26   Artículos

 
en línea
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari    
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p... ver más
Revista: Information    Formato: Electrónico

 
en línea
Kongpei Wu, Huiqin Qu and Conggui Huang    
For the current stage of complex and changing network environments and correlated and synchronized vulnerability attacks, this study first fuses attack graph technology and Bayesian networks and constructs Bayesian attack graphs toportray the correlation... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Gang Wang, Dong Liu, Chunrui Zhang and Teng Hu    
This work has potential usages in cyber-attack detection in air-gapped internal networks that lack sufficient labeled data samples to build detection models for network attack activities.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Zubair Baig, Naeem Syed and Nazeeruddin Mohammad    
Drones are increasingly adopted to serve a smart city through their ability to render quick and adaptive services. They are also known as unmanned aerial vehicles (UAVs) and are deployed to conduct area surveillance, monitor road networks for traffic, de... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Elena Basan, Alexandr Basan, Alexey Nekrasov, Colin Fidge, Evgeny Abramov and Anatoly Basyuk    
The data analysis subsystem of an Unmanned Aerial Vehicle (UAV) includes two main modules: a data acquisition module for data processing and a normalization module. One of the main features of an adaptive UAV protection system is the analysis of its cybe... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo and Giuseppe Pirlo    
The 0-day attack is a cyber-attack based on vulnerabilities that have not yet been published. The detection of anomalous traffic generated by such attacks is vital, as it can represent a critical problem, both in a technical and economic sense, for a sma... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
João Vitorino, Nuno Oliveira and Isabel Praça    
Adversarial attacks pose a major threat to machine learning and to the systems that rely on it. In the cybersecurity domain, adversarial cyber-attack examples capable of evading detection are especially concerning. Nonetheless, an example generated for a... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zhijun Wu, Ruochen Dong and Peng Wang    
For the air traffic management cyber physical system, if an attacker successfully obtains authority or data through a cyber attack, combined with physical attacks, it will cause serious consequences. Game theory can be applied to the strategic interactio... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Hosam Aljihani, Fathy Eassa, Khalid Almarhabi, Abdullah Algarni and Abdulaziz Attaallah    
With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them. Therefore, ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Moslem Dehghani, Taher Niknam, Mohammad Ghiasi, Pierluigi Siano, Hassan Haes Alhelou and Amer Al-Hinai    
Cyber-physical threats as false data injection attacks (FDIAs) in islanded smart microgrids (ISMGs) are typical accretion attacks, which need urgent consideration. In this regard, this paper proposes a novel cyber-attack detection model to detect FDIAs b... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »