Review on semantic modeling and simulation of cybersecurity and interoperability on the internet of underwater things
K Kotis, S Stavrinos, C Kalloniatis - Future Internet, 2022 - mdpi.com
As maritime and military missions become more and more complex and multifactorial over
the years, there has been a high interest in the research and development of (autonomous) …
the years, there has been a high interest in the research and development of (autonomous) …
Information-extreme machine learning of a cyber attack detection system
A Dovbysh, V Liubchak, I Shelehov, J Simonovskiy… - 2022 - dspace.library.khai.edu
This study increases the functional efficiency of machine learning of a cyber attack detection
system. An information-extreme machine learning method for a cyber attack detection …
system. An information-extreme machine learning method for a cyber attack detection …
Compression of network traffic parameters for detecting cyber attacks based on deep learning
The approach to compress network traffic parameters in systems for detecting attacks on
telecommunication networks using the neural network and nonlinear principal components …
telecommunication networks using the neural network and nonlinear principal components …
Deep neural network for detection of cyber attacks
In this paper the approach for detection of cyber attacks is described. The approach is based
on deep neural network. The main goal of proposed approach is to detect unknown …
on deep neural network. The main goal of proposed approach is to detect unknown …
Cyber security and wind energy: a fault-tolerance analysis of DDoS attacks
CJ Bergs, J Bruiners, F Fakier… - ICCWS 2021 16th …, 2021 - books.google.com
The advancement of and dependence upon renewable energy sources has created a new
environment in which the safety and security of such systems are threatened within the …
environment in which the safety and security of such systems are threatened within the …
Method of protection against traffic termination in voip
I Romanets, A Sachenko… - 2018 10th International …, 2018 - ieeexplore.ieee.org
Voice over IP (VoIP) is one of the most commonly used technologies. Due to the low cost of
using VoIP, unlike traditional PSTN networks, it is rapidly growing and widely distributed in …
using VoIP, unlike traditional PSTN networks, it is rapidly growing and widely distributed in …
[PDF][PDF] Implementation of Control by Parameters of Client Automated Workplaces of Specialized Information Systems for Neutralization malware.
M Stetsyuk, V Stetsyuk, B Savenko, O Savenko… - IntelITSIS, 2021 - ceur-ws.org
The paper presents a topical scientific problem for the development of information
technology, which automatically allows you to neutralize the manifestations of malicious …
technology, which automatically allows you to neutralize the manifestations of malicious …
Attackers' Wi-Fi Devices Metadata Interception for their Location Identification
R Banakh, A Piskozub - 2018 IEEE 4th International …, 2018 - ieeexplore.ieee.org
the paper provides an insight into the complex of events for probable location of attacker
right after he/she has committed an attack on Wi-Fi network. The new approach of additional …
right after he/she has committed an attack on Wi-Fi network. The new approach of additional …
Analysis of Vulnerability Characteristics for Automated Penetration Testing
Y Stefinko, A Piskozub, A Obshta - 2024 IEEE 17th …, 2024 - ieeexplore.ieee.org
A report on the analysis of statistical data on vulnerabilities from public data sources has
been presented to develop a mathematical model for penetration testing. Current trends in …
been presented to develop a mathematical model for penetration testing. Current trends in …
DDoSSim-System for Visual Representation of the Selected Distributed Denial of Service Attacks
T Apostolovic, N Stankovic, K Milenkovic… - 2018 Zooming …, 2018 - ieeexplore.ieee.org
This paper describes the software system for visual representation of the selected direct and
reflected distributed denial of service attacks on the internal and the network resources …
reflected distributed denial of service attacks on the internal and the network resources …