咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 8 篇 计算机科学与技术...
    • 2 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 生物医学工程(可授...
  • 3 篇 理学
    • 1 篇 数学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 2 篇 医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 11 篇 cyberattacks
  • 3 篇 deep learning
  • 2 篇 internet of thin...
  • 2 篇 cybersecurity
  • 2 篇 machine learning
  • 1 篇 threat landscape
  • 1 篇 regulations
  • 1 篇 phishing
  • 1 篇 false data injec...
  • 1 篇 uniform resource...
  • 1 篇 dimensionality r...
  • 1 篇 real time digita...
  • 1 篇 threat modeling
  • 1 篇 policy
  • 1 篇 potential soluti...
  • 1 篇 threat intellige...
  • 1 篇 countermeasures
  • 1 篇 cybercriminals
  • 1 篇 social computing
  • 1 篇 deep learning ne...

机构

  • 1 篇 school of mechat...
  • 1 篇 college of techn...
  • 1 篇 department of co...
  • 1 篇 dipartimento di ...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 department of ap...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 interdisciplinar...
  • 1 篇 ieee
  • 1 篇 david eccles sch...
  • 1 篇 department of co...
  • 1 篇 institute of aut...
  • 1 篇 department of di...
  • 1 篇 center of intell...
  • 1 篇 department of in...
  • 1 篇 faculty of infor...
  • 1 篇 department of co...

作者

  • 1 篇 abu sarwar zaman...
  • 1 篇 nisha madathil
  • 1 篇 florence a.olade...
  • 1 篇 shaorong xie
  • 1 篇 giambattista gru...
  • 1 篇 tianyi luo
  • 1 篇 abdelwahed motwa...
  • 1 篇 ayei e.ibor
  • 1 篇 zhidong cao
  • 1 篇 omar musa
  • 1 篇 ragha madhavi go...
  • 1 篇 nazrulazhar baha...
  • 1 篇 daniel dajun zen...
  • 1 篇 heba mohsen
  • 1 篇 bin jiang
  • 1 篇 nadine nibigira
  • 1 篇 pengfei zhao
  • 1 篇 olatunde abiona
  • 1 篇 s.m.suhail hussa...
  • 1 篇 xiaofan wang

语言

  • 11 篇 英文
检索条件"主题词=Cyberattacks"
11 条 记 录,以下是1-10 订阅
排序:
A social computing method for energy safety
收藏 引用
Journal of Safety Science and Resilience 2024年 第1期5卷 64-82页
作者: Pengfei Zhao Shuangqi Li Zhidong Cao Paul Jen-Hwa Hu Daniel Dajun Zeng Da Xie Yichen Shen Jiangfeng Li Tianyi Luo Institute of Automation Chinese Academy of SciencesUniversity of Chinese Academy of SciencesBeijing 100090China Systems Engineering Cornell UniversityIthacaNY 14853USA David Eccles School of Business the University of UtahUtahUSA Department of Electrical Engineering Shanghai Jiao Tong UniversityShanghai 200240China China University of Mining and Technology China
Information and communication technologies enable the transformation of traditional energy systems into cyber-physical energy systems(CPESs),but such systems have also become popular targets of Cyberattacks.Currently,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cyber Resilience through Real-Time Threat Analysis in Information Security
收藏 引用
International Journal of Communications, Network and System Sciences 2024年 第4期17卷 51-67页
作者: Aparna Gadhi Ragha Madhavi Gondu Hitendra Chaudhary Olatunde Abiona Department of Computer Information Systems Indiana University Northwest Gary IN USA
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Artificial Intelligence Adoption for Cybersecurity in Africa
收藏 引用
Journal of Information Security 2024年 第2期15卷 134-147页
作者: Nadine Nibigira Vincent Havyarimana Zhu Xiao School of Engineering Sciences University of Burundi Doctoral School Bujumbura Burundi Department of Applied Sciences Burundi Higher Institute of Education (ENS) Bujumbura Burundi College of Computer Science and Electronic Engineering Hunan University Yongzhou Hunan
Legacy-based threat detection systems have not been able to keep up with the exponential growth in scope, frequency, and effect of cybersecurity threats. Artificial intelligence is being used as a result to help with ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 博看期刊 评论
COVID-19 pandemic and the cyberthreat landscape:Research challenges and opportunities
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 211-222页
作者: Heba Saleous Muhusina Ismail Saleh HAlDaajeh Nisha Madathil Saed Alrabaee Kim-Kwang Raymond Choo Nabeel Al-Qirim Information Systems and Security College of ITUnited Arab Emirates UniversityAl AinUnited Arab Emirates Department of Information Systems and Cyber Security The University of Texas at San AntonioSan AntonioTX78249USA College of Technological Innovations(CIT) Zayed UniversityUAE
Although cyber technologies benefit our society,there are also some related cybersecurity risks.For example,cybercriminals may exploit vulnerabilities in people,processes,and technologies during trying times,such as t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems
收藏 引用
Protection and Control of Modern Power Systems 2023年 第3期8卷 1-15页
作者: Shahbaz Hussain S.M.Suhail Hussain Marziyeh Hemmati Atif Iqbal Rashid Alammari Stefano Zanero Enrico Ragaini Giambattista Gruosso Department of Electrical Engineering Qatar UniversityDohaQatar Dipartimento di Elettronica Informazione e BioingegneriaPolitecnico di MilanoMilanItaly Department of Electrical Engineering King Fahd University of Petroleum and Minerals(KFUPM)DhahranSaudi Arabia Interdisciplinary Research Center for Renewable Energy and Power Systems(IRC-REPS) King Fahd University of Petroleum and Minerals(KFUPM)DhahranSaudi Arabia
The conventional power systems are evolving as smart grids.In recent times Cyberattacks on smart grids have been increasing.Among different attacks,False Data Injection(FDI)is considered as an emerging threat that has... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Distributed Fault-Tolerant Consensus Tracking of Multi-Agent Systems Under Cyber-Attacks
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第6期9卷 1037-1048页
作者: Chun Liu Bin Jiang Xiaofan Wang Huiliao Yang Shaorong Xie School of Mechatronic Engineering and Automation Shanghai UniversityShanghai 200444 School of Artificial Intelligence Shanghai UniversityShanghai 200444China IEEE College of Automation Engineering Nanjing University of Aeronautics and AstronauticsNanjing 210016China College of Energy and Electrical Engineering Hohai UniversityNanjing 210016China School of Computer Engineering and Science Shanghai UniversityShanghai 200444China
This paper investigates the distributed fault-tolerant consensus tracking problem of nonlinear multi-agent systems with general incipient and abrupt time-varying actuator faults under cyber-attacks.First,a decentraliz... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Hunger Search Optimization with Hybrid Deep Learning Enabled Phishing Detection and Classification Model
收藏 引用
Computers, Materials & Continua 2022年 第12期73卷 6425-6441页
作者: Hadil Shaiba Jaber S.Alzahrani Majdy M.Eltahir Radwa Marzouk Heba Mohsen Manar Ahmed Hamza Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Industrial Engineering College of Engineering at AlqunfudahUmm Al-Qura UniversitySaudi Arabia Department of Information Systems College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Phishing is one of the simplest ways in cybercrime to hack the reliable data of users such as passwords,account identifiers,bank details,etc.In general,these kinds of Cyberattacks are made at users through phone calls... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model
收藏 引用
Computer Systems Science & Engineering 2023年 第5期45卷 1679-1694页
作者: Mashael M Asiri Heba G.Mohamed Mohamed K Nour Mesfer Al Duhayyim Amira Sayed A.Aziz Abdelwahed Motwakel Abu Sarwar Zamani Mohamed I.Eldesouki Department of Computer Science College of Science&Art atMahayilKing Khalid UniversityMuhayel Aseer62529Saudi Arabia Department of Electrical Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia Department of Information System College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Due to exponential increase in smart resource limited devices and high speed communication technologies,Internet of Things(IoT)have received significant attention in different application areas.However,IoT environment... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
DeepIoT.IDS:Hybrid Deep Learning for Enhancing IoT Network Intrusion Detection
收藏 引用
Computers, Materials & Continua 2021年 第12期69卷 3945-3966页
作者: Ziadoon K.Maseer Robiah Yusof Salama A.Mostafa Nazrulazhar Bahaman Omar Musa Bander Ali Saleh Al-rimy Faculty of Information and Communication Technology Universiti Teknikal MalaysiaMelaka76100Malaysia Center of Intelligent and Autonomous Systems Faculty of Computer Science and Information TechnologyUniversiti Tun Hussein Onn MalaysiaJohor86400Malaysia Faculty of Business and Technology UNITAR International UniversitySelangor47301Malaysia School of Computing Faculty of EngineeringUniversiti Teknologi MalaysiaJohor81310Malaysia
With an increasing number of services connected to the internet,including cloud computing and Internet of Things(IoT)systems,the prevention of Cyberattacks has become more challenging due to the high dimensionality of... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Conceptualisation of Cyberattack prediction with deep learning
收藏 引用
Cybersecurity 2018年 第1期1卷 788-801页
作者: Ayei E.Ibor Florence A.Oladeji Olusoji B.Okunoye Obeten O.Ekabua Department of Computer Science University of CalabarCalabarNigeria Department of Computer Sciences University of LagosLagosNigeria
The state of the cyberspace portends uncertainty for the future Internet and its accelerated number of users.New paradigms add more concerns with big data collected through device sensors divulging large amounts of in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论