applied Sciences 14, Nr. 6 (07.03.2024): 2244. http://dx.doi.org/10.3390/app14062244.
Der volle Inhalt der QuelleFaris, Mohammed, Mohd Nazri Mahmud, Mohd Fadzli Mohd Salleh und Alhamzah Alnoor. „Wireless sensor network security: A recent review based on state-of-the-art works“. International Journal of Engineering Business Management 15 (Januar 2023): 184797902311572. http://dx.doi.org/10.1177/18479790231157220.
Der volle Inhalt der Quelle