62   Artículos

 
en línea
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari    
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p... ver más
Revista: Information    Formato: Electrónico

 
en línea
Fahim Sufi    
In the face of escalating cyber threats that have contributed significantly to global economic losses, this study presents a comprehensive dataset capturing the multifaceted nature of cyber-attacks across 225 countries over a 14-month period from October... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ikjae Kim, Moosung Park, Hyun-Jin Lee, Jisoo Jang, Soojin Lee and Dongkyoo Shin    
With the advancement of IT technology, intelligent devices such as autonomous vehicles, unmanned equipment, and drones are rapidly evolving. Consequently, the proliferation of defense systems based on these technologies is increasing worldwide. In respon... ver más
Revista: Information    Formato: Electrónico

 
en línea
Adam James Fenton    
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Kongpei Wu, Huiqin Qu and Conggui Huang    
For the current stage of complex and changing network environments and correlated and synchronized vulnerability attacks, this study first fuses attack graph technology and Bayesian networks and constructs Bayesian attack graphs toportray the correlation... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Gang Wang, Dong Liu, Chunrui Zhang and Teng Hu    
This work has potential usages in cyber-attack detection in air-gapped internal networks that lack sufficient labeled data samples to build detection models for network attack activities.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Igor Kotenko, Igor Saenko, Andrey Privalov and Oleg Lauta    
The article proposes an approach to ensuring the functioning of Software-Defined Networks (SDN) in cyber attack conditions based on the analytical modeling of cyber attacks using the method of topological transformation of stochastic networks. Unlike oth... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Fahim Sufi    
Algorithms have evolved from machine code to low-code-no-code (LCNC) in the past 20 years. Observing the growth of LCNC-based algorithm development, the CEO of GitHub mentioned that the future of coding is no coding at all. This paper systematically revi... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Xiaoyu Du, Cheng Cheng, Yujing Wang and Zhijie Han    
Network attack traffic detection plays a crucial role in protecting network operations and services. To accurately detect malicious traffic on the internet, this paper designs a hybrid algorithm UMAP-RF for both binary and multiclassification network att... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Mohamed Amine Ben Farah, Elochukwu Ukwandu, Hanan Hindy, David Brosset, Miroslav Bures, Ivan Andonovic and Xavier Bellekens    
The paper presents a classification of cyber attacks within the context of the state of the art in the maritime industry. A systematic categorization of vessel components has been conducted, complemented by an analysis of key services delivered within po... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »