Search

Your search keyword '"cyber attack"' showing total 99 results

Search Constraints

Start Over You searched for: Descriptor "cyber attack" Remove constraint Descriptor: "cyber attack" Publication Type eBooks Remove constraint Publication Type: eBooks
99 results on '"cyber attack"'

Search Results

1. Overview of Current International Maritime Shipping Challenges from a Cyber Threat Perspective

2. Analytical Review of Classification and Clustering Methods of Cyber Attacks Based on Data Mining and Neural Network Approach

3. An Ensemble-Based Approach for Cyber Attack Detection in Financial Systems

5. Fortifying Cyber Defenses: A Deep Dive into the Development of an AI-Powered Network Intrusion Detection System

7. A Comparative Analysis on Ensemble Learning and Deep Learning Based Intrusion Detection Systems over the NCC2 Dataset

9. Attack Detecting for the Multi-robots Systems: An Integrated Cyber-Physical Approach

10. Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe

11. Impact of Artificial Intelligence on Enterprise Information Security Management in the Context of ISO 27001 and 27002: A Tertiary Systematic Review and Comparative Analysis

12. Using Artificial Intelligence (AI) and Blockchain to Secure Smart Cities’ Services and Applications

14. Security Challenges and Lightweight Cryptography in IoT: Comparative Study and Testing Method for PRESENT-32bit Cipher

16. State Estimation and Fusion for Multisensor Systems with False Data Injection Attacks and Non-Gaussian Noises

17. Cyber Warfare: Challenges Posed in a Digitally Connected World: A Review

19. Comprehensive Study of Cyber Security in AI Based Smart Grid

21. Big Data Security: Attack’s Detection Methods Using Digital Forensics

23. Hybrid Convolutional Multilayer Perceptron for Cyber Physical Systems (HCMP-CPS)

24. Challenges and Pitfalls in Generating Representative ICS Datasets in Cyber Security Research

25. Controller Modelling as a Tool for Cyber-Attacks Detection

26. A Novel Risk Assessment Method Based on Hybrid Algorithm for SCADA

27. Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract)

28. Deep Transfer Learning for Detecting Cyber Attacks

29. A Study on Cyber Security in Various Critical IT Infrastructure Organizational Sectors: Challenges and Solutions

31. A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security

32. Cybercrimes Ways to Pick up Electronic Devices

33. A Digital Forensic Readiness Cybercrime Semantic Trigger Process

35. Quantum Computing and Grid Security

36. Challenges and Opportunities of Autonomous Cyber Defence (ACyD) Against Cyber Attacks

38. Security Classification of Smart Devices Connected to LTE Network

39. Denial of Service Attack in Wireless Sensor Networks

40. The Rise of ICS Malware: A Comparative Analysis

43. Optimal Man-In-The-Middle Stealth Attack

44. Holistic Authentication Framework for Virtual Agents; UK Banking Industry

45. Composition of Parent–Child Cyberattack Models

46. Appraisal of Electronic Banking Acceptance in Nigeria Amidst Cyber Attacks Using Unified Theory of Acceptance and Use of Technology

47. Efficient Data Noise-Reduction for Cyber Threat Intelligence System

49. Security Vulnerabilities in Existing Security Mechanisms for IoMT and Potential Solutions for Mitigating Cyber-Attacks

50. Smart Secure USB SSU-256

Catalog

Books, media, physical & digital resources