Firewall best practices for securing smart healthcare environment: A review
RW Anwar, T Abdullah, F Pastore - Applied Sciences, 2021 - mdpi.com
Smart healthcare environments are growing at a rapid pace due to the services and benefits
offered to healthcare practitioners and to patients. At the same time, smart healthcare …
offered to healthcare practitioners and to patients. At the same time, smart healthcare …
Cyber attacks in cyber-physical microgrid systems: A comprehensive review
S Suprabhath Koduru, VSP Machina, S Madichetty - Energies, 2023 - mdpi.com
The importance of and need for cyber security have increased in the last decade. The critical
infrastructure of the country, modeled with cyber-physical systems (CPS), is becoming …
infrastructure of the country, modeled with cyber-physical systems (CPS), is becoming …
[HTML][HTML] Novel hybrid firefly algorithm: An application to enhance XGBoost tuning for intrusion detection classification
The research proposed in this article presents a novel improved version of the widely
adopted firefly algorithm and its application for tuning and optimising XGBoost classifier …
adopted firefly algorithm and its application for tuning and optimising XGBoost classifier …
Classification of firewall log data using multiclass machine learning models
These days, we are witnessing unprecedented challenges to network security. This indeed
confirms that network security has become increasingly important. Firewall logs are …
confirms that network security has become increasingly important. Firewall logs are …
A local feature engineering strategy to improve network anomaly detection
The dramatic increase in devices and services that has characterized modern societies in
recent decades, boosted by the exponential growth of ever faster network connections and …
recent decades, boosted by the exponential growth of ever faster network connections and …
Stacking ensemble-based HIDS framework for detecting anomalous system processes in windows based operating systems using multiple word embedding
Globally, more than 80% of end-user devices run on Microsoft's Windows-based operating
systems. Therefore, majority of the cyber-attack payloads are crafted explicitly for exploiting …
systems. Therefore, majority of the cyber-attack payloads are crafted explicitly for exploiting …
[PDF][PDF] Digitale Überwachung und Kontrolle am Arbeitsplatz
W Christl - Von der Ausweitung betrieblicher …, 2021 - wien.arbeiterkammer.at
Durch die rasante Entwicklung der Informations-und Kommunikationstechnologien dringt
die Erfassung von Daten über ArbeitnehmerInnen immer mehr in den betrieblichen Alltag …
die Erfassung von Daten über ArbeitnehmerInnen immer mehr in den betrieblichen Alltag …
A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection
Enterprise networks that host valuable assets and services are popular and frequent targets
of distributed network attacks. In order to cope with the ever-increasing threats, industrial …
of distributed network attacks. In order to cope with the ever-increasing threats, industrial …
Performance evaluation of Convolutional Neural Network for web security
Due to the daily use of web applications in several critical domains such as banking and
online shopping, cybersecurity has become a challenge. Recently, deep learning …
online shopping, cybersecurity has become a challenge. Recently, deep learning …
PROGESI: a PROxy Grammar to Enhance web application firewall for SQL Injection prevention
A web application is prone to security threats due to its open nature. The security of these
platforms is imperative for organizations of all sizes because they store sensitive information …
platforms is imperative for organizations of all sizes because they store sensitive information …