Artykuły w czasopismach na temat „Attack Detection Automation”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Attack Detection Automation”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Wressnegger, Christian. "Efficient machine learning for attack detection". it - Information Technology 62, nr 5-6 (16.12.2020): 279–86. http://dx.doi.org/10.1515/itit-2020-0015.
Pełny tekst źródłaBeshah, Yonas Kibret, Surafel Lemma Abebe i Henock Mulugeta Melaku. "Drift Adaptive Online DDoS Attack Detection Framework for IoT System". Electronics 13, nr 6 (7.03.2024): 1004. http://dx.doi.org/10.3390/electronics13061004.
Pełny tekst źródłaOkello, Fredrick Ochieng, Dennis Kaburu i Ndia G. John. "Automation-Based User Input Sql Injection Detection and Prevention Framework". Computer and Information Science 16, nr 2 (2.05.2023): 51. http://dx.doi.org/10.5539/cis.v16n2p51.
Pełny tekst źródłaHoush, Mashor, Noy Kadosh i Jack Haddad. "Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks". Sensors 22, nr 16 (12.08.2022): 6035. http://dx.doi.org/10.3390/s22166035.
Pełny tekst źródłaKarthik Krishnan, T., S. Sridevi, G. Bindu i R. Anandan. "Comparison and detail study of attacks and detection methods for wireless sensor network". International Journal of Engineering & Technology 7, nr 2.21 (20.04.2018): 405. http://dx.doi.org/10.14419/ijet.v7i2.21.12453.
Pełny tekst źródłaYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang i Zhihao Liang. "Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study". Transactions on Computer Science and Intelligent Systems Research 3 (10.04.2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.
Pełny tekst źródłaSztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny i Zuzanna Górecka. "Controller Cyber-Attack Detection and Isolation". Sensors 23, nr 5 (3.03.2023): 2778. http://dx.doi.org/10.3390/s23052778.
Pełny tekst źródłaBinbusayyis, Adel. "Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers". Mathematics 12, nr 11 (31.05.2024): 1720. http://dx.doi.org/10.3390/math12111720.
Pełny tekst źródłaKim, Ye-Eun, Yea-Sul Kim i Hwankuk Kim. "Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network". Sensors 22, nr 10 (18.05.2022): 3819. http://dx.doi.org/10.3390/s22103819.
Pełny tekst źródłaOruganti, Rakesh, Jeeshitha J i Rama Koteswara Rao G. "A Extensive Study on DDosBotnet Attacks in Multiple Environments Using Deep Learning and Machine Learning Techniques". ECS Transactions 107, nr 1 (24.04.2022): 15181–93. http://dx.doi.org/10.1149/10701.15181ecst.
Pełny tekst źródłaLeal Piedrahita, Erwin Alexander. "Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations". Ciencia e Ingeniería Neogranadina 30, nr 1 (12.11.2019): 75–88. http://dx.doi.org/10.18359/rcin.4236.
Pełny tekst źródłaAlotaibi, Nouf Saeed, Hassan Ibrahim Ahmed i Samah Osama M. Kamel. "Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City". Sensors 23, nr 16 (12.08.2023): 7135. http://dx.doi.org/10.3390/s23167135.
Pełny tekst źródłaAslam, Muhammad Muzamil, Zahoor Ahmed, Liping Du, Muhammad Zohaib Hassan, Sajid Ali i Muhammad Nasir. "An Overview of Recent Advances of Resilient Consensus for Multiagent Systems under Attacks". Computational Intelligence and Neuroscience 2022 (2.08.2022): 1–26. http://dx.doi.org/10.1155/2022/6732343.
Pełny tekst źródłaHtwe, Chaw Su, Zin Thu Thu Myint i Yee Mon Thant. "IoT Security Using Machine Learning Methods with Features Correlation". Journal of Computing Theories and Applications 2, nr 2 (18.08.2024): 151–63. http://dx.doi.org/10.62411/jcta.11179.
Pełny tekst źródłaOluwakemi, Oduwole Omolara, Muhammad, Umar Abdullahi i Kene Tochukwu Anyachebelu. "Comparative Evaluation of Machine Learning Algorithms for Intrusion Detection". Asian Journal of Research in Computer Science 16, nr 4 (20.09.2023): 8–22. http://dx.doi.org/10.9734/ajrcos/2023/v16i4366.
Pełny tekst źródłaAlkahtani, Hasan, i Theyazn H. H. Aldhyani. "Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems". Electronics 11, nr 11 (27.05.2022): 1717. http://dx.doi.org/10.3390/electronics11111717.
Pełny tekst źródłaChoi, In-Sun, Junho Hong i Tae-Wan Kim. "Multi-Agent Based Cyber Attack Detection and Mitigation for Distribution Automation System". IEEE Access 8 (2020): 183495–504. http://dx.doi.org/10.1109/access.2020.3029765.
Pełny tekst źródłaDAMANIK, HILLMAN AKHYAR, i MERRY ANGGRAENI. "Pola Pengelompokan dan Pencegahan Public Honeypot menggunakan Teknik K-Means dan Automation Shell-Script". ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 12, nr 1 (17.01.2024): 65. http://dx.doi.org/10.26760/elkomika.v12i1.65.
Pełny tekst źródłaAlshamsi, Omar, Khaled Shaalan i Usman Butt. "Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach". Information 15, nr 10 (13.10.2024): 631. http://dx.doi.org/10.3390/info15100631.
Pełny tekst źródłaWei, Min, Kee Wook Rim i Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks". Applied Mechanics and Materials 121-126 (październik 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.
Pełny tekst źródłaKasturi, Santanam, Xiaolong Li, Peng Li i John Pickard. "A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems". American Journal of Networks and Communications 13, nr 1 (7.03.2024): 19–29. http://dx.doi.org/10.11648/j.ajnc.20241301.12.
Pełny tekst źródłaKhan, Zulfiqar Ali, i Akbar Siami Namin. "A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology". Electronics 11, nr 23 (24.11.2022): 3892. http://dx.doi.org/10.3390/electronics11233892.
Pełny tekst źródłaLu, Kang-Di, Guo-Qiang Zeng, Xizhao Luo, Jian Weng, Weiqi Luo i Yongdong Wu. "Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System". IEEE Transactions on Industrial Informatics 17, nr 11 (listopad 2021): 7618–27. http://dx.doi.org/10.1109/tii.2021.3053304.
Pełny tekst źródłaGuo, Hui Ling. "Research on Rule Extraction Technology Based on Genetic Algorithm in Intrusion Detection". Advanced Materials Research 760-762 (wrzesień 2013): 857–61. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.857.
Pełny tekst źródłaMeleshko, Alexey, Anton Shulepov, Vasily Desnitsky, Evgenia Novikova i Igor Kotenko. "Visualization Assisted Approach to Anomaly and Attack Detection in Water Treatment Systems". Water 14, nr 15 (29.07.2022): 2342. http://dx.doi.org/10.3390/w14152342.
Pełny tekst źródłaBarletta, Vita Santa, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera i Manuel Ángel Serrano Martín. "V-SOC4AS: A Vehicle-SOC for Improving Automotive Security". Algorithms 16, nr 2 (14.02.2023): 112. http://dx.doi.org/10.3390/a16020112.
Pełny tekst źródłaT, Sowmika, Rohith Paul L i Malathi G. "IOT Based Smart Rodent Detection and Fire Alert System in Farmland". International Research Journal of Multidisciplinary Technovation 2, nr 3 (30.05.2020): 1–6. http://dx.doi.org/10.34256/irjmt2031.
Pełny tekst źródłaRao, Alwal Keerthan, i T. Rajashekar Reddy. "AUTONOMOUS MISSILE DEFENSE SYSTEM: INTEGRATING ADVANCED SONAR-BASED TRACKING FOR PRECISE DETECTION". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 14, nr 2 (9.03.2023): 1055–60. http://dx.doi.org/10.61841/turcomat.v14i2.14332.
Pełny tekst źródłaB, Vivekanadam. "IoT based Smart Grid Attack Resistance in AC and DC State Estimation". Journal of Electrical Engineering and Automation 2, nr 3 (19.01.2021): 118–22. http://dx.doi.org/10.36548/jeea.2020.3.002.
Pełny tekst źródłaIlokanuno, Ogochukwu A. "Smart Meter Tampering Detection Using IoT Based Unsupervised Machine Learning". International Journal for Research in Applied Science and Engineering Technology 12, nr 4 (30.04.2024): 5434–45. http://dx.doi.org/10.22214/ijraset.2024.61153.
Pełny tekst źródłaFeng, Tao, i Bugang Zhang. "Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB". Information 14, nr 12 (8.12.2023): 653. http://dx.doi.org/10.3390/info14120653.
Pełny tekst źródłaHassan, Jawad, Muhammad Kamran Abid, Mughees Ahmad, Ali Ghulam, Muhammad Salman Fakhar i Muhammad Asif. "A Survey on Blockchain-based Intrusion Detection Systems for IoT". VAWKUM Transactions on Computer Sciences 11, nr 1 (2.05.2023): 138–51. http://dx.doi.org/10.21015/vtcs.v11i1.1385.
Pełny tekst źródłaAgnew, Dennis, Nader Aljohani, Reynold Mathieu, Sharon Boamah, Keerthiraj Nagaraj, Janise McNair i Arturo Bretas. "Implementation Aspects of Smart Grids Cyber-Security Cross-Layered Framework for Critical Infrastructure Operation". Applied Sciences 12, nr 14 (7.07.2022): 6868. http://dx.doi.org/10.3390/app12146868.
Pełny tekst źródłaDixit, Priyanka, Rashi Kohli, Angel Acevedo-Duque, Romel Ramon Gonzalez-Diaz i Rutvij H. Jhaveri. "Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection". Security and Communication Networks 2021 (14.06.2021): 1–23. http://dx.doi.org/10.1155/2021/5561816.
Pełny tekst źródłaWang, Lijun, Xian Guo, Xiaofan Zhang i Zhanhui Gang. "Industrial Information Security Detection and Protection: Monitoring and Warning Platform Architecture Design and Cryptographic Antitheft Technology System Upgrade". Journal of Sensors 2022 (25.08.2022): 1–11. http://dx.doi.org/10.1155/2022/1263330.
Pełny tekst źródłaSöğüt, Esra, i O. Ayhan Erdem. "A Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems". Applied Sciences 13, nr 10 (13.05.2023): 5993. http://dx.doi.org/10.3390/app13105993.
Pełny tekst źródłaAravamudhan, Parthiban, i Kanimozhi T. "A novel adaptive network intrusion detection system for internet of things". PLOS ONE 18, nr 4 (21.04.2023): e0283725. http://dx.doi.org/10.1371/journal.pone.0283725.
Pełny tekst źródłaAlshahrani, Hani, Attiya Khan, Muhammad Rizwan, Mana Saleh Al Reshan, Adel Sulaiman i Asadullah Shaikh. "Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network". Sustainability 15, nr 11 (2.06.2023): 9001. http://dx.doi.org/10.3390/su15119001.
Pełny tekst źródłaShalaginov, Andrii, i Muhammad Ajmal Azad. "Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications". Future Internet 13, nr 11 (27.10.2021): 272. http://dx.doi.org/10.3390/fi13110272.
Pełny tekst źródłaAlmuqren, Latifah, Sumayh S. Aljameel, Hamed Alqahtani, Saud S. Alotaibi, Manar Ahmed Hamza i Ahmed S. Salama. "A White Shark Equilibrium Optimizer with a Hybrid Deep-Learning-Based Cybersecurity Solution for a Smart City Environment". Sensors 23, nr 17 (24.08.2023): 7370. http://dx.doi.org/10.3390/s23177370.
Pełny tekst źródłaBannikuppe Srinivasiah, Venkatesh Prasad, Roopashree Hejjaji Ranganathasharma i Venkatesh Ramanna. "Multi-objective-trust aware improved grey wolf optimization technique for uncovering adversarial attacks in WSNs". Indonesian Journal of Electrical Engineering and Computer Science 36, nr 1 (1.10.2024): 375. http://dx.doi.org/10.11591/ijeecs.v36.i1.pp375-391.
Pełny tekst źródłaRai, Ankush, i Jagadeesh Kannan R. "MICROTUBULE BASED NEURO-FUZZY NESTED FRAMEWORK FOR SECURITY OF CYBER PHYSICAL SYSTEM". Asian Journal of Pharmaceutical and Clinical Research 10, nr 13 (1.04.2017): 230. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19646.
Pełny tekst źródłaMazur-Milecka, Magdalena, Jacek Ruminski, Wojciech Glac i Natalia Glowacka. "Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents". Applied Sciences 11, nr 14 (20.07.2021): 6644. http://dx.doi.org/10.3390/app11146644.
Pełny tekst źródłaKasturi, Santanam, Xiaolong Li, Peng Li i John Pickard. "On the Benefits of Vulnerability Data Consolidation in Application Security". International Conference on Cyber Warfare and Security 19, nr 1 (21.03.2024): 455–62. http://dx.doi.org/10.34190/iccws.19.1.2086.
Pełny tekst źródłaLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi i Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services". 電腦學刊 33, nr 2 (kwiecień 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Pełny tekst źródłaLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi i Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services". 電腦學刊 33, nr 2 (kwiecień 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Pełny tekst źródłaWang, Dongzhihan, Guijin Ma i Xiaorui Liu. "An intelligent recognition framework of access control system with anti-spoofing function". AIMS Mathematics 7, nr 6 (2022): 10495–512. http://dx.doi.org/10.3934/math.2022585.
Pełny tekst źródłaKaropoulos, Georgios, Georgios Kambourakis, Efstratios Chatzoglou, José L. Hernández-Ramos i Vasileios Kouliaridis. "Demystifying In-Vehicle Intrusion Detection Systems: A Survey of Surveys and a Meta-Taxonomy". Electronics 11, nr 7 (29.03.2022): 1072. http://dx.doi.org/10.3390/electronics11071072.
Pełny tekst źródłaIbraheem, Manar Khalid Ibraheem, Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed i Ahmed Fakhfakh. "A Security-Enhanced Energy Conservation with Enhanced Random Forest Classifier for Low Execution Time Framework (S-2EC-ERF) for Wireless Sensor Networks". Applied Sciences 14, nr 6 (7.03.2024): 2244. http://dx.doi.org/10.3390/app14062244.
Pełny tekst źródłaFaris, Mohammed, Mohd Nazri Mahmud, Mohd Fadzli Mohd Salleh i Alhamzah Alnoor. "Wireless sensor network security: A recent review based on state-of-the-art works". International Journal of Engineering Business Management 15 (styczeń 2023): 184797902311572. http://dx.doi.org/10.1177/18479790231157220.
Pełny tekst źródła