Journal articles on the topic 'Attack Detection Automation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Attack Detection Automation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wressnegger, Christian. "Efficient machine learning for attack detection." it - Information Technology 62, no. 5-6 (December 16, 2020): 279–86. http://dx.doi.org/10.1515/itit-2020-0015.
Full textBeshah, Yonas Kibret, Surafel Lemma Abebe, and Henock Mulugeta Melaku. "Drift Adaptive Online DDoS Attack Detection Framework for IoT System." Electronics 13, no. 6 (March 7, 2024): 1004. http://dx.doi.org/10.3390/electronics13061004.
Full textOkello, Fredrick Ochieng, Dennis Kaburu, and Ndia G. John. "Automation-Based User Input Sql Injection Detection and Prevention Framework." Computer and Information Science 16, no. 2 (May 2, 2023): 51. http://dx.doi.org/10.5539/cis.v16n2p51.
Full textHoush, Mashor, Noy Kadosh, and Jack Haddad. "Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks." Sensors 22, no. 16 (August 12, 2022): 6035. http://dx.doi.org/10.3390/s22166035.
Full textKarthik Krishnan, T., S. Sridevi, G. Bindu, and R. Anandan. "Comparison and detail study of attacks and detection methods for wireless sensor network." International Journal of Engineering & Technology 7, no. 2.21 (April 20, 2018): 405. http://dx.doi.org/10.14419/ijet.v7i2.21.12453.
Full textYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang, and Zhihao Liang. "Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study." Transactions on Computer Science and Intelligent Systems Research 3 (April 10, 2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.
Full textSztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny, and Zuzanna Górecka. "Controller Cyber-Attack Detection and Isolation." Sensors 23, no. 5 (March 3, 2023): 2778. http://dx.doi.org/10.3390/s23052778.
Full textBinbusayyis, Adel. "Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers." Mathematics 12, no. 11 (May 31, 2024): 1720. http://dx.doi.org/10.3390/math12111720.
Full textKim, Ye-Eun, Yea-Sul Kim, and Hwankuk Kim. "Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network." Sensors 22, no. 10 (May 18, 2022): 3819. http://dx.doi.org/10.3390/s22103819.
Full textOruganti, Rakesh, Jeeshitha J, and Rama Koteswara Rao G. "A Extensive Study on DDosBotnet Attacks in Multiple Environments Using Deep Learning and Machine Learning Techniques." ECS Transactions 107, no. 1 (April 24, 2022): 15181–93. http://dx.doi.org/10.1149/10701.15181ecst.
Full textLeal Piedrahita, Erwin Alexander. "Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations." Ciencia e Ingeniería Neogranadina 30, no. 1 (November 12, 2019): 75–88. http://dx.doi.org/10.18359/rcin.4236.
Full textAlotaibi, Nouf Saeed, Hassan Ibrahim Ahmed, and Samah Osama M. Kamel. "Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City." Sensors 23, no. 16 (August 12, 2023): 7135. http://dx.doi.org/10.3390/s23167135.
Full textAslam, Muhammad Muzamil, Zahoor Ahmed, Liping Du, Muhammad Zohaib Hassan, Sajid Ali, and Muhammad Nasir. "An Overview of Recent Advances of Resilient Consensus for Multiagent Systems under Attacks." Computational Intelligence and Neuroscience 2022 (August 2, 2022): 1–26. http://dx.doi.org/10.1155/2022/6732343.
Full textHtwe, Chaw Su, Zin Thu Thu Myint, and Yee Mon Thant. "IoT Security Using Machine Learning Methods with Features Correlation." Journal of Computing Theories and Applications 2, no. 2 (August 18, 2024): 151–63. http://dx.doi.org/10.62411/jcta.11179.
Full textOluwakemi, Oduwole Omolara, Muhammad, Umar Abdullahi, and Kene Tochukwu Anyachebelu. "Comparative Evaluation of Machine Learning Algorithms for Intrusion Detection." Asian Journal of Research in Computer Science 16, no. 4 (September 20, 2023): 8–22. http://dx.doi.org/10.9734/ajrcos/2023/v16i4366.
Full textAlkahtani, Hasan, and Theyazn H. H. Aldhyani. "Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems." Electronics 11, no. 11 (May 27, 2022): 1717. http://dx.doi.org/10.3390/electronics11111717.
Full textChoi, In-Sun, Junho Hong, and Tae-Wan Kim. "Multi-Agent Based Cyber Attack Detection and Mitigation for Distribution Automation System." IEEE Access 8 (2020): 183495–504. http://dx.doi.org/10.1109/access.2020.3029765.
Full textDAMANIK, HILLMAN AKHYAR, and MERRY ANGGRAENI. "Pola Pengelompokan dan Pencegahan Public Honeypot menggunakan Teknik K-Means dan Automation Shell-Script." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 12, no. 1 (January 17, 2024): 65. http://dx.doi.org/10.26760/elkomika.v12i1.65.
Full textAlshamsi, Omar, Khaled Shaalan, and Usman Butt. "Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach." Information 15, no. 10 (October 13, 2024): 631. http://dx.doi.org/10.3390/info15100631.
Full textWei, Min, Kee Wook Rim, and Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks." Applied Mechanics and Materials 121-126 (October 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.
Full textKasturi, Santanam, Xiaolong Li, Peng Li, and John Pickard. "A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems." American Journal of Networks and Communications 13, no. 1 (March 7, 2024): 19–29. http://dx.doi.org/10.11648/j.ajnc.20241301.12.
Full textKhan, Zulfiqar Ali, and Akbar Siami Namin. "A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology." Electronics 11, no. 23 (November 24, 2022): 3892. http://dx.doi.org/10.3390/electronics11233892.
Full textLu, Kang-Di, Guo-Qiang Zeng, Xizhao Luo, Jian Weng, Weiqi Luo, and Yongdong Wu. "Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System." IEEE Transactions on Industrial Informatics 17, no. 11 (November 2021): 7618–27. http://dx.doi.org/10.1109/tii.2021.3053304.
Full textGuo, Hui Ling. "Research on Rule Extraction Technology Based on Genetic Algorithm in Intrusion Detection." Advanced Materials Research 760-762 (September 2013): 857–61. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.857.
Full textMeleshko, Alexey, Anton Shulepov, Vasily Desnitsky, Evgenia Novikova, and Igor Kotenko. "Visualization Assisted Approach to Anomaly and Attack Detection in Water Treatment Systems." Water 14, no. 15 (July 29, 2022): 2342. http://dx.doi.org/10.3390/w14152342.
Full textBarletta, Vita Santa, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera, and Manuel Ángel Serrano Martín. "V-SOC4AS: A Vehicle-SOC for Improving Automotive Security." Algorithms 16, no. 2 (February 14, 2023): 112. http://dx.doi.org/10.3390/a16020112.
Full textT, Sowmika, Rohith Paul L, and Malathi G. "IOT Based Smart Rodent Detection and Fire Alert System in Farmland." International Research Journal of Multidisciplinary Technovation 2, no. 3 (May 30, 2020): 1–6. http://dx.doi.org/10.34256/irjmt2031.
Full textRao, Alwal Keerthan, and T. Rajashekar Reddy. "AUTONOMOUS MISSILE DEFENSE SYSTEM: INTEGRATING ADVANCED SONAR-BASED TRACKING FOR PRECISE DETECTION." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 14, no. 2 (March 9, 2023): 1055–60. http://dx.doi.org/10.61841/turcomat.v14i2.14332.
Full textB, Vivekanadam. "IoT based Smart Grid Attack Resistance in AC and DC State Estimation." Journal of Electrical Engineering and Automation 2, no. 3 (January 19, 2021): 118–22. http://dx.doi.org/10.36548/jeea.2020.3.002.
Full textIlokanuno, Ogochukwu A. "Smart Meter Tampering Detection Using IoT Based Unsupervised Machine Learning." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 5434–45. http://dx.doi.org/10.22214/ijraset.2024.61153.
Full textFeng, Tao, and Bugang Zhang. "Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB." Information 14, no. 12 (December 8, 2023): 653. http://dx.doi.org/10.3390/info14120653.
Full textHassan, Jawad, Muhammad Kamran Abid, Mughees Ahmad, Ali Ghulam, Muhammad Salman Fakhar, and Muhammad Asif. "A Survey on Blockchain-based Intrusion Detection Systems for IoT." VAWKUM Transactions on Computer Sciences 11, no. 1 (May 2, 2023): 138–51. http://dx.doi.org/10.21015/vtcs.v11i1.1385.
Full textAgnew, Dennis, Nader Aljohani, Reynold Mathieu, Sharon Boamah, Keerthiraj Nagaraj, Janise McNair, and Arturo Bretas. "Implementation Aspects of Smart Grids Cyber-Security Cross-Layered Framework for Critical Infrastructure Operation." Applied Sciences 12, no. 14 (July 7, 2022): 6868. http://dx.doi.org/10.3390/app12146868.
Full textDixit, Priyanka, Rashi Kohli, Angel Acevedo-Duque, Romel Ramon Gonzalez-Diaz, and Rutvij H. Jhaveri. "Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection." Security and Communication Networks 2021 (June 14, 2021): 1–23. http://dx.doi.org/10.1155/2021/5561816.
Full textWang, Lijun, Xian Guo, Xiaofan Zhang, and Zhanhui Gang. "Industrial Information Security Detection and Protection: Monitoring and Warning Platform Architecture Design and Cryptographic Antitheft Technology System Upgrade." Journal of Sensors 2022 (August 25, 2022): 1–11. http://dx.doi.org/10.1155/2022/1263330.
Full textSöğüt, Esra, and O. Ayhan Erdem. "A Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems." Applied Sciences 13, no. 10 (May 13, 2023): 5993. http://dx.doi.org/10.3390/app13105993.
Full textAravamudhan, Parthiban, and Kanimozhi T. "A novel adaptive network intrusion detection system for internet of things." PLOS ONE 18, no. 4 (April 21, 2023): e0283725. http://dx.doi.org/10.1371/journal.pone.0283725.
Full textAlshahrani, Hani, Attiya Khan, Muhammad Rizwan, Mana Saleh Al Reshan, Adel Sulaiman, and Asadullah Shaikh. "Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network." Sustainability 15, no. 11 (June 2, 2023): 9001. http://dx.doi.org/10.3390/su15119001.
Full textShalaginov, Andrii, and Muhammad Ajmal Azad. "Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications." Future Internet 13, no. 11 (October 27, 2021): 272. http://dx.doi.org/10.3390/fi13110272.
Full textAlmuqren, Latifah, Sumayh S. Aljameel, Hamed Alqahtani, Saud S. Alotaibi, Manar Ahmed Hamza, and Ahmed S. Salama. "A White Shark Equilibrium Optimizer with a Hybrid Deep-Learning-Based Cybersecurity Solution for a Smart City Environment." Sensors 23, no. 17 (August 24, 2023): 7370. http://dx.doi.org/10.3390/s23177370.
Full textBannikuppe Srinivasiah, Venkatesh Prasad, Roopashree Hejjaji Ranganathasharma, and Venkatesh Ramanna. "Multi-objective-trust aware improved grey wolf optimization technique for uncovering adversarial attacks in WSNs." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 1 (October 1, 2024): 375. http://dx.doi.org/10.11591/ijeecs.v36.i1.pp375-391.
Full textRai, Ankush, and Jagadeesh Kannan R. "MICROTUBULE BASED NEURO-FUZZY NESTED FRAMEWORK FOR SECURITY OF CYBER PHYSICAL SYSTEM." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 230. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19646.
Full textMazur-Milecka, Magdalena, Jacek Ruminski, Wojciech Glac, and Natalia Glowacka. "Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents." Applied Sciences 11, no. 14 (July 20, 2021): 6644. http://dx.doi.org/10.3390/app11146644.
Full textKasturi, Santanam, Xiaolong Li, Peng Li, and John Pickard. "On the Benefits of Vulnerability Data Consolidation in Application Security." International Conference on Cyber Warfare and Security 19, no. 1 (March 21, 2024): 455–62. http://dx.doi.org/10.34190/iccws.19.1.2086.
Full textLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (April 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Full textLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (April 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Full textWang, Dongzhihan, Guijin Ma, and Xiaorui Liu. "An intelligent recognition framework of access control system with anti-spoofing function." AIMS Mathematics 7, no. 6 (2022): 10495–512. http://dx.doi.org/10.3934/math.2022585.
Full textKaropoulos, Georgios, Georgios Kambourakis, Efstratios Chatzoglou, José L. Hernández-Ramos, and Vasileios Kouliaridis. "Demystifying In-Vehicle Intrusion Detection Systems: A Survey of Surveys and a Meta-Taxonomy." Electronics 11, no. 7 (March 29, 2022): 1072. http://dx.doi.org/10.3390/electronics11071072.
Full textIbraheem, Manar Khalid Ibraheem, Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed, and Ahmed Fakhfakh. "A Security-Enhanced Energy Conservation with Enhanced Random Forest Classifier for Low Execution Time Framework (S-2EC-ERF) for Wireless Sensor Networks." Applied Sciences 14, no. 6 (March 7, 2024): 2244. http://dx.doi.org/10.3390/app14062244.
Full textFaris, Mohammed, Mohd Nazri Mahmud, Mohd Fadzli Mohd Salleh, and Alhamzah Alnoor. "Wireless sensor network security: A recent review based on state-of-the-art works." International Journal of Engineering Business Management 15 (January 2023): 184797902311572. http://dx.doi.org/10.1177/18479790231157220.
Full text