Articoli di riviste sul tema "Attack Detection Automation"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Attack Detection Automation".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Wressnegger, Christian. "Efficient machine learning for attack detection". it - Information Technology 62, n. 5-6 (16 dicembre 2020): 279–86. http://dx.doi.org/10.1515/itit-2020-0015.
Testo completoBeshah, Yonas Kibret, Surafel Lemma Abebe e Henock Mulugeta Melaku. "Drift Adaptive Online DDoS Attack Detection Framework for IoT System". Electronics 13, n. 6 (7 marzo 2024): 1004. http://dx.doi.org/10.3390/electronics13061004.
Testo completoOkello, Fredrick Ochieng, Dennis Kaburu e Ndia G. John. "Automation-Based User Input Sql Injection Detection and Prevention Framework". Computer and Information Science 16, n. 2 (2 maggio 2023): 51. http://dx.doi.org/10.5539/cis.v16n2p51.
Testo completoHoush, Mashor, Noy Kadosh e Jack Haddad. "Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks". Sensors 22, n. 16 (12 agosto 2022): 6035. http://dx.doi.org/10.3390/s22166035.
Testo completoKarthik Krishnan, T., S. Sridevi, G. Bindu e R. Anandan. "Comparison and detail study of attacks and detection methods for wireless sensor network". International Journal of Engineering & Technology 7, n. 2.21 (20 aprile 2018): 405. http://dx.doi.org/10.14419/ijet.v7i2.21.12453.
Testo completoYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang e Zhihao Liang. "Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study". Transactions on Computer Science and Intelligent Systems Research 3 (10 aprile 2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.
Testo completoSztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny e Zuzanna Górecka. "Controller Cyber-Attack Detection and Isolation". Sensors 23, n. 5 (3 marzo 2023): 2778. http://dx.doi.org/10.3390/s23052778.
Testo completoBinbusayyis, Adel. "Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers". Mathematics 12, n. 11 (31 maggio 2024): 1720. http://dx.doi.org/10.3390/math12111720.
Testo completoKim, Ye-Eun, Yea-Sul Kim e Hwankuk Kim. "Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network". Sensors 22, n. 10 (18 maggio 2022): 3819. http://dx.doi.org/10.3390/s22103819.
Testo completoOruganti, Rakesh, Jeeshitha J e Rama Koteswara Rao G. "A Extensive Study on DDosBotnet Attacks in Multiple Environments Using Deep Learning and Machine Learning Techniques". ECS Transactions 107, n. 1 (24 aprile 2022): 15181–93. http://dx.doi.org/10.1149/10701.15181ecst.
Testo completoLeal Piedrahita, Erwin Alexander. "Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations". Ciencia e Ingeniería Neogranadina 30, n. 1 (12 novembre 2019): 75–88. http://dx.doi.org/10.18359/rcin.4236.
Testo completoAlotaibi, Nouf Saeed, Hassan Ibrahim Ahmed e Samah Osama M. Kamel. "Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City". Sensors 23, n. 16 (12 agosto 2023): 7135. http://dx.doi.org/10.3390/s23167135.
Testo completoAslam, Muhammad Muzamil, Zahoor Ahmed, Liping Du, Muhammad Zohaib Hassan, Sajid Ali e Muhammad Nasir. "An Overview of Recent Advances of Resilient Consensus for Multiagent Systems under Attacks". Computational Intelligence and Neuroscience 2022 (2 agosto 2022): 1–26. http://dx.doi.org/10.1155/2022/6732343.
Testo completoHtwe, Chaw Su, Zin Thu Thu Myint e Yee Mon Thant. "IoT Security Using Machine Learning Methods with Features Correlation". Journal of Computing Theories and Applications 2, n. 2 (18 agosto 2024): 151–63. http://dx.doi.org/10.62411/jcta.11179.
Testo completoOluwakemi, Oduwole Omolara, Muhammad, Umar Abdullahi e Kene Tochukwu Anyachebelu. "Comparative Evaluation of Machine Learning Algorithms for Intrusion Detection". Asian Journal of Research in Computer Science 16, n. 4 (20 settembre 2023): 8–22. http://dx.doi.org/10.9734/ajrcos/2023/v16i4366.
Testo completoAlkahtani, Hasan, e Theyazn H. H. Aldhyani. "Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems". Electronics 11, n. 11 (27 maggio 2022): 1717. http://dx.doi.org/10.3390/electronics11111717.
Testo completoChoi, In-Sun, Junho Hong e Tae-Wan Kim. "Multi-Agent Based Cyber Attack Detection and Mitigation for Distribution Automation System". IEEE Access 8 (2020): 183495–504. http://dx.doi.org/10.1109/access.2020.3029765.
Testo completoDAMANIK, HILLMAN AKHYAR, e MERRY ANGGRAENI. "Pola Pengelompokan dan Pencegahan Public Honeypot menggunakan Teknik K-Means dan Automation Shell-Script". ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 12, n. 1 (17 gennaio 2024): 65. http://dx.doi.org/10.26760/elkomika.v12i1.65.
Testo completoAlshamsi, Omar, Khaled Shaalan e Usman Butt. "Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach". Information 15, n. 10 (13 ottobre 2024): 631. http://dx.doi.org/10.3390/info15100631.
Testo completoWei, Min, Kee Wook Rim e Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks". Applied Mechanics and Materials 121-126 (ottobre 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.
Testo completoKasturi, Santanam, Xiaolong Li, Peng Li e John Pickard. "A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems". American Journal of Networks and Communications 13, n. 1 (7 marzo 2024): 19–29. http://dx.doi.org/10.11648/j.ajnc.20241301.12.
Testo completoKhan, Zulfiqar Ali, e Akbar Siami Namin. "A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology". Electronics 11, n. 23 (24 novembre 2022): 3892. http://dx.doi.org/10.3390/electronics11233892.
Testo completoLu, Kang-Di, Guo-Qiang Zeng, Xizhao Luo, Jian Weng, Weiqi Luo e Yongdong Wu. "Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System". IEEE Transactions on Industrial Informatics 17, n. 11 (novembre 2021): 7618–27. http://dx.doi.org/10.1109/tii.2021.3053304.
Testo completoGuo, Hui Ling. "Research on Rule Extraction Technology Based on Genetic Algorithm in Intrusion Detection". Advanced Materials Research 760-762 (settembre 2013): 857–61. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.857.
Testo completoMeleshko, Alexey, Anton Shulepov, Vasily Desnitsky, Evgenia Novikova e Igor Kotenko. "Visualization Assisted Approach to Anomaly and Attack Detection in Water Treatment Systems". Water 14, n. 15 (29 luglio 2022): 2342. http://dx.doi.org/10.3390/w14152342.
Testo completoBarletta, Vita Santa, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera e Manuel Ángel Serrano Martín. "V-SOC4AS: A Vehicle-SOC for Improving Automotive Security". Algorithms 16, n. 2 (14 febbraio 2023): 112. http://dx.doi.org/10.3390/a16020112.
Testo completoT, Sowmika, Rohith Paul L e Malathi G. "IOT Based Smart Rodent Detection and Fire Alert System in Farmland". International Research Journal of Multidisciplinary Technovation 2, n. 3 (30 maggio 2020): 1–6. http://dx.doi.org/10.34256/irjmt2031.
Testo completoRao, Alwal Keerthan, e T. Rajashekar Reddy. "AUTONOMOUS MISSILE DEFENSE SYSTEM: INTEGRATING ADVANCED SONAR-BASED TRACKING FOR PRECISE DETECTION". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 14, n. 2 (9 marzo 2023): 1055–60. http://dx.doi.org/10.61841/turcomat.v14i2.14332.
Testo completoB, Vivekanadam. "IoT based Smart Grid Attack Resistance in AC and DC State Estimation". Journal of Electrical Engineering and Automation 2, n. 3 (19 gennaio 2021): 118–22. http://dx.doi.org/10.36548/jeea.2020.3.002.
Testo completoIlokanuno, Ogochukwu A. "Smart Meter Tampering Detection Using IoT Based Unsupervised Machine Learning". International Journal for Research in Applied Science and Engineering Technology 12, n. 4 (30 aprile 2024): 5434–45. http://dx.doi.org/10.22214/ijraset.2024.61153.
Testo completoFeng, Tao, e Bugang Zhang. "Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB". Information 14, n. 12 (8 dicembre 2023): 653. http://dx.doi.org/10.3390/info14120653.
Testo completoHassan, Jawad, Muhammad Kamran Abid, Mughees Ahmad, Ali Ghulam, Muhammad Salman Fakhar e Muhammad Asif. "A Survey on Blockchain-based Intrusion Detection Systems for IoT". VAWKUM Transactions on Computer Sciences 11, n. 1 (2 maggio 2023): 138–51. http://dx.doi.org/10.21015/vtcs.v11i1.1385.
Testo completoAgnew, Dennis, Nader Aljohani, Reynold Mathieu, Sharon Boamah, Keerthiraj Nagaraj, Janise McNair e Arturo Bretas. "Implementation Aspects of Smart Grids Cyber-Security Cross-Layered Framework for Critical Infrastructure Operation". Applied Sciences 12, n. 14 (7 luglio 2022): 6868. http://dx.doi.org/10.3390/app12146868.
Testo completoDixit, Priyanka, Rashi Kohli, Angel Acevedo-Duque, Romel Ramon Gonzalez-Diaz e Rutvij H. Jhaveri. "Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection". Security and Communication Networks 2021 (14 giugno 2021): 1–23. http://dx.doi.org/10.1155/2021/5561816.
Testo completoWang, Lijun, Xian Guo, Xiaofan Zhang e Zhanhui Gang. "Industrial Information Security Detection and Protection: Monitoring and Warning Platform Architecture Design and Cryptographic Antitheft Technology System Upgrade". Journal of Sensors 2022 (25 agosto 2022): 1–11. http://dx.doi.org/10.1155/2022/1263330.
Testo completoSöğüt, Esra, e O. Ayhan Erdem. "A Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems". Applied Sciences 13, n. 10 (13 maggio 2023): 5993. http://dx.doi.org/10.3390/app13105993.
Testo completoAravamudhan, Parthiban, e Kanimozhi T. "A novel adaptive network intrusion detection system for internet of things". PLOS ONE 18, n. 4 (21 aprile 2023): e0283725. http://dx.doi.org/10.1371/journal.pone.0283725.
Testo completoAlshahrani, Hani, Attiya Khan, Muhammad Rizwan, Mana Saleh Al Reshan, Adel Sulaiman e Asadullah Shaikh. "Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network". Sustainability 15, n. 11 (2 giugno 2023): 9001. http://dx.doi.org/10.3390/su15119001.
Testo completoShalaginov, Andrii, e Muhammad Ajmal Azad. "Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications". Future Internet 13, n. 11 (27 ottobre 2021): 272. http://dx.doi.org/10.3390/fi13110272.
Testo completoAlmuqren, Latifah, Sumayh S. Aljameel, Hamed Alqahtani, Saud S. Alotaibi, Manar Ahmed Hamza e Ahmed S. Salama. "A White Shark Equilibrium Optimizer with a Hybrid Deep-Learning-Based Cybersecurity Solution for a Smart City Environment". Sensors 23, n. 17 (24 agosto 2023): 7370. http://dx.doi.org/10.3390/s23177370.
Testo completoBannikuppe Srinivasiah, Venkatesh Prasad, Roopashree Hejjaji Ranganathasharma e Venkatesh Ramanna. "Multi-objective-trust aware improved grey wolf optimization technique for uncovering adversarial attacks in WSNs". Indonesian Journal of Electrical Engineering and Computer Science 36, n. 1 (1 ottobre 2024): 375. http://dx.doi.org/10.11591/ijeecs.v36.i1.pp375-391.
Testo completoRai, Ankush, e Jagadeesh Kannan R. "MICROTUBULE BASED NEURO-FUZZY NESTED FRAMEWORK FOR SECURITY OF CYBER PHYSICAL SYSTEM". Asian Journal of Pharmaceutical and Clinical Research 10, n. 13 (1 aprile 2017): 230. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19646.
Testo completoMazur-Milecka, Magdalena, Jacek Ruminski, Wojciech Glac e Natalia Glowacka. "Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents". Applied Sciences 11, n. 14 (20 luglio 2021): 6644. http://dx.doi.org/10.3390/app11146644.
Testo completoKasturi, Santanam, Xiaolong Li, Peng Li e John Pickard. "On the Benefits of Vulnerability Data Consolidation in Application Security". International Conference on Cyber Warfare and Security 19, n. 1 (21 marzo 2024): 455–62. http://dx.doi.org/10.34190/iccws.19.1.2086.
Testo completoLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi e Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services". 電腦學刊 33, n. 2 (aprile 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Testo completoLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi e Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services". 電腦學刊 33, n. 2 (aprile 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Testo completoWang, Dongzhihan, Guijin Ma e Xiaorui Liu. "An intelligent recognition framework of access control system with anti-spoofing function". AIMS Mathematics 7, n. 6 (2022): 10495–512. http://dx.doi.org/10.3934/math.2022585.
Testo completoKaropoulos, Georgios, Georgios Kambourakis, Efstratios Chatzoglou, José L. Hernández-Ramos e Vasileios Kouliaridis. "Demystifying In-Vehicle Intrusion Detection Systems: A Survey of Surveys and a Meta-Taxonomy". Electronics 11, n. 7 (29 marzo 2022): 1072. http://dx.doi.org/10.3390/electronics11071072.
Testo completoIbraheem, Manar Khalid Ibraheem, Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed e Ahmed Fakhfakh. "A Security-Enhanced Energy Conservation with Enhanced Random Forest Classifier for Low Execution Time Framework (S-2EC-ERF) for Wireless Sensor Networks". Applied Sciences 14, n. 6 (7 marzo 2024): 2244. http://dx.doi.org/10.3390/app14062244.
Testo completoFaris, Mohammed, Mohd Nazri Mahmud, Mohd Fadzli Mohd Salleh e Alhamzah Alnoor. "Wireless sensor network security: A recent review based on state-of-the-art works". International Journal of Engineering Business Management 15 (gennaio 2023): 184797902311572. http://dx.doi.org/10.1177/18479790231157220.
Testo completo