咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 6 篇 计算机科学与技术...
    • 4 篇 网络空间安全
    • 2 篇 机械工程
    • 2 篇 电气工程
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 交通运输工程

主题

  • 11 篇 cyber-security
  • 3 篇 machine learning
  • 2 篇 fuzzy logic
  • 2 篇 model training
  • 1 篇 the onion router...
  • 1 篇 event-triggered ...
  • 1 篇 random forest
  • 1 篇 automatic genera...
  • 1 篇 attack detection
  • 1 篇 nearest neighbor
  • 1 篇 decision tree
  • 1 篇 algorithms
  • 1 篇 mcdm
  • 1 篇 false data injec...
  • 1 篇 peer-to-peer
  • 1 篇 load redistribut...
  • 1 篇 decision-making ...
  • 1 篇 semi-homomorphic...
  • 1 篇 web applications
  • 1 篇 critical metrics

机构

  • 1 篇 department of co...
  • 1 篇 mars laboratory ...
  • 1 篇 gmr institute of...
  • 1 篇 higher institute...
  • 1 篇 department of co...
  • 1 篇 clean energy aut...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 raghu engineerin...
  • 1 篇 faculty of compu...
  • 1 篇 department of pu...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 iar systems mäst...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 department of in...
  • 1 篇 centre for resea...

作者

  • 2 篇 raees ahmad khan
  • 1 篇 abdullah m.algas...
  • 1 篇 martin ogharandu...
  • 1 篇 abdulmohsen alma...
  • 1 篇 lulu guo
  • 1 篇 vasudha pasumart...
  • 1 篇 rajeev kumar
  • 1 篇 tauqeer safdar m...
  • 1 篇 sadok turki
  • 1 篇 jiazhi zhang
  • 1 篇 yulei wang
  • 1 篇 oliver kosut
  • 1 篇 mohsen denden
  • 1 篇 md mottahir alam
  • 1 篇 sarah mustafa el...
  • 1 篇 mohd hilmi hasan
  • 1 篇 joe essien
  • 1 篇 abdullah algarni
  • 1 篇 lalitha sankar
  • 1 篇 fawaz jaber also...

语言

  • 11 篇 英文
检索条件"主题词=Cyber-Security"
11 条 记 录,以下是1-10 订阅
排序:
Systematic assessment of cyber-physical security of lane keeping control system for autonomous vehicles
收藏 引用
security and Safety 2023年 第4期2卷 66-84页
作者: Yulei Wang An Huang Fan Yang Jiazhi Zhang Ning Bian Lulu Guo Department of Control Science and Engineering Tongji UniversityShanghai 200092China Clean Energy Automotive Engineering Center Tongji UniversityShanghai 201804China Dongfeng Technical Center Dongfeng Motor CorporationWuhan 430056China
In this article,a systematic assessment of cyber-physical security is developed for the lane-keeping control(LKC)system of autonomous vehicles(AVs),which has not been attempted before.A novel impact analysis methodolo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第4期11卷 946-955页
作者: Yongxia Shi Ehsan Nekouei the Department of Electrical Engineering City University of Hong KongHong KongChina
This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-trigger... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Two-stage Kalman Filter for cyber-attack Detection in Automatic Generation Control System
收藏 引用
Journal of Modern Power Systems and Clean Energy 2022年 第1期10卷 50-59页
作者: Ayyarao S.L.V.Tummala Ravi Kiran Inapakurthi GMR Institute of Technology RajamSrikakulamAndhra PradeshIndia Raghu Engineering College DakamarriVisakhapatnamAndhra PradeshIndia
Communication plays a vital role in incorporating smartness into the interconnected power ***,historical records prove that the data transfer has always been vulnerable to *** these cyber-attacks are identified and co... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Detection and Localization of Load Redistribution Attacks on Large-scale Systems
收藏 引用
Journal of Modern Power Systems and Clean Energy 2022年 第2期10卷 361-370页
作者: Andrea Pinceti Lalitha Sankar Oliver Kosut the School of Electrical Computer and Energy EngineeringArizona State UniversityTempeUSA
A nearest-neighbor-based detector against load redistribution attacks is *** detector is designed to scale from small-scale to very large-scale systems while guaranteeing consistent detection *** testing is performed ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Intelligent Solution System for Cloud security Based on Equity Distribution:Model and Algorithms
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 1461-1479页
作者: Sarah Mustafa Eljack Mahdi Jemmali Mohsen Denden Mutasim Al Sadig Abdullah M.Algashami Sadok Turki Department of Computer Science and Information College of Science at ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Computing and InformaticsUniversity of SharjahSharjahUnited Arab Emirates Higher Institute of Computer Science and Mathematics University of MonastirMonastir5000Tunisia Mars Laboratory University of SousseSousseTunisia Department of Logistic and Maintenance UFR MIM at MetzUniversity of LorraineMetzFrance Department of Computer and Information Technologies College of Telecommunicationand Information Riyadh CTITechnical and Vocational Training Corporation TVTCRiyadh12464Saudi Arabia Department of Computer Science Higher Institute of Applied Sciences of SousseSousse UniversitySousse4000Tunisia
In the cloud environment,ensuring a high level of data security is in high *** planning storage optimization is part of the whole security process in the cloud *** enables data security by avoiding the risk of data lo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: security Requirement Perspective
收藏 引用
Computers, Materials & Continua 2021年 第7期68卷 1203-1218页
作者: Yoosef BAbushark Asif Irshad Khan Fawaz Jaber Alsolami Abdulmohsen Almalawi Md Mottahir Alam Alka Agrawal Rajeev Kumar Raees Ahmad Khan Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Electrical and Computer Engineering Faculty of EngineeringKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025India Department of Computer Application Shri Ramswaroop Memorial UniversityBarabanki225003India
Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product *** models,frameworks and methodol... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Windows 10’s Browser Forensic Analysis for Tracing P2P Networks’Anonymous Attacks
收藏 引用
Computers, Materials & Continua 2022年 第7期72卷 1251-1273页
作者: Saima Kauser Tauqeer Safdar Malik Mohd Hilmi Hasan Emelia Akashah P.Akhir Syed Muhammad Husnain Kazmi Air University Department of Computer ScienceMultan60000Pakistan Centre for Research in Data Science Department of Computer and Information SciencesUniversiti Teknologi PETRONASSeri IskandarPerak32610Malaysia IAR Systems MästaStockholmStation Gatan 2319542Sweden
A web browser is the most basic tool for accessing the internet from any of the machines/***,data breaches have been reported frequently from users who are concerned about their personal information,as well as threats... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Managing security-Risks for Improving security-Durability of Institutional Web-Applications: Design Perspective
收藏 引用
Computers, Materials & Continua 2021年 第2期66卷 1849-1865页
作者: Abdulaziz Attaallah Abdullah Algarni Raees Ahmad Khan Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknowUttar PradeshIndia
The advanced technological need,exacerbated by the flexible time constraints,leads to several more design level unexplored *** is an extremely vital component in software development;we must take charge of security an... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Machine Learning Models for Heterogenous Network security Anomaly Detection
收藏 引用
Journal of Computer and Communications 2024年 第6期12卷 38-58页
作者: Mercy Diligence Ogah Joe Essien Martin Ogharandukun Monday Abdullahi Department of Computer Science Veritas University Abuja Nigeria Department of Pure and Applied Physics Veritas University Abuja Nigeria Department of Computer Science Air Force Institute of Technology Kaduna Nigeria
The increasing amount and intricacy of network traffic in the modern digital era have worsened the difficulty of identifying abnormal behaviours that may indicate potential security breaches or operational interruptio... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Optimizing Network security via Ensemble Learning: A Nexus with Intrusion Detection
收藏 引用
Journal of Information security 2024年 第4期15卷 545-556页
作者: Anu Baluguri Vasudha Pasumarthy Indranil Roy Bidyut Gupta Nick Rahimi School of Computing Sciences and Computing Engineering University of Southern Mississippi Hattiesburg USA Department of Computer Science Southeast Missouri State University Cape Girardeau USA School of Computing Southern Illinois University Carbondale USA
Network intrusion detection systems need to be updated due to the rise in cyber threats. In order to improve detection accuracy, this research presents a strong strategy that makes use of a stacked ensemble method, wh... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论