Artículos de revistas sobre el tema "Attack Detection Automation"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Attack Detection Automation".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Wressnegger, Christian. "Efficient machine learning for attack detection". it - Information Technology 62, n.º 5-6 (16 de diciembre de 2020): 279–86. http://dx.doi.org/10.1515/itit-2020-0015.
Texto completoBeshah, Yonas Kibret, Surafel Lemma Abebe y Henock Mulugeta Melaku. "Drift Adaptive Online DDoS Attack Detection Framework for IoT System". Electronics 13, n.º 6 (7 de marzo de 2024): 1004. http://dx.doi.org/10.3390/electronics13061004.
Texto completoOkello, Fredrick Ochieng, Dennis Kaburu y Ndia G. John. "Automation-Based User Input Sql Injection Detection and Prevention Framework". Computer and Information Science 16, n.º 2 (2 de mayo de 2023): 51. http://dx.doi.org/10.5539/cis.v16n2p51.
Texto completoHoush, Mashor, Noy Kadosh y Jack Haddad. "Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks". Sensors 22, n.º 16 (12 de agosto de 2022): 6035. http://dx.doi.org/10.3390/s22166035.
Texto completoKarthik Krishnan, T., S. Sridevi, G. Bindu y R. Anandan. "Comparison and detail study of attacks and detection methods for wireless sensor network". International Journal of Engineering & Technology 7, n.º 2.21 (20 de abril de 2018): 405. http://dx.doi.org/10.14419/ijet.v7i2.21.12453.
Texto completoYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang y Zhihao Liang. "Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study". Transactions on Computer Science and Intelligent Systems Research 3 (10 de abril de 2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.
Texto completoSztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny y Zuzanna Górecka. "Controller Cyber-Attack Detection and Isolation". Sensors 23, n.º 5 (3 de marzo de 2023): 2778. http://dx.doi.org/10.3390/s23052778.
Texto completoBinbusayyis, Adel. "Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers". Mathematics 12, n.º 11 (31 de mayo de 2024): 1720. http://dx.doi.org/10.3390/math12111720.
Texto completoKim, Ye-Eun, Yea-Sul Kim y Hwankuk Kim. "Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network". Sensors 22, n.º 10 (18 de mayo de 2022): 3819. http://dx.doi.org/10.3390/s22103819.
Texto completoOruganti, Rakesh, Jeeshitha J y Rama Koteswara Rao G. "A Extensive Study on DDosBotnet Attacks in Multiple Environments Using Deep Learning and Machine Learning Techniques". ECS Transactions 107, n.º 1 (24 de abril de 2022): 15181–93. http://dx.doi.org/10.1149/10701.15181ecst.
Texto completoLeal Piedrahita, Erwin Alexander. "Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations". Ciencia e Ingeniería Neogranadina 30, n.º 1 (12 de noviembre de 2019): 75–88. http://dx.doi.org/10.18359/rcin.4236.
Texto completoAlotaibi, Nouf Saeed, Hassan Ibrahim Ahmed y Samah Osama M. Kamel. "Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City". Sensors 23, n.º 16 (12 de agosto de 2023): 7135. http://dx.doi.org/10.3390/s23167135.
Texto completoAslam, Muhammad Muzamil, Zahoor Ahmed, Liping Du, Muhammad Zohaib Hassan, Sajid Ali y Muhammad Nasir. "An Overview of Recent Advances of Resilient Consensus for Multiagent Systems under Attacks". Computational Intelligence and Neuroscience 2022 (2 de agosto de 2022): 1–26. http://dx.doi.org/10.1155/2022/6732343.
Texto completoHtwe, Chaw Su, Zin Thu Thu Myint y Yee Mon Thant. "IoT Security Using Machine Learning Methods with Features Correlation". Journal of Computing Theories and Applications 2, n.º 2 (18 de agosto de 2024): 151–63. http://dx.doi.org/10.62411/jcta.11179.
Texto completoOluwakemi, Oduwole Omolara, Muhammad, Umar Abdullahi y Kene Tochukwu Anyachebelu. "Comparative Evaluation of Machine Learning Algorithms for Intrusion Detection". Asian Journal of Research in Computer Science 16, n.º 4 (20 de septiembre de 2023): 8–22. http://dx.doi.org/10.9734/ajrcos/2023/v16i4366.
Texto completoAlkahtani, Hasan y Theyazn H. H. Aldhyani. "Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems". Electronics 11, n.º 11 (27 de mayo de 2022): 1717. http://dx.doi.org/10.3390/electronics11111717.
Texto completoChoi, In-Sun, Junho Hong y Tae-Wan Kim. "Multi-Agent Based Cyber Attack Detection and Mitigation for Distribution Automation System". IEEE Access 8 (2020): 183495–504. http://dx.doi.org/10.1109/access.2020.3029765.
Texto completoDAMANIK, HILLMAN AKHYAR y MERRY ANGGRAENI. "Pola Pengelompokan dan Pencegahan Public Honeypot menggunakan Teknik K-Means dan Automation Shell-Script". ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 12, n.º 1 (17 de enero de 2024): 65. http://dx.doi.org/10.26760/elkomika.v12i1.65.
Texto completoAlshamsi, Omar, Khaled Shaalan y Usman Butt. "Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach". Information 15, n.º 10 (13 de octubre de 2024): 631. http://dx.doi.org/10.3390/info15100631.
Texto completoWei, Min, Kee Wook Rim y Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks". Applied Mechanics and Materials 121-126 (octubre de 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.
Texto completoKasturi, Santanam, Xiaolong Li, Peng Li y John Pickard. "A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems". American Journal of Networks and Communications 13, n.º 1 (7 de marzo de 2024): 19–29. http://dx.doi.org/10.11648/j.ajnc.20241301.12.
Texto completoKhan, Zulfiqar Ali y Akbar Siami Namin. "A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology". Electronics 11, n.º 23 (24 de noviembre de 2022): 3892. http://dx.doi.org/10.3390/electronics11233892.
Texto completoLu, Kang-Di, Guo-Qiang Zeng, Xizhao Luo, Jian Weng, Weiqi Luo y Yongdong Wu. "Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System". IEEE Transactions on Industrial Informatics 17, n.º 11 (noviembre de 2021): 7618–27. http://dx.doi.org/10.1109/tii.2021.3053304.
Texto completoGuo, Hui Ling. "Research on Rule Extraction Technology Based on Genetic Algorithm in Intrusion Detection". Advanced Materials Research 760-762 (septiembre de 2013): 857–61. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.857.
Texto completoMeleshko, Alexey, Anton Shulepov, Vasily Desnitsky, Evgenia Novikova y Igor Kotenko. "Visualization Assisted Approach to Anomaly and Attack Detection in Water Treatment Systems". Water 14, n.º 15 (29 de julio de 2022): 2342. http://dx.doi.org/10.3390/w14152342.
Texto completoBarletta, Vita Santa, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera y Manuel Ángel Serrano Martín. "V-SOC4AS: A Vehicle-SOC for Improving Automotive Security". Algorithms 16, n.º 2 (14 de febrero de 2023): 112. http://dx.doi.org/10.3390/a16020112.
Texto completoT, Sowmika, Rohith Paul L y Malathi G. "IOT Based Smart Rodent Detection and Fire Alert System in Farmland". International Research Journal of Multidisciplinary Technovation 2, n.º 3 (30 de mayo de 2020): 1–6. http://dx.doi.org/10.34256/irjmt2031.
Texto completoRao, Alwal Keerthan y T. Rajashekar Reddy. "AUTONOMOUS MISSILE DEFENSE SYSTEM: INTEGRATING ADVANCED SONAR-BASED TRACKING FOR PRECISE DETECTION". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 14, n.º 2 (9 de marzo de 2023): 1055–60. http://dx.doi.org/10.61841/turcomat.v14i2.14332.
Texto completoB, Vivekanadam. "IoT based Smart Grid Attack Resistance in AC and DC State Estimation". Journal of Electrical Engineering and Automation 2, n.º 3 (19 de enero de 2021): 118–22. http://dx.doi.org/10.36548/jeea.2020.3.002.
Texto completoIlokanuno, Ogochukwu A. "Smart Meter Tampering Detection Using IoT Based Unsupervised Machine Learning". International Journal for Research in Applied Science and Engineering Technology 12, n.º 4 (30 de abril de 2024): 5434–45. http://dx.doi.org/10.22214/ijraset.2024.61153.
Texto completoFeng, Tao y Bugang Zhang. "Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB". Information 14, n.º 12 (8 de diciembre de 2023): 653. http://dx.doi.org/10.3390/info14120653.
Texto completoHassan, Jawad, Muhammad Kamran Abid, Mughees Ahmad, Ali Ghulam, Muhammad Salman Fakhar y Muhammad Asif. "A Survey on Blockchain-based Intrusion Detection Systems for IoT". VAWKUM Transactions on Computer Sciences 11, n.º 1 (2 de mayo de 2023): 138–51. http://dx.doi.org/10.21015/vtcs.v11i1.1385.
Texto completoAgnew, Dennis, Nader Aljohani, Reynold Mathieu, Sharon Boamah, Keerthiraj Nagaraj, Janise McNair y Arturo Bretas. "Implementation Aspects of Smart Grids Cyber-Security Cross-Layered Framework for Critical Infrastructure Operation". Applied Sciences 12, n.º 14 (7 de julio de 2022): 6868. http://dx.doi.org/10.3390/app12146868.
Texto completoDixit, Priyanka, Rashi Kohli, Angel Acevedo-Duque, Romel Ramon Gonzalez-Diaz y Rutvij H. Jhaveri. "Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection". Security and Communication Networks 2021 (14 de junio de 2021): 1–23. http://dx.doi.org/10.1155/2021/5561816.
Texto completoWang, Lijun, Xian Guo, Xiaofan Zhang y Zhanhui Gang. "Industrial Information Security Detection and Protection: Monitoring and Warning Platform Architecture Design and Cryptographic Antitheft Technology System Upgrade". Journal of Sensors 2022 (25 de agosto de 2022): 1–11. http://dx.doi.org/10.1155/2022/1263330.
Texto completoSöğüt, Esra y O. Ayhan Erdem. "A Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems". Applied Sciences 13, n.º 10 (13 de mayo de 2023): 5993. http://dx.doi.org/10.3390/app13105993.
Texto completoAravamudhan, Parthiban y Kanimozhi T. "A novel adaptive network intrusion detection system for internet of things". PLOS ONE 18, n.º 4 (21 de abril de 2023): e0283725. http://dx.doi.org/10.1371/journal.pone.0283725.
Texto completoAlshahrani, Hani, Attiya Khan, Muhammad Rizwan, Mana Saleh Al Reshan, Adel Sulaiman y Asadullah Shaikh. "Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network". Sustainability 15, n.º 11 (2 de junio de 2023): 9001. http://dx.doi.org/10.3390/su15119001.
Texto completoShalaginov, Andrii y Muhammad Ajmal Azad. "Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications". Future Internet 13, n.º 11 (27 de octubre de 2021): 272. http://dx.doi.org/10.3390/fi13110272.
Texto completoAlmuqren, Latifah, Sumayh S. Aljameel, Hamed Alqahtani, Saud S. Alotaibi, Manar Ahmed Hamza y Ahmed S. Salama. "A White Shark Equilibrium Optimizer with a Hybrid Deep-Learning-Based Cybersecurity Solution for a Smart City Environment". Sensors 23, n.º 17 (24 de agosto de 2023): 7370. http://dx.doi.org/10.3390/s23177370.
Texto completoBannikuppe Srinivasiah, Venkatesh Prasad, Roopashree Hejjaji Ranganathasharma y Venkatesh Ramanna. "Multi-objective-trust aware improved grey wolf optimization technique for uncovering adversarial attacks in WSNs". Indonesian Journal of Electrical Engineering and Computer Science 36, n.º 1 (1 de octubre de 2024): 375. http://dx.doi.org/10.11591/ijeecs.v36.i1.pp375-391.
Texto completoRai, Ankush y Jagadeesh Kannan R. "MICROTUBULE BASED NEURO-FUZZY NESTED FRAMEWORK FOR SECURITY OF CYBER PHYSICAL SYSTEM". Asian Journal of Pharmaceutical and Clinical Research 10, n.º 13 (1 de abril de 2017): 230. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19646.
Texto completoMazur-Milecka, Magdalena, Jacek Ruminski, Wojciech Glac y Natalia Glowacka. "Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents". Applied Sciences 11, n.º 14 (20 de julio de 2021): 6644. http://dx.doi.org/10.3390/app11146644.
Texto completoKasturi, Santanam, Xiaolong Li, Peng Li y John Pickard. "On the Benefits of Vulnerability Data Consolidation in Application Security". International Conference on Cyber Warfare and Security 19, n.º 1 (21 de marzo de 2024): 455–62. http://dx.doi.org/10.34190/iccws.19.1.2086.
Texto completoLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi y Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services". 電腦學刊 33, n.º 2 (abril de 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Texto completoLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi y Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services". 電腦學刊 33, n.º 2 (abril de 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Texto completoWang, Dongzhihan, Guijin Ma y Xiaorui Liu. "An intelligent recognition framework of access control system with anti-spoofing function". AIMS Mathematics 7, n.º 6 (2022): 10495–512. http://dx.doi.org/10.3934/math.2022585.
Texto completoKaropoulos, Georgios, Georgios Kambourakis, Efstratios Chatzoglou, José L. Hernández-Ramos y Vasileios Kouliaridis. "Demystifying In-Vehicle Intrusion Detection Systems: A Survey of Surveys and a Meta-Taxonomy". Electronics 11, n.º 7 (29 de marzo de 2022): 1072. http://dx.doi.org/10.3390/electronics11071072.
Texto completoIbraheem, Manar Khalid Ibraheem, Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed y Ahmed Fakhfakh. "A Security-Enhanced Energy Conservation with Enhanced Random Forest Classifier for Low Execution Time Framework (S-2EC-ERF) for Wireless Sensor Networks". Applied Sciences 14, n.º 6 (7 de marzo de 2024): 2244. http://dx.doi.org/10.3390/app14062244.
Texto completoFaris, Mohammed, Mohd Nazri Mahmud, Mohd Fadzli Mohd Salleh y Alhamzah Alnoor. "Wireless sensor network security: A recent review based on state-of-the-art works". International Journal of Engineering Business Management 15 (enero de 2023): 184797902311572. http://dx.doi.org/10.1177/18479790231157220.
Texto completo