Artigos de revistas sobre o tema "Attack Detection Automation"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Attack Detection Automation".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Wressnegger, Christian. "Efficient machine learning for attack detection". it - Information Technology 62, n.º 5-6 (16 de dezembro de 2020): 279–86. http://dx.doi.org/10.1515/itit-2020-0015.
Texto completo da fonteBeshah, Yonas Kibret, Surafel Lemma Abebe e Henock Mulugeta Melaku. "Drift Adaptive Online DDoS Attack Detection Framework for IoT System". Electronics 13, n.º 6 (7 de março de 2024): 1004. http://dx.doi.org/10.3390/electronics13061004.
Texto completo da fonteOkello, Fredrick Ochieng, Dennis Kaburu e Ndia G. John. "Automation-Based User Input Sql Injection Detection and Prevention Framework". Computer and Information Science 16, n.º 2 (2 de maio de 2023): 51. http://dx.doi.org/10.5539/cis.v16n2p51.
Texto completo da fonteHoush, Mashor, Noy Kadosh e Jack Haddad. "Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks". Sensors 22, n.º 16 (12 de agosto de 2022): 6035. http://dx.doi.org/10.3390/s22166035.
Texto completo da fonteKarthik Krishnan, T., S. Sridevi, G. Bindu e R. Anandan. "Comparison and detail study of attacks and detection methods for wireless sensor network". International Journal of Engineering & Technology 7, n.º 2.21 (20 de abril de 2018): 405. http://dx.doi.org/10.14419/ijet.v7i2.21.12453.
Texto completo da fonteYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang e Zhihao Liang. "Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study". Transactions on Computer Science and Intelligent Systems Research 3 (10 de abril de 2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.
Texto completo da fonteSztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny e Zuzanna Górecka. "Controller Cyber-Attack Detection and Isolation". Sensors 23, n.º 5 (3 de março de 2023): 2778. http://dx.doi.org/10.3390/s23052778.
Texto completo da fonteBinbusayyis, Adel. "Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers". Mathematics 12, n.º 11 (31 de maio de 2024): 1720. http://dx.doi.org/10.3390/math12111720.
Texto completo da fonteKim, Ye-Eun, Yea-Sul Kim e Hwankuk Kim. "Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network". Sensors 22, n.º 10 (18 de maio de 2022): 3819. http://dx.doi.org/10.3390/s22103819.
Texto completo da fonteOruganti, Rakesh, Jeeshitha J e Rama Koteswara Rao G. "A Extensive Study on DDosBotnet Attacks in Multiple Environments Using Deep Learning and Machine Learning Techniques". ECS Transactions 107, n.º 1 (24 de abril de 2022): 15181–93. http://dx.doi.org/10.1149/10701.15181ecst.
Texto completo da fonteLeal Piedrahita, Erwin Alexander. "Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations". Ciencia e Ingeniería Neogranadina 30, n.º 1 (12 de novembro de 2019): 75–88. http://dx.doi.org/10.18359/rcin.4236.
Texto completo da fonteAlotaibi, Nouf Saeed, Hassan Ibrahim Ahmed e Samah Osama M. Kamel. "Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City". Sensors 23, n.º 16 (12 de agosto de 2023): 7135. http://dx.doi.org/10.3390/s23167135.
Texto completo da fonteAslam, Muhammad Muzamil, Zahoor Ahmed, Liping Du, Muhammad Zohaib Hassan, Sajid Ali e Muhammad Nasir. "An Overview of Recent Advances of Resilient Consensus for Multiagent Systems under Attacks". Computational Intelligence and Neuroscience 2022 (2 de agosto de 2022): 1–26. http://dx.doi.org/10.1155/2022/6732343.
Texto completo da fonteHtwe, Chaw Su, Zin Thu Thu Myint e Yee Mon Thant. "IoT Security Using Machine Learning Methods with Features Correlation". Journal of Computing Theories and Applications 2, n.º 2 (18 de agosto de 2024): 151–63. http://dx.doi.org/10.62411/jcta.11179.
Texto completo da fonteOluwakemi, Oduwole Omolara, Muhammad, Umar Abdullahi e Kene Tochukwu Anyachebelu. "Comparative Evaluation of Machine Learning Algorithms for Intrusion Detection". Asian Journal of Research in Computer Science 16, n.º 4 (20 de setembro de 2023): 8–22. http://dx.doi.org/10.9734/ajrcos/2023/v16i4366.
Texto completo da fonteAlkahtani, Hasan, e Theyazn H. H. Aldhyani. "Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems". Electronics 11, n.º 11 (27 de maio de 2022): 1717. http://dx.doi.org/10.3390/electronics11111717.
Texto completo da fonteChoi, In-Sun, Junho Hong e Tae-Wan Kim. "Multi-Agent Based Cyber Attack Detection and Mitigation for Distribution Automation System". IEEE Access 8 (2020): 183495–504. http://dx.doi.org/10.1109/access.2020.3029765.
Texto completo da fonteDAMANIK, HILLMAN AKHYAR, e MERRY ANGGRAENI. "Pola Pengelompokan dan Pencegahan Public Honeypot menggunakan Teknik K-Means dan Automation Shell-Script". ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 12, n.º 1 (17 de janeiro de 2024): 65. http://dx.doi.org/10.26760/elkomika.v12i1.65.
Texto completo da fonteAlshamsi, Omar, Khaled Shaalan e Usman Butt. "Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach". Information 15, n.º 10 (13 de outubro de 2024): 631. http://dx.doi.org/10.3390/info15100631.
Texto completo da fonteWei, Min, Kee Wook Rim e Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks". Applied Mechanics and Materials 121-126 (outubro de 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.
Texto completo da fonteKasturi, Santanam, Xiaolong Li, Peng Li e John Pickard. "A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems". American Journal of Networks and Communications 13, n.º 1 (7 de março de 2024): 19–29. http://dx.doi.org/10.11648/j.ajnc.20241301.12.
Texto completo da fonteKhan, Zulfiqar Ali, e Akbar Siami Namin. "A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology". Electronics 11, n.º 23 (24 de novembro de 2022): 3892. http://dx.doi.org/10.3390/electronics11233892.
Texto completo da fonteLu, Kang-Di, Guo-Qiang Zeng, Xizhao Luo, Jian Weng, Weiqi Luo e Yongdong Wu. "Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System". IEEE Transactions on Industrial Informatics 17, n.º 11 (novembro de 2021): 7618–27. http://dx.doi.org/10.1109/tii.2021.3053304.
Texto completo da fonteGuo, Hui Ling. "Research on Rule Extraction Technology Based on Genetic Algorithm in Intrusion Detection". Advanced Materials Research 760-762 (setembro de 2013): 857–61. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.857.
Texto completo da fonteMeleshko, Alexey, Anton Shulepov, Vasily Desnitsky, Evgenia Novikova e Igor Kotenko. "Visualization Assisted Approach to Anomaly and Attack Detection in Water Treatment Systems". Water 14, n.º 15 (29 de julho de 2022): 2342. http://dx.doi.org/10.3390/w14152342.
Texto completo da fonteBarletta, Vita Santa, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera e Manuel Ángel Serrano Martín. "V-SOC4AS: A Vehicle-SOC for Improving Automotive Security". Algorithms 16, n.º 2 (14 de fevereiro de 2023): 112. http://dx.doi.org/10.3390/a16020112.
Texto completo da fonteT, Sowmika, Rohith Paul L e Malathi G. "IOT Based Smart Rodent Detection and Fire Alert System in Farmland". International Research Journal of Multidisciplinary Technovation 2, n.º 3 (30 de maio de 2020): 1–6. http://dx.doi.org/10.34256/irjmt2031.
Texto completo da fonteRao, Alwal Keerthan, e T. Rajashekar Reddy. "AUTONOMOUS MISSILE DEFENSE SYSTEM: INTEGRATING ADVANCED SONAR-BASED TRACKING FOR PRECISE DETECTION". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 14, n.º 2 (9 de março de 2023): 1055–60. http://dx.doi.org/10.61841/turcomat.v14i2.14332.
Texto completo da fonteB, Vivekanadam. "IoT based Smart Grid Attack Resistance in AC and DC State Estimation". Journal of Electrical Engineering and Automation 2, n.º 3 (19 de janeiro de 2021): 118–22. http://dx.doi.org/10.36548/jeea.2020.3.002.
Texto completo da fonteIlokanuno, Ogochukwu A. "Smart Meter Tampering Detection Using IoT Based Unsupervised Machine Learning". International Journal for Research in Applied Science and Engineering Technology 12, n.º 4 (30 de abril de 2024): 5434–45. http://dx.doi.org/10.22214/ijraset.2024.61153.
Texto completo da fonteFeng, Tao, e Bugang Zhang. "Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB". Information 14, n.º 12 (8 de dezembro de 2023): 653. http://dx.doi.org/10.3390/info14120653.
Texto completo da fonteHassan, Jawad, Muhammad Kamran Abid, Mughees Ahmad, Ali Ghulam, Muhammad Salman Fakhar e Muhammad Asif. "A Survey on Blockchain-based Intrusion Detection Systems for IoT". VAWKUM Transactions on Computer Sciences 11, n.º 1 (2 de maio de 2023): 138–51. http://dx.doi.org/10.21015/vtcs.v11i1.1385.
Texto completo da fonteAgnew, Dennis, Nader Aljohani, Reynold Mathieu, Sharon Boamah, Keerthiraj Nagaraj, Janise McNair e Arturo Bretas. "Implementation Aspects of Smart Grids Cyber-Security Cross-Layered Framework for Critical Infrastructure Operation". Applied Sciences 12, n.º 14 (7 de julho de 2022): 6868. http://dx.doi.org/10.3390/app12146868.
Texto completo da fonteDixit, Priyanka, Rashi Kohli, Angel Acevedo-Duque, Romel Ramon Gonzalez-Diaz e Rutvij H. Jhaveri. "Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection". Security and Communication Networks 2021 (14 de junho de 2021): 1–23. http://dx.doi.org/10.1155/2021/5561816.
Texto completo da fonteWang, Lijun, Xian Guo, Xiaofan Zhang e Zhanhui Gang. "Industrial Information Security Detection and Protection: Monitoring and Warning Platform Architecture Design and Cryptographic Antitheft Technology System Upgrade". Journal of Sensors 2022 (25 de agosto de 2022): 1–11. http://dx.doi.org/10.1155/2022/1263330.
Texto completo da fonteSöğüt, Esra, e O. Ayhan Erdem. "A Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems". Applied Sciences 13, n.º 10 (13 de maio de 2023): 5993. http://dx.doi.org/10.3390/app13105993.
Texto completo da fonteAravamudhan, Parthiban, e Kanimozhi T. "A novel adaptive network intrusion detection system for internet of things". PLOS ONE 18, n.º 4 (21 de abril de 2023): e0283725. http://dx.doi.org/10.1371/journal.pone.0283725.
Texto completo da fonteAlshahrani, Hani, Attiya Khan, Muhammad Rizwan, Mana Saleh Al Reshan, Adel Sulaiman e Asadullah Shaikh. "Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network". Sustainability 15, n.º 11 (2 de junho de 2023): 9001. http://dx.doi.org/10.3390/su15119001.
Texto completo da fonteShalaginov, Andrii, e Muhammad Ajmal Azad. "Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications". Future Internet 13, n.º 11 (27 de outubro de 2021): 272. http://dx.doi.org/10.3390/fi13110272.
Texto completo da fonteAlmuqren, Latifah, Sumayh S. Aljameel, Hamed Alqahtani, Saud S. Alotaibi, Manar Ahmed Hamza e Ahmed S. Salama. "A White Shark Equilibrium Optimizer with a Hybrid Deep-Learning-Based Cybersecurity Solution for a Smart City Environment". Sensors 23, n.º 17 (24 de agosto de 2023): 7370. http://dx.doi.org/10.3390/s23177370.
Texto completo da fonteBannikuppe Srinivasiah, Venkatesh Prasad, Roopashree Hejjaji Ranganathasharma e Venkatesh Ramanna. "Multi-objective-trust aware improved grey wolf optimization technique for uncovering adversarial attacks in WSNs". Indonesian Journal of Electrical Engineering and Computer Science 36, n.º 1 (1 de outubro de 2024): 375. http://dx.doi.org/10.11591/ijeecs.v36.i1.pp375-391.
Texto completo da fonteRai, Ankush, e Jagadeesh Kannan R. "MICROTUBULE BASED NEURO-FUZZY NESTED FRAMEWORK FOR SECURITY OF CYBER PHYSICAL SYSTEM". Asian Journal of Pharmaceutical and Clinical Research 10, n.º 13 (1 de abril de 2017): 230. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19646.
Texto completo da fonteMazur-Milecka, Magdalena, Jacek Ruminski, Wojciech Glac e Natalia Glowacka. "Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents". Applied Sciences 11, n.º 14 (20 de julho de 2021): 6644. http://dx.doi.org/10.3390/app11146644.
Texto completo da fonteKasturi, Santanam, Xiaolong Li, Peng Li e John Pickard. "On the Benefits of Vulnerability Data Consolidation in Application Security". International Conference on Cyber Warfare and Security 19, n.º 1 (21 de março de 2024): 455–62. http://dx.doi.org/10.34190/iccws.19.1.2086.
Texto completo da fonteLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi e Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services". 電腦學刊 33, n.º 2 (abril de 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Texto completo da fonteLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi e Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services". 電腦學刊 33, n.º 2 (abril de 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Texto completo da fonteWang, Dongzhihan, Guijin Ma e Xiaorui Liu. "An intelligent recognition framework of access control system with anti-spoofing function". AIMS Mathematics 7, n.º 6 (2022): 10495–512. http://dx.doi.org/10.3934/math.2022585.
Texto completo da fonteKaropoulos, Georgios, Georgios Kambourakis, Efstratios Chatzoglou, José L. Hernández-Ramos e Vasileios Kouliaridis. "Demystifying In-Vehicle Intrusion Detection Systems: A Survey of Surveys and a Meta-Taxonomy". Electronics 11, n.º 7 (29 de março de 2022): 1072. http://dx.doi.org/10.3390/electronics11071072.
Texto completo da fonteIbraheem, Manar Khalid Ibraheem, Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed e Ahmed Fakhfakh. "A Security-Enhanced Energy Conservation with Enhanced Random Forest Classifier for Low Execution Time Framework (S-2EC-ERF) for Wireless Sensor Networks". Applied Sciences 14, n.º 6 (7 de março de 2024): 2244. http://dx.doi.org/10.3390/app14062244.
Texto completo da fonteFaris, Mohammed, Mohd Nazri Mahmud, Mohd Fadzli Mohd Salleh e Alhamzah Alnoor. "Wireless sensor network security: A recent review based on state-of-the-art works". International Journal of Engineering Business Management 15 (janeiro de 2023): 184797902311572. http://dx.doi.org/10.1177/18479790231157220.
Texto completo da fonte