AbstractTo protect the network, resources, and sensitive data, the intrusion
detection system (IDS) has become a fundamental component of organizations that
prevents cybercriminal activities. Several approaches have been introduced and
implemented to thwart malicious activities so far. Due to the effectiveness of
machine learning (ML) methods, the proposed approach applied several ML models
for th... hiện toàn bộ
Tóm tắtPhát hiện bất thường đã trở thành một lĩnh vực nghiên cứu thiết yếu và
năng động trong khai thác dữ liệu. Nhiều ứng dụng khác nhau, bao gồm các mạng xã
hội, đã áp dụng nhiều phương pháp hiện đại khác nhau để xác định bất thường nhằm
đảm bảo an ninh và quyền riêng tư cho người dùng. Mạng xã hội đề cập đến một
diễn đàn được sử dụng bởi các nhóm người khác nhau để bày tỏ suy nghĩ, giao tiếp
vớ... hiện toàn bộ
AbstractThe IEEE 1588 precision time protocol (PTP) is very important for many
industrial sectors and applications that require time synchronization accuracy
between computers down to microsecond and even nanosecond levels. Nevertheless,
PTP and its underlying network infrastructure are vulnerable to cyber-attacks,
which can stealthily reduce the time synchronization accuracy to unacceptable
and e... hiện toàn bộ
Abstract Humans are commonly seen as the weakest link in corporate information
security. This led to a lot of effort being put into security training and
awareness campaigns, which resulted in employees being less likely the target of
successful attacks. Existing approaches, however, do not tap the full potential
that can be gained through these campaigns. On the one hand, human perception
offers ... hiện toàn bộ
AbstractWith the large-scale application of 5G in industrial production, the
Internet of Things has become an important technology for various industries to
achieve efficiency improvement and digital transformation with the help of the
mobile edge computing. In the modern industry, the user often stores data
collected by IoT devices in the cloud, but the data at the edge of the network
involves a ... hiện toàn bộ
AbstractModern critical infrastructure, such as a water treatment plant, water
distribution system, and power grid, are representative of Cyber Physical
Systems (CPSs) in which the physical processes are monitored and controlled in
real time. One source of complexity in such systems is due to the intra-system
interactions and inter-dependencies. Consequently, these systems are a potential
target f... hiện toàn bộ