Showing 321 - 340 results of 358 for search '"cybersecurity"', query time: 0.05s Refine Results
  1. 321

    FFL-IDS: A Fog-Enabled Federated Learning-Based Intrusion Detection System to Counter Jamming and Spoofing Attacks for the Industrial Internet of Things by Tayyab Rehman, Noshina Tariq, Farrukh Aslam Khan, Shafqat Ur Rehman

    Published 2024-12-01
    “…Still, IIoT compels significant cybersecurity threats beyond jamming and spoofing, which could ruin the critical infrastructure. …”
    Get full text
    Article
  2. 322
  3. 323
  4. 324
  5. 325

    Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services by Selvakumar Shanmugam, Rajesh Natarajan, Gururaj H. L., Francesco Flammini, Badria Sulaiman Alfurhood, Anitha Premkumar

    Published 2024-01-01
    “…Cloud security is the cybersecurity authority dedicated to securing cloud computing systems. …”
    Get full text
    Article
  6. 326

    A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture by Navod Neranjan Thilakarathne, Muhammad Saifullah Abu Bakar, Pg Emeroylariffion Abas, Hayati Yassin

    Published 2025-01-01
    “…In this regard, this research introduces a groundbreaking approach to addressing the cybersecurity concerns associated with smart agriculture–deception technology. …”
    Get full text
    Article
  7. 327

    A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE by Vanlalruata Hnamte, Hong Nhung-Nguyen, Jamal Hussain, Yong Hwa-Kim

    Published 2023-01-01
    “…Numerous intrusion detection datasets are publicly accessible for further analysis by the cybersecurity research community. However, no previous research has examined the performance of the proposed model on a variety of publicly accessible datasets in detail. …”
    Get full text
    Article
  8. 328

    The Impact of Digitization on Legal Systems in Developing Countries by Ikhtiyor Djuraev, Azim Baratov, Shokhjakhon Khujayev, Iroda Yakubova, Mokhichekhra Rakhmonova, Bobur Mukumov, Nodirakhon Abdurakhmanova

    Published 2025-01-01
    “…However, persistent challenges, including inadequate digital infrastructure, disparities in digital literacy, and cybersecurity vulnerabilities, underscore the need for coordinated interventions. …”
    Get full text
    Article
  9. 329

    Machine Learning-Based Detection of Anomalies, Intrusions, and Threats in Industrial Control Systems by Denis Benka, Dusan Horvath, Lukas Spendla, Gabriel Gaspar, Maximilian Stremy

    Published 2025-01-01
    “…This research highlights the potential of ML techniques to fortify ICS cybersecurity and lays the groundwork for future advancements in critical infrastructure resilience.…”
    Get full text
    Article
  10. 330
  11. 331

    An Observer-Based Event Triggered Mechanism for the Detection and Mitigation of FDI Attacks in Deep Brain Stimulation Systems by Ping Yu, Ding Yang, Khalid A. Alattas, Ardashir Mohammadzadeh, Afef Fekih

    Published 2025-01-01
    “…To the best of our knowledge, this is the first work focusing on the design of defense mechanisms against cybersecurity threats directed toward deep brain stimulation systems. …”
    Get full text
    Article
  12. 332

    AI-Based Holistic Framework for Cyber Threat Intelligence Management by Arnolnt Spyros, Ilias Koritsas, Angelos Papoutsis, Panos Panagiotou, Despoina Chatzakou, Dimitrios Kavallieros, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris

    Published 2025-01-01
    “…Nevertheless, the gathered data usually contain a large amount of content that is irrelevant to CTI or even to cybersecurity. Furthermore, most approaches concerning CTI management (e.g., gathering, analysis) involve simply gathering and storing the information without any enrichment such as classification or correlation. …”
    Get full text
    Article
  13. 333
  14. 334

    EPRNG: Effective Pseudo-Random Number Generator on the Internet of Vehicles Using Deep Convolution Generative Adversarial Network by Chenyang Fei, Xiaomei Zhang, Dayu Wang, Haomin Hu, Rong Huang, Zejie Wang

    Published 2025-01-01
    “…Before generating the encryption keys, a random number generator (RNG) plays an important component in cybersecurity. Several deep learning-based RNGs have been deployed to train the initial value and generate pseudo-random numbers. …”
    Get full text
    Article
  15. 335

    Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems by Ariadna Claudia Moreno, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado, Luis Javier García Villalba

    Published 2025-01-01
    “…Conducting penetration testing (pentesting) in cybersecurity is a crucial turning point for identifying vulnerabilities within the framework of Information Technology (IT), where real malicious offensive behavior is simulated to identify potential weaknesses and strengthen preventive controls. …”
    Get full text
    Article
  16. 336

    Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment by Alanoud Al Mazroa, Fahad R. Albogamy, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-01-01
    “…The swift advancement of cyber-physical systems (CPSs) across sectors such as healthcare, transportation, critical infrastructure, and energy enhances the crucial requirement for robust cybersecurity measures to protect these systems from cyberattacks. …”
    Get full text
    Article
  17. 337
  18. 338

    Temporal Convolutional Network Approach to Secure Open Charge Point Protocol (OCPP) in Electric Vehicle Charging by Ikram Benfarhat, Vik Tor Goh, Chun Lim Siow, Muhammad Sheraz, Teong Chee Chuah

    Published 2025-01-01
    “…Securing data transactions across computer networks presents significant challenges, particularly concerning data privacy and cybersecurity threats. These issues are particularly critical in electric vehicle charging stations (EVCSs) due to the sensitive data involved, such as data breaches, unauthorized access, and privacy concerns. …”
    Get full text
    Article
  19. 339

    ENSURING HUMAN RIGHTS IN THE CONTEXT OF IMPLEMENTATION OF ELECTRONIC VOTING IN UKRAINE: PERSPECTIVES AND RISKS by Liudmyla Gudz

    Published 2024-05-01
    “…However, the successful application requires comprehensive preparation, including software certification, pilot projects, personal data protection, strengthening cybersecurity, and the adoption of a special law on the use of e-voting at various levels and the introduction of e-voting as an alternative method along with traditional voting.…”
    Get full text
    Article
  20. 340

    An artificial insurance framework for a hydrogen-based microgrid to detect the advanced cyberattack model by Mahan Fakhrooeian, Ali Basem, Mohammad Mahdi Gholami, Nahal Iliaee, Alireza Mohammadi Amidi, Amin Heydarian Hamzehkanloo, Akbar Karimipouya

    Published 2025-01-01
    “…Albeit microgrids can gain beneficial results in cost and energy schedules once operating in grid-connected mode, such systems are vulnerable to malicious attacks from the viewpoint of cybersecurity. With this in mind, this paper explores a novel advanced attack model named the false transferred data injection (FTDI) attack aiming to manipulatively alter the power flowing from the microgrid to the upstream grid to raise voltage usability probability. …”
    Get full text
    Article