Статті в журналах з теми "Attack Detection Automation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Attack Detection Automation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Wressnegger, Christian. "Efficient machine learning for attack detection." it - Information Technology 62, no. 5-6 (December 16, 2020): 279–86. http://dx.doi.org/10.1515/itit-2020-0015.
Повний текст джерелаBeshah, Yonas Kibret, Surafel Lemma Abebe, and Henock Mulugeta Melaku. "Drift Adaptive Online DDoS Attack Detection Framework for IoT System." Electronics 13, no. 6 (March 7, 2024): 1004. http://dx.doi.org/10.3390/electronics13061004.
Повний текст джерелаOkello, Fredrick Ochieng, Dennis Kaburu, and Ndia G. John. "Automation-Based User Input Sql Injection Detection and Prevention Framework." Computer and Information Science 16, no. 2 (May 2, 2023): 51. http://dx.doi.org/10.5539/cis.v16n2p51.
Повний текст джерелаHoush, Mashor, Noy Kadosh, and Jack Haddad. "Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks." Sensors 22, no. 16 (August 12, 2022): 6035. http://dx.doi.org/10.3390/s22166035.
Повний текст джерелаKarthik Krishnan, T., S. Sridevi, G. Bindu, and R. Anandan. "Comparison and detail study of attacks and detection methods for wireless sensor network." International Journal of Engineering & Technology 7, no. 2.21 (April 20, 2018): 405. http://dx.doi.org/10.14419/ijet.v7i2.21.12453.
Повний текст джерелаYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang, and Zhihao Liang. "Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study." Transactions on Computer Science and Intelligent Systems Research 3 (April 10, 2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.
Повний текст джерелаSztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny, and Zuzanna Górecka. "Controller Cyber-Attack Detection and Isolation." Sensors 23, no. 5 (March 3, 2023): 2778. http://dx.doi.org/10.3390/s23052778.
Повний текст джерелаBinbusayyis, Adel. "Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers." Mathematics 12, no. 11 (May 31, 2024): 1720. http://dx.doi.org/10.3390/math12111720.
Повний текст джерелаKim, Ye-Eun, Yea-Sul Kim, and Hwankuk Kim. "Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network." Sensors 22, no. 10 (May 18, 2022): 3819. http://dx.doi.org/10.3390/s22103819.
Повний текст джерелаOruganti, Rakesh, Jeeshitha J, and Rama Koteswara Rao G. "A Extensive Study on DDosBotnet Attacks in Multiple Environments Using Deep Learning and Machine Learning Techniques." ECS Transactions 107, no. 1 (April 24, 2022): 15181–93. http://dx.doi.org/10.1149/10701.15181ecst.
Повний текст джерелаLeal Piedrahita, Erwin Alexander. "Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations." Ciencia e Ingeniería Neogranadina 30, no. 1 (November 12, 2019): 75–88. http://dx.doi.org/10.18359/rcin.4236.
Повний текст джерелаAlotaibi, Nouf Saeed, Hassan Ibrahim Ahmed, and Samah Osama M. Kamel. "Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City." Sensors 23, no. 16 (August 12, 2023): 7135. http://dx.doi.org/10.3390/s23167135.
Повний текст джерелаAslam, Muhammad Muzamil, Zahoor Ahmed, Liping Du, Muhammad Zohaib Hassan, Sajid Ali, and Muhammad Nasir. "An Overview of Recent Advances of Resilient Consensus for Multiagent Systems under Attacks." Computational Intelligence and Neuroscience 2022 (August 2, 2022): 1–26. http://dx.doi.org/10.1155/2022/6732343.
Повний текст джерелаHtwe, Chaw Su, Zin Thu Thu Myint, and Yee Mon Thant. "IoT Security Using Machine Learning Methods with Features Correlation." Journal of Computing Theories and Applications 2, no. 2 (August 18, 2024): 151–63. http://dx.doi.org/10.62411/jcta.11179.
Повний текст джерелаOluwakemi, Oduwole Omolara, Muhammad, Umar Abdullahi, and Kene Tochukwu Anyachebelu. "Comparative Evaluation of Machine Learning Algorithms for Intrusion Detection." Asian Journal of Research in Computer Science 16, no. 4 (September 20, 2023): 8–22. http://dx.doi.org/10.9734/ajrcos/2023/v16i4366.
Повний текст джерелаAlkahtani, Hasan, and Theyazn H. H. Aldhyani. "Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems." Electronics 11, no. 11 (May 27, 2022): 1717. http://dx.doi.org/10.3390/electronics11111717.
Повний текст джерелаChoi, In-Sun, Junho Hong, and Tae-Wan Kim. "Multi-Agent Based Cyber Attack Detection and Mitigation for Distribution Automation System." IEEE Access 8 (2020): 183495–504. http://dx.doi.org/10.1109/access.2020.3029765.
Повний текст джерелаDAMANIK, HILLMAN AKHYAR, and MERRY ANGGRAENI. "Pola Pengelompokan dan Pencegahan Public Honeypot menggunakan Teknik K-Means dan Automation Shell-Script." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 12, no. 1 (January 17, 2024): 65. http://dx.doi.org/10.26760/elkomika.v12i1.65.
Повний текст джерелаAlshamsi, Omar, Khaled Shaalan, and Usman Butt. "Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach." Information 15, no. 10 (October 13, 2024): 631. http://dx.doi.org/10.3390/info15100631.
Повний текст джерелаWei, Min, Kee Wook Rim, and Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks." Applied Mechanics and Materials 121-126 (October 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.
Повний текст джерелаKasturi, Santanam, Xiaolong Li, Peng Li, and John Pickard. "A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems." American Journal of Networks and Communications 13, no. 1 (March 7, 2024): 19–29. http://dx.doi.org/10.11648/j.ajnc.20241301.12.
Повний текст джерелаKhan, Zulfiqar Ali, and Akbar Siami Namin. "A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology." Electronics 11, no. 23 (November 24, 2022): 3892. http://dx.doi.org/10.3390/electronics11233892.
Повний текст джерелаLu, Kang-Di, Guo-Qiang Zeng, Xizhao Luo, Jian Weng, Weiqi Luo, and Yongdong Wu. "Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System." IEEE Transactions on Industrial Informatics 17, no. 11 (November 2021): 7618–27. http://dx.doi.org/10.1109/tii.2021.3053304.
Повний текст джерелаGuo, Hui Ling. "Research on Rule Extraction Technology Based on Genetic Algorithm in Intrusion Detection." Advanced Materials Research 760-762 (September 2013): 857–61. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.857.
Повний текст джерелаMeleshko, Alexey, Anton Shulepov, Vasily Desnitsky, Evgenia Novikova, and Igor Kotenko. "Visualization Assisted Approach to Anomaly and Attack Detection in Water Treatment Systems." Water 14, no. 15 (July 29, 2022): 2342. http://dx.doi.org/10.3390/w14152342.
Повний текст джерелаBarletta, Vita Santa, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera, and Manuel Ángel Serrano Martín. "V-SOC4AS: A Vehicle-SOC for Improving Automotive Security." Algorithms 16, no. 2 (February 14, 2023): 112. http://dx.doi.org/10.3390/a16020112.
Повний текст джерелаT, Sowmika, Rohith Paul L, and Malathi G. "IOT Based Smart Rodent Detection and Fire Alert System in Farmland." International Research Journal of Multidisciplinary Technovation 2, no. 3 (May 30, 2020): 1–6. http://dx.doi.org/10.34256/irjmt2031.
Повний текст джерелаRao, Alwal Keerthan, and T. Rajashekar Reddy. "AUTONOMOUS MISSILE DEFENSE SYSTEM: INTEGRATING ADVANCED SONAR-BASED TRACKING FOR PRECISE DETECTION." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 14, no. 2 (March 9, 2023): 1055–60. http://dx.doi.org/10.61841/turcomat.v14i2.14332.
Повний текст джерелаB, Vivekanadam. "IoT based Smart Grid Attack Resistance in AC and DC State Estimation." Journal of Electrical Engineering and Automation 2, no. 3 (January 19, 2021): 118–22. http://dx.doi.org/10.36548/jeea.2020.3.002.
Повний текст джерелаIlokanuno, Ogochukwu A. "Smart Meter Tampering Detection Using IoT Based Unsupervised Machine Learning." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 5434–45. http://dx.doi.org/10.22214/ijraset.2024.61153.
Повний текст джерелаFeng, Tao, and Bugang Zhang. "Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB." Information 14, no. 12 (December 8, 2023): 653. http://dx.doi.org/10.3390/info14120653.
Повний текст джерелаHassan, Jawad, Muhammad Kamran Abid, Mughees Ahmad, Ali Ghulam, Muhammad Salman Fakhar, and Muhammad Asif. "A Survey on Blockchain-based Intrusion Detection Systems for IoT." VAWKUM Transactions on Computer Sciences 11, no. 1 (May 2, 2023): 138–51. http://dx.doi.org/10.21015/vtcs.v11i1.1385.
Повний текст джерелаAgnew, Dennis, Nader Aljohani, Reynold Mathieu, Sharon Boamah, Keerthiraj Nagaraj, Janise McNair, and Arturo Bretas. "Implementation Aspects of Smart Grids Cyber-Security Cross-Layered Framework for Critical Infrastructure Operation." Applied Sciences 12, no. 14 (July 7, 2022): 6868. http://dx.doi.org/10.3390/app12146868.
Повний текст джерелаDixit, Priyanka, Rashi Kohli, Angel Acevedo-Duque, Romel Ramon Gonzalez-Diaz, and Rutvij H. Jhaveri. "Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection." Security and Communication Networks 2021 (June 14, 2021): 1–23. http://dx.doi.org/10.1155/2021/5561816.
Повний текст джерелаWang, Lijun, Xian Guo, Xiaofan Zhang, and Zhanhui Gang. "Industrial Information Security Detection and Protection: Monitoring and Warning Platform Architecture Design and Cryptographic Antitheft Technology System Upgrade." Journal of Sensors 2022 (August 25, 2022): 1–11. http://dx.doi.org/10.1155/2022/1263330.
Повний текст джерелаSöğüt, Esra, and O. Ayhan Erdem. "A Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems." Applied Sciences 13, no. 10 (May 13, 2023): 5993. http://dx.doi.org/10.3390/app13105993.
Повний текст джерелаAravamudhan, Parthiban, and Kanimozhi T. "A novel adaptive network intrusion detection system for internet of things." PLOS ONE 18, no. 4 (April 21, 2023): e0283725. http://dx.doi.org/10.1371/journal.pone.0283725.
Повний текст джерелаAlshahrani, Hani, Attiya Khan, Muhammad Rizwan, Mana Saleh Al Reshan, Adel Sulaiman, and Asadullah Shaikh. "Intrusion Detection Framework for Industrial Internet of Things Using Software Defined Network." Sustainability 15, no. 11 (June 2, 2023): 9001. http://dx.doi.org/10.3390/su15119001.
Повний текст джерелаShalaginov, Andrii, and Muhammad Ajmal Azad. "Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications." Future Internet 13, no. 11 (October 27, 2021): 272. http://dx.doi.org/10.3390/fi13110272.
Повний текст джерелаAlmuqren, Latifah, Sumayh S. Aljameel, Hamed Alqahtani, Saud S. Alotaibi, Manar Ahmed Hamza, and Ahmed S. Salama. "A White Shark Equilibrium Optimizer with a Hybrid Deep-Learning-Based Cybersecurity Solution for a Smart City Environment." Sensors 23, no. 17 (August 24, 2023): 7370. http://dx.doi.org/10.3390/s23177370.
Повний текст джерелаBannikuppe Srinivasiah, Venkatesh Prasad, Roopashree Hejjaji Ranganathasharma, and Venkatesh Ramanna. "Multi-objective-trust aware improved grey wolf optimization technique for uncovering adversarial attacks in WSNs." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 1 (October 1, 2024): 375. http://dx.doi.org/10.11591/ijeecs.v36.i1.pp375-391.
Повний текст джерелаRai, Ankush, and Jagadeesh Kannan R. "MICROTUBULE BASED NEURO-FUZZY NESTED FRAMEWORK FOR SECURITY OF CYBER PHYSICAL SYSTEM." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 230. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19646.
Повний текст джерелаMazur-Milecka, Magdalena, Jacek Ruminski, Wojciech Glac, and Natalia Glowacka. "Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents." Applied Sciences 11, no. 14 (July 20, 2021): 6644. http://dx.doi.org/10.3390/app11146644.
Повний текст джерелаKasturi, Santanam, Xiaolong Li, Peng Li, and John Pickard. "On the Benefits of Vulnerability Data Consolidation in Application Security." International Conference on Cyber Warfare and Security 19, no. 1 (March 21, 2024): 455–62. http://dx.doi.org/10.34190/iccws.19.1.2086.
Повний текст джерелаLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (April 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Повний текст джерелаLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (April 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Повний текст джерелаWang, Dongzhihan, Guijin Ma, and Xiaorui Liu. "An intelligent recognition framework of access control system with anti-spoofing function." AIMS Mathematics 7, no. 6 (2022): 10495–512. http://dx.doi.org/10.3934/math.2022585.
Повний текст джерелаKaropoulos, Georgios, Georgios Kambourakis, Efstratios Chatzoglou, José L. Hernández-Ramos, and Vasileios Kouliaridis. "Demystifying In-Vehicle Intrusion Detection Systems: A Survey of Surveys and a Meta-Taxonomy." Electronics 11, no. 7 (March 29, 2022): 1072. http://dx.doi.org/10.3390/electronics11071072.
Повний текст джерелаIbraheem, Manar Khalid Ibraheem, Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed, and Ahmed Fakhfakh. "A Security-Enhanced Energy Conservation with Enhanced Random Forest Classifier for Low Execution Time Framework (S-2EC-ERF) for Wireless Sensor Networks." Applied Sciences 14, no. 6 (March 7, 2024): 2244. http://dx.doi.org/10.3390/app14062244.
Повний текст джерелаFaris, Mohammed, Mohd Nazri Mahmud, Mohd Fadzli Mohd Salleh, and Alhamzah Alnoor. "Wireless sensor network security: A recent review based on state-of-the-art works." International Journal of Engineering Business Management 15 (January 2023): 184797902311572. http://dx.doi.org/10.1177/18479790231157220.
Повний текст джерела