Добірка наукової літератури з теми "Cybernetic attacks"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Cybernetic attacks".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Cybernetic attacks":

1

Moga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Ramona Lile, and Nurettin Erginoz. "Massive Cyber-Attacks Patterns Implemented with BDI Agents." Applied Mechanics and Materials 811 (November 2015): 383–89. http://dx.doi.org/10.4028/www.scientific.net/amm.811.383.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper treats the new phenomenon of cyber-war as a new form of human violence between states. The concept of cyber-attack is a particular form of cybernetic war and it is one expensive in terms of cost. We tried to achieve a uniform approach of technological and sociological type using BDI agents and thus making the step to addressing computational sociology of cyberspace. We present two patterns of massive type attacks applicable in cyber space using BDI agents. The approach using BDI agents turned to be flexible and capable to model complex forms of cyber bullying that can occur between two countries in future.
2

Moga, Horatiu, Mircea Boscoianu, Delia Ungureanu, Florin Sandu, and Ramona Lile. "Using BDI Agents in Flexible Patterns for Cyber-Attacks over Electrical Power Infrastructures." Applied Mechanics and Materials 841 (June 2016): 97–104. http://dx.doi.org/10.4028/www.scientific.net/amm.841.97.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This work aims to assess how the infrastructure of production & transport of the electric energy can be annihilated in a nation-state through a cyber attack, as a particular form of manifestation of cybernetic warfare. In this study we consider that the purpose of the cyber attack is only to remove servers from service, logically or physically. There are several standards that integrate the business side of a company with the level of supervision of industrial infrastructure and with the level of control engineering. These levels are integrated and are using different protocols. To simulate cyber-attacks between the countries with flexible potential escalation there are used BDI (Belief-Desire-Intention) agents which allow to separate treatment of different types of attacks. Inspired by the study of nuclear attacks implemented using the game theory, the flexibility of the BDI paradigm increases research potential of decision trees using this type of agent in other areas of human existence, like modeling human behavior at policy states makers or cyberspace executive users.
3

Kubanov, E. V. "Theoretical approaches to the conceptual-categorical apparatus of cybersecurity in the system of public administration." Public administration aspects 6, no. 8 (September 10, 2018): 49–55. http://dx.doi.org/10.15421/151846.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The article analyzed the scientific approaches to the concept of «cybersecurity». The author defined the concept of «cybersecurity of the public administration system», which is understood as the basis of the national security of Ukraine, which forms the security of the state, society, public administration system, and the population of the country in the cybernetic space through the creation of legitimate mechanisms for ensuring the cybersecurity of public administration. The article identified internal and external threats. The author highlighted the main elements of the cybersecurity system of public administration, in particular: information, information and communication systems; threats; mechanisms of providing cybersecurity of the public administration system; subjects of the cybersecurity of the public administration system.Integration of Ukraine into the European space and the reform of the spheres of economy, industry and defense has called for a radically new approach to information and cybernetic security. Cyberspace as an arena of conflicts between states, organizations, and officials is one of the most pressing problems of the present.The article analyzes the scientific approaches to the concept of «cyber security» and states that cybersecurity of the system of public administration is the basis of the national security of Ukraine, which forms the security of the state, society, public administration system, and the population of the country in the cybernetic space through the creation of legitimate mechanisms for ensuring the cybersecurity of public administration. Separate internal (corruption actions; hardware bookmarks in chips and firmware of computer and network equipment; weak organization of the cyberspace management system) and external threats (targeted attacks, cyberterrorism, cyberwar, hatcism, attacks on banking systems, attacks on e-government).
4

Dudek, Wojciech, and Wojciech Szynkiewicz. "Cyber-security for Mobile Service Robots – Challenges for Cyber-physical System Safety." Journal of Telecommunications and Information Technology 2 (June 28, 2019): 29–36. http://dx.doi.org/10.26636/jtit.2019.131019.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A review of the known and an indication of the new threats for cyber-physical robotic systems, caused by cybernetic attacks, serves, in this paper, as a basis for the analysis of the known methods relied upon to detect and mitigate consequences of such attacks. A particular emphasis is placed on threats specific for cyber-physical systems, as they are a feature distinguishing these systems from their traditional Information and Communication Technologies (ICT) counterparts. Based on the review of literature and own analyses, unresolved issues regarding the cyber-security of robot systems are presented and discussed.
5

Akhmetov, B. S., V. A. Lakhno, M. B. Ydyryshbayeva, A. Abuova, and Sh Sagyndykova. "Decision support system for assessing the consequences of cyber attacks." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 83, no. 1 (March 15, 2022): 21–29. http://dx.doi.org/10.47533/2020.1606-146x.136.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The architecture of the Bayesian_Net decision support system (DSS) is described, which was developed to analyze data on signs of anomalies and cyberattacks based on the use of Bayesian Networks (BN) for this task. The proposed DSS is distinguished by the use of object-oriented programming and has a modular architecture. The Bayesian_Net DSS is designed to solve data mining problems, in particular, to analyze weakly structured problems related to cybernetic security (CS) of informatization objects (IO), and to assess the consequences of cyber attacks in conditions of weakly structured data on signs and detected anomalies.
6

Osak, Alexey, Daniil Panasetsky, and Elena Buzina. "Analysis of cyber vulnerabilities of the emergency control and relay protection to assess the reliability and survivability of electrical power systems in the era of total digitalization." E3S Web of Conferences 216 (2020): 01040. http://dx.doi.org/10.1051/e3sconf/202021601040.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Cyber threats pose an increasing threat to energy objects. It is essential to ensure the cybersecurity of automatic control systems, such as relay protection devices (RP), devices of regime control (RC) and emergency control (EC), automated control systems. At the same time, the issues of cybersecurity include not only the problem of hacker attacks, but also the whole complex of problems relating to adequate functioning of cybernetic systems in the power industry. The authors consider two of the most acute aspects of cybersecurity in the energy systems of the future in the era of total digitalization: large-scale prepared cyber attacks on the electrical power systems (EPS) as a whole and large-scale cyber attacks on distribution networks with small-scale generation facilities and active consumers.
7

Laktionov, Illia, Andrii Kmit, Ivan Opirskyy, and Oleh Harasymchuk. "RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR." Cybersecurity: Education, Science, Technique 1, no. 17 (2022): 91–111. http://dx.doi.org/10.28925/2663-4023.2022.17.91111.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
To date, information technologies have entered all the spheres of society. Due to the rapid development of scientific and technological progress, the traditional methods of introduction of wars, which are currently underway not only in the field of hostilities, but also in the cybernetic space of society, are also changing. The modern world is characterized by active wars in cyberspace, where one of the most common attacks is DDoS-attack, including critical infrastructure. This is primarily due to the extreme density of integration into the life and activities of the society of various gadgets, electronic devices and the Internet, the violation of which can cause significant damage - both psychological and significant damage to the enemy from the inside. One of the simplest and most popular methods for violating such normal functioning is the use of resource overload, which can even lead to their complete inaccessibility. One of the ways of overload is the use of DDoS-attacks in case of refusal of service. Mass sending external requests to the attacked resource leads to the fact that such a resource in a short period of time is trying to develop a significant number of requests, which will lead to a significant slowdown in its work or even lead to a complete stop of the resource. This work is devoted to the study of the methods by which DDoS-atack are carried out. The most common methods for their implementation and the main methods of protection against them are considered in detail. This work has examined in detail the technologies and methods of protection against DDoS attacks analyzed and relatively existing solutions of ready-made companies for protection. But since information technologies are developing rapidly, DDoS attacks will develop. Consequently, the problem of protection against them is relevant, especially in the conditions of cyber.
8

Shukla, Prashant Kumar. "An Enterprise of Cognitive Fog Computing For Disturbance Recognition in Internet of Things." International Journal of Wireless and Ad Hoc Communication 7, no. 1 (2023): 18–27. http://dx.doi.org/10.54216/ijwac.070102.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Things (IoT) is a cutting-edge piece of cybernetic infrastructure that will eventually link all manner of previously disconnected physical objects to the web. The IoT is rapidly expanding into many facets of human life. IoT's attack surface has grown as a result of the technology's hyper-connectivity and inherent heterogeneity. In addition, IoT devices are used in both managed and unmanaged settings, leaving them open to innovative attacks. Fog computing is used in the proposed intrusion detection system for IoT applications to implement intrusion detection in a decentralised manner. Attack detection at fog nodes and summarization on a cloud server make up the proposed system's two parts. The local fog nodes in the IoT environment examine the traffic, and then they send a report to the cloud server that summarises the current global security state of the IoT application. According to the results of the experiments, the fog nodes are able to identify the attack 27% more quickly while also reducing the number of false alarms. The work that has been recommended provides a beginning point for the creation of a fog-based intrusion detection system that can be used for applications related to the IoT. The proposed system has a false alarm rate of only 0.32% and an accuracy of 98.15 percent. The proposed method can only identify attacks that conform to specific patterns.
9

Yuyukin, I. V. "Spline standard of mapped informativeness of correlation-extreme navigation as the potential of cybernetic situational awareness." Vestnik Gosudarstvennogo universiteta morskogo i rechnogo flota imeni admirala S. O. Makarova 15, no. 3 (July 30, 2023): 374–92. http://dx.doi.org/10.21821/2309-5180-2023-15-3-374-392.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A hypothesis about the possibility of using a spline standard of mapped informativeness of correlation-extreme navigation as a potential for cybernetic awareness is put forward. The expediency of understanding cybernetic awareness as an ontological engineering of the geometric implementation of a spline fragment of mapping to ensure the principle of alternative positioning is revealed. The forecast of the achievability of the effect of the vessel location predictability in the local environment of the satellite signals incapacity in the practical realization of the potential of situational awareness is made. The possibility of conceptual resistance of the developed algorithms of malicious virtual interference due to the unique composition of spline functions in assessing the vulnerability of the bridge onboard computers to a cybernetic threat is substantiated. Attention is focused on the fundamental impossibility of distorting the spline standard of informativeness to disrupt the classical process of linking the measured exposure of the navigation field to the reference one to ensure autonomous positioning of moving objects in any hacker attacks on the target mathematical asset. The main reason for the stability of approximation constructions, which lies in the piecewise architecture of the spline, when local violations of mathematical composition do not affect the overall task of forming a realistic navigation isosurface as a graphical structure of semantic modeling, is revealed. The proposals of effective information processing as attributes of cybernetic awareness are tested on the example of computer visualization of measuring fields of bathymetry and maps of magnetic anomalies in the form of fragments of threedimensional spreading of the planetary magnetic field. The developed package of application programs is adapted to synthesize a spline standard of mapped informativeness in the cybernetic awareness paradigm as an intellectual support for decision-making by a navigator in order to reduce his psychological cognitive load. It is proposed to use the potential of situational awareness as a mathematical support for an automated navigation system with artificial intelligence within the framework of the concept of unmanned navigation in strategic accordance with the A-Navigation project. The fundamental importance of a positive assessment of cybernetic awareness in promoting the practical use of autonomous marine surface vessels in modern navigation practice is determined.
10

Dhirani, Lubna Luxmi, та Thomas Newe. "Securing industry 5.0 using 6σ CYBERNETIC framework". Mehran University Research Journal of Engineering and Technology 43, № 2 (7 квітня 2024): 220. http://dx.doi.org/10.22581/muet1982.3202.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The data-driven digital economy highly relies on immersive and emerging technologies, mass customisation, autonomous systems, and seamless connectivity. Enabling such an Industrial IoT/Industry 5.0 environment requires streamlined and end-to-end transparent methods for insights, visibility, and control. However, it is important to note that its success depends on data security metrics. The recent cyber-attacks in healthcare and industrial infrastructures have led service providers to high-risk scenarios. From supply chain to service delivery, remote functionality variables, enabling a fully connected factory is a major cybersecurity concern as emerging technologies employ different security requirements. To mitigate these risks, strategic, operational, technical, and cybersecurity alignment is a must, where the gaps between the production and process environments must be bridged to achieve the prime goal of a sustainable, secure, and technologically innovative factory. This research provides a systematic approach to bridging Industry 5.0’s QoS metrics and security gaps by implementing a Six Sigma (6σ) approach in a manufacturing environment. The approach further maps IT/OT, cloud, and cybersecurity standards, thereby enabling insights, visibility, and control. A healthcare 5.0 use-case is demonstrated to show how a 6σ implementation can improve the QoS metrics, unifying standards to achieve a secure, sustainable, resilient, and high-performance environment.

Дисертації з теми "Cybernetic attacks":

1

Amoordon, Andy. "Méthodes de détection d'attaques cybernétiques par une surveillance multicouches de communication." Electronic Thesis or Diss., Université de Lille (2022-....), 2022. http://www.theses.fr/2022ULILN042.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Les réseaux sans-fil sont de plus en plus utilisés. La popularité de ces réseaux est due au fait que ces réseaux permettent de créer, modifier et étendre facilement un réseau informatique. Les réseaux sans-fil sont également particulièrement nécessaires pour relier des équipements mobiles tels que des montres connectées, voitures connectées, drones. Les réseaux sans-fil sont également utilisés dans le secteur du transport et de la sécurité pour relier les trains avec le centre de contrôle ou les caméras avec le centre d'enregistrement. Toutefois, contrairement aux réseaux filaires, dans les réseaux sans-fil, les transmissions ne sont pas isolées dans des câbles, mais transmises en utilisant généralement des antennes omnidirectionnelles. Pour ces raisons, il est plus facile d'écouter et d'émettre sans autorisation sur ces réseaux - les rendent ainsi plus vulnérables à certains types d'attaques. Dans cette thèse, nous nous sommes intéressés à la détection des trois différentes attaques sur les réseaux sans-fil IEEE 802.11 (Wi-Fi). Les trois attaques sont l'attaque par faux point d'accès et deux attaques de déni de service : notamment l'attaque par déauthentication et l'attaque par brouillage. Dans la littérature scientifique, les méthodes existantes proposent de détecter ces attaques de manière isolée et en analysant uniquement un ou deux indicateurs.Nous proposons une méthode utilisant des algorithmes de classification pour créer un modèle, capable de détecter les trois attaques en analysant quatre indicateurs simultanément. Le modèle peut également détecter les attaques lorsqu'elles sont réalisées de manière indépendante ou lorsqu'elles sont cumulées entre elles. Concernant les données utilisées pour créer le modèle, sur les trois types de trames qui peuvent être émis sur un réseau Wi-Fi, nous avons considéré exclusivement, les trames de gestion et plus particulièrement les trames de beacon. Les trames de beacon sont régulièrement émises même en l'absence de trafic utilisateur, ce qui rend le modèle plus efficace. Nous avons aussi considéré des variations concernant le débit du réseau (absence de trafic, trafic léger, moyen et intense) et la puissance du signal de brouillage (puissance forte, moyenne et faible). Les résultats montrent que le modèle arrive à détecter les attaques par faux point d'accès, par déauthentication, par brouillage (faible et moyenne puissance) avec grande précision et l'attaque par brouillage de forte puissance, avec une précision satisfaisante. Nous avons pu nettement augmenter la précision de détection de cette dernière variation en prenant en compte les trames de beacon d'un deuxième point d'accès éloigné du réseau. Enfin, nous avons aussi considéré le cas particulier des transmissions Wi-Fi sur la bande 5 GHz et les faux points d'accès fantômes
Wireless networks are nowadays indispensable components of telecommunication infrastructures. They offer flexibility, mobility and rapid expansion of telecommunication infrastructures. They are also particularly needed to connect mobile devices such as connected cars, watches and drones. Wireless networks are also used in the transport and security sector to connect trains and cameras to monitoring systems. However, in contrary to wired networks in which transmission are isolated in wires, in wireless networks, transmissions are emitted using omnidirectional antennas. This makes wireless networks more vulnerable to unauthorised listening, emission and some specific attacks. In this thesis, we have worked on the detection of three different types of attacks on IEEE 802.11 (Wi-Fi) networks. The three attacks are fake access points and two denial of service attacks namely, deauthentication and jamming attacks. In scientific literature, these three attacks are detected independently and using one or two indicators.We propose a method that uses classification algorithms to create a model that can detect the three attacks by analysing four indicators simultaneously. The model can detect the attacks when they are perpetuated independently and also when they are combined. Concerning data used to create the model, among the three different types of frames that can be transmitted on Wi-Fi networks, we have considered only management frames and more particularly, beacon frames. Beacon frames are sent at regular interval and even in the absence of user traffic. Therefore, basing the detection on the analysis of beacon frames leads to a more efficient detection. In this thesis, we have also considered variations in data rates (absence of user traffic, light, moderate and intense user traffic) and in jamming power (low, moderate and high jamming power). Results show that the model can detect fake access points, deauthentication and jamming attacks (low and moderate power) with high precision. The jamming attack with intense power is detected with satisfying precision. By considering the beacon frames of a farther second access point of the network, we have been able to increase detection precision in the latter case. Finally, we have considered special cases such as Wi-Fi transmissions in the 5 GHz band and the phantom fake access point attack
2

Hložanka, Filip. "Simulace správy informační bezpečnosti ve fakultním prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417806.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This diploma thesis is concerned with simulating information security management within a university environment. It is divided into three parts. The theoretical part focuses on describing the assets which could be part of a faculty network, attacks that could target it, security processes which could protect it and users that are active within it. The analytical part then applies these segments on a real faculty network. Based on this analysis, a set of specific assets, attacks, security processes and other tasks is created in order to simulate a simplified version of the analyzed network using a sophisticated cybernetic polygon. The security of the network is then assessed after several iterations of the simulations. Its parameters are adjusted in the effort to increase its security and the module is tested on an academic employee in order to assess its effectiveness. The conclusion evaluates the possibilities of increasing the security of the simulated network as well as the usability of the cybernetic polygon in practice.
3

Chabak, Kelson D. "Conceptual study of rotary-wing microrobotics." Wright-Patterson: Air Force Institute of Technology, 2008. http://handle.dtic.mil/100.2/ADA487086.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Cybernetic attacks":

1

Government, U. S., U. S. Air Force (USAF), U. S. Military, and Department of Defense (DoD). Cyberspace Command and Control Model: The Nature of Cyberspace, Computer Networks, Information Environment, Internet, Data Manipulation, Legal Authorities, Cyber Attack, Cybernetics, Systems Theory. Independently Published, 2017.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Cybernetic attacks":

1

Sokolov, Sergei, Anatoly Nyrkov, Tatiana Knysh, and Yaroslav Demakov. "Cybernetic Attacks as a Component of Information Operations During the Hybrid Warfare." In Lecture Notes in Civil Engineering, 67–83. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-6208-6_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Gao, Jian, and Yingjun Chen. "Detecting DOS/DDOS Attacks Under Ipv6." In Proceedings of the 2012 International Conference on Cybernetics and Informatics, 847–55. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-3872-4_110.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Cholakoska, Ana, Martina Karanfilovska, and Danijela Efnusheva. "Survey of Security Issues, Requirements, Challenges and Attacks in Internet of Things." In Informatics and Cybernetics in Intelligent Systems, 561–70. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77448-6_55.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ng, Wing W. Y., Aki P. F. Chan, Daniel S. Yeung, and Eric C. C. Tsang. "Construction of High Precision RBFNN with Low False Alarm for Detecting Flooding Based Denial of Service Attacks Using Stochastic Sensitivity Measure." In Advances in Machine Learning and Cybernetics, 851–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11739685_89.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Xylogiannopoulos, Konstantinos F., Panagiotis Karampelas, and Reda Alhajj. "Detecting DDoS Attacks on Multiple Network Hosts." In Developments in Information Security and Cybernetic Wars, 121–39. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8304-2.ch006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The proliferation of low security internet of things devices has widened the range of weapons that malevolent users can utilize in order to attack legitimate services in new ways. In the recent years, apart from very large volumetric distributed denial of service attacks, low and slow attacks initiated from intelligent bot networks have been detected to target multiple hosts in a network in a timely fashion. However, even if the attacks seem to be “innocent” at the beginning, they generate huge traffic in the network without practically been detected by the traditional DDoS attack detection methods. In this chapter, an advanced pattern detection method is presented that is able to collect and classify in real time all the incoming traffic and detect a developing slow and low DDoS attack by monitoring the traffic in all the hosts of the network. The experimental analysis on a real dataset provides useful insights about the effectiveness of the method by identifying not only the main source of attack but also secondary sources that produce low traffic, targeting though multiple hosts.
6

Hotchkiss, Michael Bennett. "Russian Information Warfare and 9/11 Conspiracism." In Developments in Information Security and Cybernetic Wars, 236–66. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8304-2.ch010.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Following the September 11, 2001 (9/11) attacks, several “prophecies” circulated on the internet claiming the 16th century French seer Nostradamus predicted the crisis, leading to “Nostradamus” being the top search on Google and other search engines in 2001. Considering Nostradamus prophecies as popular eschatology, a dimension of political conspiracism, it is observed that while the hoaxes have never been attributed to a specific actor(s), the provenance of the prophecies which circulated on 9/11 are connected to a legacy of Russian Cold War-era propaganda. Additionally, several other conspiracy theories which circulated following 9/11 can be connected to Russia and its military proxy Syria. Considering conspiracy theories as a “populist theory of power,” leveraged by Russia in order to diminish American global dominance, a case is made that Russia is likely responsible for the Nostradamus hoax of 9/11 and similar “active measures” in Poland in 2010, Ukraine in 2014, and Hungary in 2015.
7

Sallay, Hassen, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan, and Majdi Ben Saad. "Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework." In Privacy Solutions and Security Frameworks in Information Protection, 241–53. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2050-6.ch016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
While the rise of the Internet and the high speed networks made information easier to acquire, faster to exchange and more flexible to share, it also made the cybernetic attacks and crimes easier to perform, more accurate to hit the target victim and more flexible to conceal the crime evidences. Although people are in an unsafe digital environment, they often feel safe. Being aware of this fact and this fiction, the authors draw in this paper a security framework aiming to build real-time security solutions in the very narrow context of high speed networks. This framework is called (f|p) since it is inspired by the elefant self-defense behavior which yields p (22 security tasks for 7 security targets).
8

Farouk, Amr. "Critical Infrastructure Protection in Developing Countries." In Cyber Law, Privacy, and Security, 1142–58. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8897-9.ch054.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Not all infrastructures are critical. In most countries' definitions, a critical infrastructure (CI) is a collection of indispensable assets that provide an essential support for economic and social well-being, for public safety and for the functioning of key government responsibilities. CI assets can be classified into three broad categories: Physical, Cybernetic and Human. In the present era, Information and Communication Technology sector (e.g., Cloud Computing, Big Data, Internet of Things) can be regarded as the backbone of the economies of developed and the developing countries worldwide since they provide basic services to all segments of a society. Critical infrastructure protection (CIP) is a concept du jour in many developed countries. The present chapter discusses the method of protecting critical infrastructures in developing countries. It observes many developing countries experiencing massive growth in Internet capacity and the use of Internet-based technologies. Attacks on the information infrastructure can severely affect the ability of a country to function effectively.
9

Farouk, Amr. "Critical Infrastructure Protection in Developing Countries." In Advances in Finance, Accounting, and Economics, 23–39. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2361-1.ch002.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Not all infrastructures are critical. In most countries' definitions, a critical infrastructure (CI) is a collection of indispensable assets that provide an essential support for economic and social well-being, for public safety and for the functioning of key government responsibilities. CI assets can be classified into three broad categories: Physical, Cybernetic and Human. In the present era, Information and Communication Technology sector (e.g., Cloud Computing, Big Data, Internet of Things) can be regarded as the backbone of the economies of developed and the developing countries worldwide since they provide basic services to all segments of a society. Critical infrastructure protection (CIP) is a concept du jour in many developed countries. The present chapter discusses the method of protecting critical infrastructures in developing countries. It observes many developing countries experiencing massive growth in Internet capacity and the use of Internet-based technologies. Attacks on the information infrastructure can severely affect the ability of a country to function effectively.
10

Gil, Daniel Juan. "Epilogue: Resurrection and Zombies." In Fate of the Flesh, 181–90. Fordham University Press, 2021. http://dx.doi.org/10.5422/fordham/9780823290048.003.0007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This chapter examines the current pop culture fascination with the undead body visible in the explosion of TV shows and films about zombies. Emmanuel Carrère’s The Kingdom tells the story of the well-known French writer’s brief but intense conversion to Christianity, in the grip of which he was involved in developing the French TV series Les Revenants, which was the model for A&E’s The Returned. Carrère’s account of his relationship to the Christian theology of resurrection as an inspiration for Les Revenants reveals the truth of the “undead” genres more generally, namely as a culture-wide return of the repressed, a protest against the increasingly disembodied, virtualized way we live today. Implicitly, the undead character (including the zombie) attacks the modern fantasy that the self is, in its essence, disembodied and therefore reducible to information, data, and code and in which people yearn for a cybernetic resurrection that will take the form of entering into the disembodied life of the digital world. In the midst of this disembodied virtualized world, pop zombie culture, like seventeenth-century culture, is a reminder of the body’s abiding vulnerabilities, limitations, and also potentials for transcendence.

Тези доповідей конференцій з теми "Cybernetic attacks":

1

Kuo, Wen-Chung, and Yung-Cheng Lee. "Attack and Improvement on the One-Time Password Authentication Protocol Against Theft Attacks." In 2007 International Conference on Machine Learning and Cybernetics. IEEE, 2007. http://dx.doi.org/10.1109/icmlc.2007.4370461.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Carta, Kévin, André Huynh, Stéfane Mouille, Nadia El Mrabet, Claude Barral, and Sébastien Brangoulo. "How Video Injection Attacks Can Even Challenge State-of-the-Art Face Presentation Attack Detection Systems." In 14th International Multi-Conference on Complexity, Informatics and Cybernetics. Winter Garden, Florida, United States: International Institute of Informatics and Cybernetics, 2023. http://dx.doi.org/10.54808/imcic2023.01.105.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Chien, Sheng-Hui, Erh-Hsien Chang, Chih-Yung Yu, and Cheng-Seen Ho. "Attack Subplan-Based Attack Scenario Correlation." In 2007 International Conference on Machine Learning and Cybernetics. IEEE, 2007. http://dx.doi.org/10.1109/icmlc.2007.4370455.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Medina, Brandon, Elena Acevedo, Antonio Acevedo, and Sandra Orantes. "Network Attacks Classification Using Computational Intelligence." In 17th International Multi-Conference on Society, Cybernetics and Informatics. Winter Garden, Florida, United States: International Institute of Informatics and Cybernetics, 2023. http://dx.doi.org/10.54808/imsci2023.01.156.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Cao, Lai-cheng. "Detecting Web-Based Attacks by Machine Learning." In 2006 International Conference on Machine Learning and Cybernetics. IEEE, 2006. http://dx.doi.org/10.1109/icmlc.2006.258990.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Otomo, Takuto, Hiroshi Kera, and Kazuhiko Kawamoto. "Adversarial joint attacks on legged robots." In 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2022. http://dx.doi.org/10.1109/smc53654.2022.9945546.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Chan, Patrick P. K., Fei Zhang, Wing W. Y. Ng, Daniel S. Yeung, and Jinshan Jiang. "A novel defend against good word attacks." In 2011 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2011. http://dx.doi.org/10.1109/icmlc.2011.6016935.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Gao, C., C. Seatzu, Z. Li, and A. Giua. "Multiple Attacks Detection on Discrete Event Systems." In 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE, 2019. http://dx.doi.org/10.1109/smc.2019.8914035.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Wang, Ling, Cheng Zhang, and Jie Liu. "Deep Learning Defense Method Against Adversarial Attacks." In 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2020. http://dx.doi.org/10.1109/smc42975.2020.9283255.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Viet, Khanh, Brajendra Panda, and Yi Hu. "Detecting collaborative insider attacks in information systems." In 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC. IEEE, 2012. http://dx.doi.org/10.1109/icsmc.2012.6377774.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії