Search

Your search keyword '"cyber attack"' showing total 1,085 results

Search Constraints

Start Over You searched for: Descriptor "cyber attack" Remove constraint Descriptor: "cyber attack"
1,085 results on '"cyber attack"'

Search Results

1. Research on data-driven, multi-component distribution network attack planning methods.

2. Analytical Review of Classification and Clustering Methods of Cyber Attacks Based on Data Mining and Neural Network Approach

3. An Ensemble-Based Approach for Cyber Attack Detection in Financial Systems

5. Fortifying Cyber Defenses: A Deep Dive into the Development of an AI-Powered Network Intrusion Detection System

7. A Comparative Analysis on Ensemble Learning and Deep Learning Based Intrusion Detection Systems over the NCC2 Dataset

9. Attack Detecting for the Multi-robots Systems: An Integrated Cyber-Physical Approach

10. Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe

11. Impact of Artificial Intelligence on Enterprise Information Security Management in the Context of ISO 27001 and 27002: A Tertiary Systematic Review and Comparative Analysis

12. Using Artificial Intelligence (AI) and Blockchain to Secure Smart Cities’ Services and Applications

14. Security Challenges and Lightweight Cryptography in IoT: Comparative Study and Testing Method for PRESENT-32bit Cipher

15. Anomaly detection technique for securing microgrid against false data attacks.

16. Understanding and Classifying Permanent Denial-of-Service Attacks

17. Security Control of Cyber–Physical Systems under Cyber Attacks: A Survey.

18. Time Aspect of Insider Threat Mitigation.

19. Filtering Function to Mitigate the Impact of Cyber Attacks in Cooperative Adaptive Cruise Control.

20. Understanding and Classifying Permanent Denial-of-Service Attacks.

21. Strategic dilemmas when managing cyber attacks.

22. 考虑网络攻击影响的源网荷储系统风险评估.

23. 网络攻击场景下含分布式光伏配电网的脆弱性研究.

24. Impact Analysis of Cyber Attacks against Energy Communities in Distribution Grids.

25. An investigation of cyberbullying incidents among learners in institutions of higher learning in Gaborone, Botswana.

26. Sliding mode control for nonlinear semi-Markov jump systems with cyber attacks via fuzzy logic.

27. Research on data-driven, multi-component distribution network attack planning methods

28. Network-Level Vulnerability Assessment of Synchrophasor Measurement Devices

29. Privacy-Aware Anomaly Detection in IoT Environments using FedGroup: A Group-Based Federated Learning Approach.

30. Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security.

31. Analysis of Knowledge Management Strategies for Handling Cyber Attacks with the Computer Security Incident Response Team (CSIRT) in the Indonesian Aviation Sector.

32. Graph Mining for Cybersecurity: A Survey.

33. Cyber-Resilient Converter Control System for Doubly Fed Induction Generator-Based Wind Turbine Generators.

34. MECANISME ALE ATACURILOR CIBERNETICE ÎN DOMENIUL BANCAR.

35. Кібербезпека в енергетиці на тлі швидкого розвитку штучного інтелекту.

36. SİBER ÇATIŞMADA SİVİL VERİLERİN ROMA STATÜSÜ AÇISINDAN DEĞERLENDİRİLMESİ.

37. United States National Strategy for Defending Vital Infrastructure from Cyberattacks

38. Challenges arising from cyber security in the dimension of modern global security (on the example of the Russia-Ukraine war)

39. A tri-level programming-based frequency regulation market equilibrium under cyber attacks

40. A tri-level programming-based frequency regulation market equilibrium under cyber attacks.

41. Improved Gorilla Troops Optimizer-Based Fuzzy PD-(1+PI) Controller for Frequency Regulation of Smart Grid under Symmetry and Cyber Attacks.

42. Adaptive event‐triggering mechanism‐based N‐step predictive load frequency control for power systems with cyber attack.

43. DISCLOSURES OF CYBER EXPOSURE AND AUDIT FEES: EVIDENCE FROM ASEAN-4 BANKING.

44. Prevention and detection of DDOS attack in virtual cloud computing environment using Naive Bayes algorithm of machine learning

45. Intrusion detection based on phishing detection with machine learning

46. Deep learning enabled blockchain based electronic heathcare data attack detection for smart health systems

48. State Estimation and Fusion for Multisensor Systems with False Data Injection Attacks and Non-Gaussian Noises

49. Cyber Warfare: Challenges Posed in a Digitally Connected World: A Review

Catalog

Books, media, physical & digital resources