Search

Your search keyword '"cyber attack"' showing total 21 results

Search Constraints

Start Over You searched for: Descriptor "cyber attack" Remove constraint Descriptor: "cyber attack" Publisher springer nature Remove constraint Publisher: springer nature
21 results on '"cyber attack"'

Search Results

1. Privacy-Aware Anomaly Detection in IoT Environments using FedGroup: A Group-Based Federated Learning Approach.

2. A tri-level programming-based frequency regulation market equilibrium under cyber attacks.

3. Intelligence Sampling Control Algorithm for T-S Fuzzy Networked Control Systems via Cloud Server Storage Method Under DoS Attack.

4. Efficient Storage and Encryption of 32-Slice CT Scan Images Using Phase Grating.

5. An Ensemble Classifier Based Scheme for Detection of False Data Attacks Aiming at Disruption of Electricity Market Operation.

6. Developing a multi-level intrusion detection system using hybrid-DBN.

7. H∞ Control with Multiple Packets Compensation Scheme for T-S Fuzzy Systems Subject to Cyber Attacks.

8. Ensuring Cyber Resilience of Large-Scale Network Infrastructure Using the Ant Algorithm.

9. Intelligent robust control for cyber-physical systems of rotary gantry type under denial of service attack.

10. A methodological review on attack and defense strategies in cyber warfare.

11. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.

12. Fast attack detection system using log analysis and attack tree generation.

13. Distribution system state estimation: an overview of recent developments.

14. Toward an artificial immune server against cyber attacks.

15. A cyber attack-resilient server inspired by biological diversity.

16. Formal model of cyber attacks on virtualization tools and a measure of hypervisor vulnerability.

17. Cyber Force and the Role of Sovereign States in Informational Warfare.

18. New detection method and countermeasure of cyber attacks in mix networks.

19. Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring.

20. Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm.

21. Information Warfare: A Philosophical Perspective.

Catalog

Books, media, physical & digital resources