Search

Your search keyword '"cyber security"' showing total 360 results

Search Constraints

Start Over You searched for: Descriptor "cyber security" Remove constraint Descriptor: "cyber security" Publisher mdpi Remove constraint Publisher: mdpi
360 results on '"cyber security"'

Search Results

1. Total Power Factor Smart Contract with Cyber Grid Guard Using Distributed Ledger Technology for Electrical Utility Grid with Customer-Owned Wind Farm.

2. A Novel Cloud-Enabled Cyber Threat Hunting Platform for Evaluating the Cyber Risks Associated with Smart Health Ecosystems.

3. A Survey of Advanced Border Gateway Protocol Attack Detection Techniques.

4. Robust Federated Learning for Mitigating Advanced Persistent Threats in Cyber-Physical Systems.

5. A Digital Twin-Based Approach for Detecting Cyber–Physical Attacks in ICS Using Knowledge Discovery.

6. Clop Ransomware in Action: A Comprehensive Analysis of Its Multi-Stage Tactics.

7. Applications of Fuzzy Logic and Probabilistic Neural Networks in E-Service for Malware Detection.

8. Evading Cyber-Attacks on Hadoop Ecosystem: A Novel Machine Learning-Based Security-Centric Approach towards Big Data Cloud.

9. Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices.

10. A Review of Attacker–Defender Games and Cyber Security.

11. A Comprehensive Survey on Enabling Techniques in Secure and Resilient Smart Grids.

12. Protecting Data at Risk of Unintentional Electromagnetic Emanation: TEMPEST Profiling.

13. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

14. Intrusion Detection Based on Adaptive Sample Distribution Dual-Experience Replay Reinforcement Learning.

15. e MIFS: A Normalized Hyperbolic Ransomware Deterrence Model Yielding Greater Accuracy and Overall Performance.

16. Bridging the Cyber–Physical Divide: A Novel Approach for Quantifying and Visualising the Cyber Risk of Physical Assets.

17. Study the Level of Network Security and Penetration Tests on Power Electronic Device.

18. Resilience in the Context of Cyber Security: A Review of the Fundamental Concepts and Relevance.

19. Smart Grid Security: An Effective Hybrid CNN-Based Approach for Detecting Energy Theft Using Consumption Patterns.

20. Improving Risk Assessment Model for Cyber Security Using Robust Aggregation Operators for Bipolar Complex Fuzzy Soft Inference Systems.

21. Systematic Analysis of Risks in Industry 5.0 Architecture.

22. Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review.

23. Examining Techniques to Enhance the Security and Privacy of IoT Devices and Networks against Cyber Threats †.

24. Securing Mobile Edge Computing Using Hybrid Deep Learning Method.

25. Testing Commercial Intrusion Detection Systems for Industrial Control Systems in a Substation Hardware in the Loop Testlab.

26. Investigation of Phishing Susceptibility with Explainable Artificial Intelligence.

27. PUF Modeling Attacks Using Deep Learning and Machine Learning Algorithms †.

28. Semi-Supervised Alert Filtering for Network Security.

29. An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection.

30. Cyber Security in a 5G-Based Smart Healthcare Network: A Base Station Case Study †.

31. Improved End-to-End Data Security Approach for Cloud Computing.

32. Understanding the Feature Space and Decision Boundaries of Commercial WAFs Using Maximum Entropy in the Mean.

33. The Development of a Secure Online System to Protect Social Networking Platforms from Security Attacks.

34. ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.

35. Artificial Intelligence-Based Secured Power Grid Protocol for Smart City.

36. Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study.

37. A Hypertuned Lightweight and Scalable LSTM Model for Hybrid Network Intrusion Detection.

38. A Novel False Measurement Data Detection Mechanism for Smart Grids.

39. HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning.

40. A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities.

41. Deep Autoencoder-Based Integrated Model for Anomaly Detection and Efficient Feature Extraction in IoT Networks.

42. Optimal Cyber Security Investment in a Mixed Risk Management Framework: Examining the Role of Cyber Insurance and Expenditure Analysis.

43. FREDY: Federated Resilience Enhanced with Differential Privacy.

44. Developing Chatbots for Cyber Security: Assessing Threats through Sentiment Analysis on Social Media.

45. Web-Based Malware Detection System Using Convolutional Neural Network.

46. Enhancing Cyber Security Governance and Policy for SMEs in Industry 5.0: A Comparative Study between Saudi Arabia and the United Kingdom.

47. Blockchain and Machine Learning-Based Hybrid IDS to Protect Smart Networks and Preserve Privacy.

48. DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges.

49. Mitigating the Risks of Malware Attacks with Deep Learning Techniques.

50. SELID: Selective Event Labeling for Intrusion Detection Datasets.

Catalog

Books, media, physical & digital resources