咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 6 篇 计算机科学与技术...
    • 2 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学

主题

  • 7 篇 threat detection
  • 4 篇 cybersecurity
  • 3 篇 artificial intel...
  • 2 篇 deep learning
  • 2 篇 machine learning
  • 2 篇 network security
  • 1 篇 internet of thin...
  • 1 篇 threat landscape
  • 1 篇 regulations
  • 1 篇 mayfly optimizat...
  • 1 篇 premature attack
  • 1 篇 threat modeling
  • 1 篇 policy
  • 1 篇 threat intellige...
  • 1 篇 industrial inter...
  • 1 篇 poll rate
  • 1 篇 compliance
  • 1 篇 cyber-physical s...
  • 1 篇 threat actors
  • 1 篇 leakage control

机构

  • 2 篇 department of in...
  • 1 篇 saudi aramco cyb...
  • 1 篇 department of co...
  • 1 篇 faculty of infor...
  • 1 篇 department of co...
  • 1 篇 department of ma...
  • 1 篇 computer science...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 prince saud al f...
  • 1 篇 department of co...
  • 1 篇 electrical engin...
  • 1 篇 department of el...
  • 1 篇 department of in...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 college of compu...
  • 1 篇 college of compu...

作者

  • 2 篇 sana alazwari
  • 1 篇 arshad ali
  • 1 篇 hamad ali abosaq
  • 1 篇 someah alangari
  • 1 篇 ragha madhavi go...
  • 1 篇 khalid a.alissa
  • 1 篇 ali m.al-sharafi
  • 1 篇 areej alhogail
  • 1 篇 fatma s.alrayes
  • 1 篇 olatunde abiona
  • 1 篇 saad arif
  • 1 篇 yen-min jasmina ...
  • 1 篇 yichiet aun
  • 1 篇 alanoud al mazro...
  • 1 篇 z.faizal khan
  • 1 篇 saeed m.alshahra...
  • 1 篇 amardeep singh
  • 1 篇 aparna gadhi
  • 1 篇 samrat mondal
  • 1 篇 ming-lee gan

语言

  • 7 篇 英文
检索条件"主题词=Threat Detection"
7 条 记 录,以下是1-10 订阅
排序:
Artificial Intelligence Based threat detection in Industrial Internet of Things Environment
收藏 引用
Computers, Materials & Continua 2022年 第12期73卷 5809-5824页
作者: Fahad F.Alruwaili College of Computing and Information Technology Shaqra UniversitySharqaSaudi Arabia
Internet of Things(IoT)is one of the hottest research topics in recent years,thanks to its dynamic working mechanism that integrates physical and digital world into a single *** technology,applied in industries,is ter... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhanced Gorilla Troops Optimizer with Deep Learning Enabled Cybersecurity threat detection
收藏 引用
Computer Systems Science & Engineering 2023年 第6期45卷 3037-3052页
作者: Fatma S.Alrayes Najm Alotaibi Jaber S.Alzahrani Sana Alazwari Areej Alhogail Ali M.Al-Sharafi Mahmoud Othman Manar Ahmed Hamza Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Prince Saud Al Faisal Institute for Diplomatic Studies RiyadhSaudi Arabia Department of Industrial Engineering College of Engineering at AlqunfudahUmm Al-Qura UniversitySaudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Information Systems College of Computer and Information SciencesKing Saud UniversitySaudi Arabia Department of Computer Science College of Computers and Information TechnologyUniversity of BishaSaudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Recent developments in computer networks and Internet of Things(IoT)have enabled easy access to *** the government and business sectors face several difficulties in resolving cybersecurity network issues,like novel at... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries
收藏 引用
Frontiers of Computer Science 2021年 第2期15卷 161-179页
作者: Nilesh CHAKRABORTY Samrat MONDAL College of Computer Science and Software Engineering Shenzhen UniversityShenzhen518060China Department of Computer Science Indian Institute of Technology PatnaBihar801106India
Unaided authentication services provide the flexibility to login without being dependent on any additional *** power of recording attack resilient unaided authentication services(RARUAS)is undeniable as,in some aspect... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Machine Learning Based Cybersecurity threat detection for Secure IoT Assisted Cloud Environment
收藏 引用
Computer Systems Science & Engineering 2023年 第10期47卷 855-871页
作者: Z.Faizal Khan Saeed M.Alshahrani Abdulrahman Alghamdi Someah Alangari Nouf Ibrahim Altamami Khalid A.Alissa Sana Alazwari Mesfer Al Duhayyim Fahd N.Al-Wesabi Department of Computer Engineering College of Computing and Information TechnologyShaqra UniversityShaqraSaudi Arabia Department of Computer Science College of Computing and Information TechnologyShaqra UniversityShaqraSaudi Arabia Department of Computer Science College of Science and Humanities DawadmiShaqra UniversityShaqraSaudi Arabia Department of Mathematics College of EducationShaqra UniversityShaqraSaudi Arabia Saudi Aramco Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif P.O.Box 11099Taif21944Saudi Arabia Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversityAlaflaj16828Saudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia
The Internet of Things(IoT)is determine enormous economic openings for industries and allow stimulating innovation which obtain between domains in childcare for eldercare,in health service to energy,and in developed t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Securing Cloud-Encrypted Data:Detecting Ransomware-as-a-Service(RaaS)Attacks through Deep Learning Ensemble
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 857-873页
作者: Amardeep Singh Hamad Ali Abosaq Saad Arif Zohaib Mushtaq Muhammad Irfan Ghulam Abbas Arshad Ali Alanoud Al Mazroa School of Computer Information Sciences University of CumberlandsWilliamsburgKentucky40769USA Computer Science Department College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Mechanical Engineering College of EngineeringKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Electrical Electronics and Computer SystemsCollege of Engineering and TechnologyUniversity of SargodhaSargodha40100Pakistan Electrical Engineering Department College of EngineeringNajran UniversityNajran61441Saudi Arabia Department of Electrical Engineering The University of LahoreLahore54000Pakistan Faculty of Computer and Information Systems Islamic University of MadinahMadinah42351Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cyber Resilience through Real-Time threat Analysis in Information Security
收藏 引用
International Journal of Communications, Network and System Sciences 2024年 第4期17卷 51-67页
作者: Aparna Gadhi Ragha Madhavi Gondu Hitendra Chaudhary Olatunde Abiona Department of Computer Information Systems Indiana University Northwest Gary IN USA
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Adaptive Polling Rate for SNMP for Detecting Elusive DDOS
收藏 引用
Journal of Cyber Security 2022年 第1期4卷 17-28页
作者: Yichiet Aun Yen-Min Jasmina Khaw Ming-Lee Gan Vasaki Ponnusamy Faculty of Information Communication and Technology Kampar31900Malaysia
Resilient network infrastructure is pivotal for business entities that are growing reliance on the *** Denial-of-Service(DDOS)is a common network threat that collectively overwhelms and exhausts network resources usin... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论