335 related articles for article (PubMed ID: 33954249)
1. Cyber-attack method and perpetrator prediction using machine learning algorithms.
Bilen A; Özer AB
PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
[TBL] [Abstract][Full Text] [Related]
2. Personalized insulin dose manipulation attack and its detection using interval-based temporal patterns and machine learning algorithms.
Levy-Loboda T; Sheetrit E; Liberty IF; Haim A; Nissim N
J Biomed Inform; 2022 Aug; 132():104129. PubMed ID: 35781036
[TBL] [Abstract][Full Text] [Related]
3. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS
Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626
[TBL] [Abstract][Full Text] [Related]
4. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic.
Lallie HS; Shepherd LA; Nurse JRC; Erola A; Epiphaniou G; Maple C; Bellekens X
Comput Secur; 2021 Jun; 105():102248. PubMed ID: 36540648
[TBL] [Abstract][Full Text] [Related]
5. Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles.
Elsisi M; Tran MQ
Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960561
[TBL] [Abstract][Full Text] [Related]
6. Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments.
Aldhyani THH; Alkahtani H
Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808184
[TBL] [Abstract][Full Text] [Related]
7. Improved Wireless Medical Cyber-Physical System (IWMCPS) Based on Machine Learning.
Alzahrani A; Alshehri M; AlGhamdi R; Sharma SK
Healthcare (Basel); 2023 Jan; 11(3):. PubMed ID: 36766959
[TBL] [Abstract][Full Text] [Related]
8. Cyber Sextortion: An Exploratory Analysis of Different Perpetrators Engaging in a Similar Crime.
O'Malley RL; Holt KM
J Interpers Violence; 2022 Jan; 37(1-2):258-283. PubMed ID: 32146856
[TBL] [Abstract][Full Text] [Related]
9. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure.
Riggs H; Tufail S; Parvez I; Tariq M; Khan MA; Amir A; Vuda KV; Sarwat AI
Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112400
[TBL] [Abstract][Full Text] [Related]
10. A holistic and proactive approach to forecasting cyber threats.
Almahmoud Z; Yoo PD; Alhussein O; Farhat I; Damiani E
Sci Rep; 2023 May; 13(1):8049. PubMed ID: 37198304
[TBL] [Abstract][Full Text] [Related]
11. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.
Dutt V; Ahn YS; Gonzalez C
Hum Factors; 2013 Jun; 55(3):605-18. PubMed ID: 23829034
[TBL] [Abstract][Full Text] [Related]
12. Diverging deep learning cognitive computing techniques into cyber forensics.
Karie NM; Kebande VR; Venter HS
Forensic Sci Int Synerg; 2019; 1():61-67. PubMed ID: 32411955
[TBL] [Abstract][Full Text] [Related]
13. Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms.
Alsaade FW; Al-Adhaileh MH
Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112429
[TBL] [Abstract][Full Text] [Related]
14. A deeper look into cybersecurity issues in the wake of Covid-19: A survey.
Alawida M; Omolara AE; Abiodun OI; Al-Rajab M
J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180
[TBL] [Abstract][Full Text] [Related]
15. Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression.
Lee JH; Ji IH; Jeon SH; Seo JT
Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139701
[TBL] [Abstract][Full Text] [Related]
16. Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.
Ghaleb FA; Alsaedi M; Saeed F; Ahmad J; Alasli M
Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591061
[TBL] [Abstract][Full Text] [Related]
17. Network intrusion detection using oversampling technique and machine learning algorithms.
Ahmed HA; Hameed A; Bawany NZ
PeerJ Comput Sci; 2022; 8():e820. PubMed ID: 35111914
[TBL] [Abstract][Full Text] [Related]
18. A robust intelligent zero-day cyber-attack detection technique.
Kumar V; Sinha D
Complex Intell Systems; 2021; 7(5):2211-2234. PubMed ID: 34777966
[TBL] [Abstract][Full Text] [Related]
19. A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions.
Hijji M; Alam G
IEEE Access; 2021; 9():7152-7169. PubMed ID: 34786300
[TBL] [Abstract][Full Text] [Related]
20. Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security.
Yadav A; Kumar A; Singh V
Artif Intell Rev; 2023 Mar; ():1-32. PubMed ID: 37362900
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]