Search

Your search keyword '"cyber attack"' showing total 23 results

Search Constraints

Start Over You searched for: Descriptor "cyber attack" Remove constraint Descriptor: "cyber attack" Publisher mdpi ag Remove constraint Publisher: mdpi ag
23 results on '"cyber attack"'

Search Results

1. Understanding and Classifying Permanent Denial-of-Service Attacks

2. Security Control of Cyber–Physical Systems under Cyber Attacks: A Survey

3. Improved Gorilla Troops Optimizer-Based Fuzzy PD-(1+PI) Controller for Frequency Regulation of Smart Grid under Symmetry and Cyber Attacks

4. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure

5. Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes, and Neural Networks

6. A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part

7. ATC Level Tactical Manoeuvring during Descent for Mitigating Impact of ADS-B Message Injection Cyber Attack

8. Network Meddling Detection Using Machine Learning Empowered with Blockchain Technology

9. Research on Network Attack Traffic Detection HybridAlgorithm Based on UMAP-RF

10. GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids

11. Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey

12. Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model

13. Cyber Attack Detection Scheme for a Load Frequency Control System Based on Dual-Source Data of Compromised Variables

14. The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study

15. Early-Stage Detection of Cyber Attacks

16. Cyber Attack Prevention Based on Evolutionary Cybernetics Approach

17. Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects

18. Hierarchical Multi-Stage Cyber Attack Scenario Modeling Based on G&E Model for Cyber Risk Simulation Analysis

19. Detection and Modeling of Cyber Attacks with Petri Nets

20. CNA Tactics and Techniques: A Structure Proposal

21. The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study

22. Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects

23. Detection and Modeling of Cyber Attacks with Petri Nets

Catalog

Books, media, physical & digital resources