Cybersecurity

ESCI-ISI SCOPUS (2018-2023)

  2523-3246

 

 

Cơ quản chủ quản:  Springer Nature , SpringerOpen

Lĩnh vực:
Information SystemsArtificial IntelligenceSoftwareComputer Networks and Communications

Các bài báo tiêu biểu

Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique
- 2022
Raisa Abedin Disha, Sajjad Waheed
AbstractTo protect the network, resources, and sensitive data, the intrusion detection system (IDS) has become a fundamental component of organizations that prevents cybercriminal activities. Several approaches have been introduced and implemented to thwart malicious activities so far. Due to the effectiveness of machine learning (ML) methods, the proposed approach...... hiện toàn bộ
Graph-based visual analytics for cyber threat intelligence
- 2018
Fabian Böhm, Florian Menges, Günther Pernul
Precision time protocol attack strategies and their resistance to existing security extensions
Tập 4 Số 1 - 2021
Waleed Alghamdi, Michael Schukat
AbstractThe IEEE 1588 precision time protocol (PTP) is very important for many industrial sectors and applications that require time synchronization accuracy between computers down to microsecond and even nanosecond levels. Nevertheless, PTP and its underlying network infrastructure are vulnerable to cyber-attacks, which can stealthily reduce the time synchronizati...... hiện toàn bộ
Một hệ thống lai hiệu quả cho việc phát hiện bất thường trong mạng xã hội Dịch bởi AI
Tập 4 Số 1 - 2021
Md. Shafiur Rahman, Sajal Halder, Md. Ashraf Uddin, Uzzal Kumar Acharjee
Tóm tắtPhát hiện bất thường đã trở thành một lĩnh vực nghiên cứu thiết yếu và năng động trong khai thác dữ liệu. Nhiều ứng dụng khác nhau, bao gồm các mạng xã hội, đã áp dụng nhiều phương pháp hiện đại khác nhau để xác định bất thường nhằm đảm bảo an ninh và quyền riêng tư cho người dùng. Mạng xã hội đề cập đến một diễn đàn được sử dụng bởi các nhóm người khác nhau...... hiện toàn bộ
DroidEcho: an in-depth dissection of malicious behaviors in Android applications
- 2018
Shangqing Liu, Ruitao Feng, Guangdong Bai, Kai Chen, Yang Liu
Human-as-a-security-sensor for harvesting threat intelligence
Tập 2 Số 1 - 2019
Manfred Vielberth, Florian Menges, Günther Pernul
Abstract Humans are commonly seen as the weakest link in corporate information security. This led to a lot of effort being put into security training and awareness campaigns, which resulted in employees being less likely the target of successful attacks. Existing approaches, however, do not tap the full potential that can be gained through these campaigns. On the o...... hiện toàn bộ
A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving
- 2021
Runchen Gao, Li Shen, Yuqi Gao, Rui Guo
AbstractWith the large-scale application of 5G in industrial production, the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing. In the modern industry, the user often stores data collected by IoT devices in the cloud, but the data at th...... hiện toàn bộ
On the use of Max-SAT and PDDL in RBAC maintenance
Tập 2 Số 1 - 2019
Marco Benedetti, Marco Mori
Cascading effects of cyber-attacks on interconnected critical infrastructure
- 2021
Venkata Reddy Palleti, Sridhar Adepu, Vishrut Kumar Mishra, Aditya P. Mathur
AbstractModern critical infrastructure, such as a water treatment plant, water distribution system, and power grid, are representative of Cyber Physical Systems (CPSs) in which the physical processes are monitored and controlled in real time. One source of complexity in such systems is due to the intra-system interactions and inter-dependencies. Consequently, these...... hiện toàn bộ