-
601
A Multi-Faceted Approach to Trending Topic Attack Detection Using Semantic Similarity and Large-Scale Datasets
Published 2025-01-01Subjects: “…Trending topic attacks…”
Get full text
Article -
602
Smart-blacklisting:an efficient methodology for mitigating fake block attack in P2P file-sharing systems
Published 2013-08-01Subjects: Get full text
Article -
603
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01“…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
Get full text
Article -
604
Designing Attack Surface in Early Childhood Education System Environment using Risk Assessment and Enterprise Architecture Approach
Published 2024-11-01“…This research addresses the challenge of securing Indonesia’s early childhood education systems by designing a minimized attack surface through the integration of ISO 27005-based risk assessment and the TOGAF enterprise architecture framework. …”
Get full text
Article -
605
Adaptive Event-Triggered Control for Complex Dynamical Network with Random Coupling Delay under Stochastic Deception Attacks
Published 2022-01-01“…This study concentrates on adaptive event-triggered control of complex dynamical networks with unpredictable coupling delays and stochastic deception attacks. The adaptive event-triggered mechanism is used to avoid the wasting of limited bandwidth. …”
Get full text
Article -
606
A Comparative Analysis of Support Vector Machine and K-Nearest Neighbors Models for Network Attack Traffic Detection
Published 2025-01-01“…With the continuous advancement of Internet technology, cybersecurity threats are growing more urgent as attack techniques become increasingly sophisticated. …”
Get full text
Article -
607
A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks
Published 2025-01-01Subjects: Get full text
Article -
608
Suppression model of energy sink-hole attack in WSN based on the unequal cluster radius and mobile cluster head
Published 2017-11-01Subjects: Get full text
Article -
609
Design a Robust DDoS Attack Detection and Mitigation Scheme in SDN-Edge-IoT by Leveraging Machine Learning
Published 2025-01-01“…Despite this, DDoS attacks through IoT botnets remain a significant threat. …”
Get full text
Article -
610
In search of a warning strategy against exchange-rate attacks: Forecasting tactics using artificial neural networks
Published 2000-01-01“…“Heart attacks and devaluations are not predictable and, certainly, are never preannounced”. …”
Get full text
Article -
611
Species and Termite Attack Intensity on Pine Trees in Nagari Talang Babungo, Solok District, West Sumatra Province
Published 2023-07-01“…The intensity of the termite attack was relatively low, with a percentage of lose weight by using graveyard test was 17.7%. …”
Get full text
Article -
612
DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments
Published 2014-01-01“…However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. …”
Get full text
Article -
613
-
614
Output Feedback-Based Fuzzy Event-Triggered Synchronization Control for Nonlinear Multiagent Systems Under DoS Attacks
Published 2025-01-01Subjects: Get full text
Article -
615
A New Pipeline for Snooping Keystroke Based on Deep Learning Algorithm
Published 2025-01-01Subjects: “…Acoustic side channel attack…”
Get full text
Article -
616
Cryptography algorithm for wireless channel of CBTC system
Published 2011-01-01Subjects: Get full text
Article -
617
Compressive Strength of Recycled Green Concrete Affected by Chloride and Sulfate Exposures
Published 2024-11-01Subjects: Get full text
Article -
618
Efficient anonymous password-based authenticated key exchange scheme
Published 2009-01-01Subjects: Get full text
Article -
619
Survey on vertical federated learning: algorithm, privacy and security
Published 2023-04-01Subjects: Get full text
Article -
620
A Detection Method Against Load Redistribution Attacks in the Interdependence of the Natural Gas Network and Power System Based on Entropy
Published 2023-09-01Subjects: Get full text
Article