99 results on '"cyber attack"'
Search Results
2. Analytical Review of Classification and Clustering Methods of Cyber Attacks Based on Data Mining and Neural Network Approach
3. An Ensemble-Based Approach for Cyber Attack Detection in Financial Systems
4. An Investigation into Counter Drones Digital Forensics Aided by Remote Identification
5. Fortifying Cyber Defenses: A Deep Dive into the Development of an AI-Powered Network Intrusion Detection System
6. Suspicious Activity Detection Model in Bank Transactions using Deep Learning with Fog Computing Infrastructure
7. A Comparative Analysis on Ensemble Learning and Deep Learning Based Intrusion Detection Systems over the NCC2 Dataset
8. Teacher Digital and Media Competence in Cyber Security - A Perspective on Individual Resilience to Online Attacks
9. Attack Detecting for the Multi-robots Systems: An Integrated Cyber-Physical Approach
10. Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe
11. Impact of Artificial Intelligence on Enterprise Information Security Management in the Context of ISO 27001 and 27002: A Tertiary Systematic Review and Comparative Analysis
12. Using Artificial Intelligence (AI) and Blockchain to Secure Smart Cities’ Services and Applications
13. Systematic Literature Review and Assessment for Cyber Terrorism Communication and Recruitment Activities
14. Security Challenges and Lightweight Cryptography in IoT: Comparative Study and Testing Method for PRESENT-32bit Cipher
15. Are Fintech Firms Ready for Industry 5.0? The Influence of Cybercrime on the Dynamics of Volatility and Herding Behavior Among Investors
16. State Estimation and Fusion for Multisensor Systems with False Data Injection Attacks and Non-Gaussian Noises
17. Cyber Warfare: Challenges Posed in a Digitally Connected World: A Review
18. Cybersecurity and Ransomware-Managing Threats and Protecting Patient Data
19. Comprehensive Study of Cyber Security in AI Based Smart Grid
20. Protection of a Printing Company with Elements of Artificial Intelligence and IIoT from Cyber Threats
21. Big Data Security: Attack’s Detection Methods Using Digital Forensics
22. Cyber Threats and Critical Infrastructures in the Era of Cyber Terrorism
23. Hybrid Convolutional Multilayer Perceptron for Cyber Physical Systems (HCMP-CPS)
24. Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research
25. Controller Modelling as a Tool for Cyber-Attacks Detection
26. A Novel Risk Assessment Method Based on Hybrid Algorithm for SCADA
27. Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract)
28. Deep Transfer Learning for Detecting Cyber Attacks
29. A Study on Cyber Security in Various Critical IT Infrastructure Organizational Sectors: Challenges and Solutions
30. The Study of Major Web Application Vulnerabilities and Their Implementation for Learning Purpose
31. A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security
32. Cybercrimes Ways to Pick up Electronic Devices
33. A Digital Forensic Readiness Cybercrime Semantic Trigger Process
34. DDDAS for Attack Detection and Isolation of Control Systems
35. Quantum Computing and Grid Security
36. Challenges and Opportunities of Autonomous Cyber Defence (ACyD) Against Cyber Attacks
37. Facilitate Security Event Monitoring and Logging of Operational Technology (OT) Legacy Systems
38. Security Classification of Smart Devices Connected to LTE Network
39. Denial of Service Attack in Wireless Sensor Networks
40. The Rise of ICS Malware: A Comparative Analysis
41. Security of Cyber-Physical Systems Through the Lenses of the Dark Web
42. Cyber-Attack Detection in Cyber-Physical Systems Using Supervised Machine Learning
43. Optimal Man-In-The-Middle Stealth Attack
44. Holistic Authentication Framework for Virtual Agents; UK Banking Industry
45. Composition of Parent–Child Cyberattack Models
46. Appraisal of Electronic Banking Acceptance in Nigeria Amidst Cyber Attacks Using Unified Theory of Acceptance and Use of Technology
47. Efficient Data Noise-Reduction for Cyber Threat Intelligence System
48. Cyber Physical System Fraud Analysis by Mobile Robot
49. Security Vulnerabilities in Existing Security Mechanisms for IoMT and Potential Solutions for Mitigating Cyber-Attacks
50. Smart Secure USB SSU-256
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.