|
|
|
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p...
ver más
|
|
|
|
|
|
|
Kongpei Wu, Huiqin Qu and Conggui Huang
For the current stage of complex and changing network environments and correlated and synchronized vulnerability attacks, this study first fuses attack graph technology and Bayesian networks and constructs Bayesian attack graphs toportray the correlation...
ver más
|
|
|
|
|
|
|
Gang Wang, Dong Liu, Chunrui Zhang and Teng Hu
This work has potential usages in cyber-attack detection in air-gapped internal networks that lack sufficient labeled data samples to build detection models for network attack activities.
|
|
|
|
|
|
|
Zubair Baig, Naeem Syed and Nazeeruddin Mohammad
Drones are increasingly adopted to serve a smart city through their ability to render quick and adaptive services. They are also known as unmanned aerial vehicles (UAVs) and are deployed to conduct area surveillance, monitor road networks for traffic, de...
ver más
|
|
|
|
|
|
|
Elena Basan, Alexandr Basan, Alexey Nekrasov, Colin Fidge, Evgeny Abramov and Anatoly Basyuk
The data analysis subsystem of an Unmanned Aerial Vehicle (UAV) includes two main modules: a data acquisition module for data processing and a normalization module. One of the main features of an adaptive UAV protection system is the analysis of its cybe...
ver más
|
|
|
|
|
|
|
Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo and Giuseppe Pirlo
The 0-day attack is a cyber-attack based on vulnerabilities that have not yet been published. The detection of anomalous traffic generated by such attacks is vital, as it can represent a critical problem, both in a technical and economic sense, for a sma...
ver más
|
|
|
|
|
|
|
João Vitorino, Nuno Oliveira and Isabel Praça
Adversarial attacks pose a major threat to machine learning and to the systems that rely on it. In the cybersecurity domain, adversarial cyber-attack examples capable of evading detection are especially concerning. Nonetheless, an example generated for a...
ver más
|
|
|
|
|
|
|
Zhijun Wu, Ruochen Dong and Peng Wang
For the air traffic management cyber physical system, if an attacker successfully obtains authority or data through a cyber attack, combined with physical attacks, it will cause serious consequences. Game theory can be applied to the strategic interactio...
ver más
|
|
|
|
|
|
|
Hosam Aljihani, Fathy Eassa, Khalid Almarhabi, Abdullah Algarni and Abdulaziz Attaallah
With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them. Therefore, ...
ver más
|
|
|
|
|
|
|
Moslem Dehghani, Taher Niknam, Mohammad Ghiasi, Pierluigi Siano, Hassan Haes Alhelou and Amer Al-Hinai
Cyber-physical threats as false data injection attacks (FDIAs) in islanded smart microgrids (ISMGs) are typical accretion attacks, which need urgent consideration. In this regard, this paper proposes a novel cyber-attack detection model to detect FDIAs b...
ver más
|
|
|
|