Zeitschriftenartikel zum Thema „Cyber Algorithm“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Cyber Algorithm" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Manas Kumar Yogi and Dwarampudi Aiswarya. "Designing Greedy Algorithm for Cyber Threat Detection." Journal of ISMAC 5, no. 3 (2023): 200–218. http://dx.doi.org/10.36548/jismac.2023.3.002.
Der volle Inhalt der QuelleYin, Peng-Yeng, Fred Glover, Manuel Laguna, and Jia-Xian Zhu. "A Complementary Cyber Swarm Algorithm." International Journal of Swarm Intelligence Research 2, no. 2 (2011): 22–41. http://dx.doi.org/10.4018/jsir.2011040102.
Der volle Inhalt der QuelleRahman, S. R. "A Fussy Based Neural Genetic Algorithm for Securing Data in Cyber Security." International Journal on Future Revolution in Computer Science & Communication Engineering 8, no. 2 (2022): 79–85. http://dx.doi.org/10.17762/ijfrcsce.v8i2.2081.
Der volle Inhalt der QuelleZaki Abdullah, Mahmood, Ali Kalid Jassim, Fadia Noori Hummadi, and Mohammed Majid M. Al Khalidy. "NEW STRATEGIES FOR IMPROVING NETWORK SECURITY AGAINST CYBER ATTACK BASED ON INTELLIGENT ALGORITHMS." Journal of Engineering and Sustainable Development 28, no. 3 (2024): 342–54. http://dx.doi.org/10.31272/jeasd.28.3.4.
Der volle Inhalt der QuelleKACHYNSKYI, A., D. VARYCHEVA, and S. SVYRYDENKO. "Quantitative assessments of cyber security system priorities." INFORMATION AND LAW, no. 2(17) (June 29, 2016): 114–26. http://dx.doi.org/10.37750/2616-6798.2016.2(17).272912.
Der volle Inhalt der QuelleSon, Vu Ngoc. "Optimizing Network Anomaly Detection Based on Network Traffic." International Journal of Emerging Technology and Advanced Engineering 11, no. 11 (2021): 53–60. http://dx.doi.org/10.46338/ijetae1121_07.
Der volle Inhalt der QuelleAmin, Reham, Ghada El-Taweel, Ahmed Fouad Ali, and Mohamed Tahoun. "A Hybrid Extreme Gradient Boosting and Long Short-Term Memory Algorithm for Cyber Threats Detection." MENDEL 29, no. 2 (2023): 307–22. http://dx.doi.org/10.13164/mendel.2023.2.307.
Der volle Inhalt der QuelleJin, Zengwang, Menglu Ma, Shuting Zhang, Yanyan Hu, Yanning Zhang, and Changyin Sun. "Secure State Estimation of Cyber-Physical System under Cyber Attacks: Q-Learning vs. SARSA." Electronics 11, no. 19 (2022): 3161. http://dx.doi.org/10.3390/electronics11193161.
Der volle Inhalt der QuelleKorystin, Оleksandr, Svyrydiuk Nataliia, and Olena Mitina. "Risk Forecasting of Data Confidentiality Breach Using Linear Regression Algorithm." International Journal of Computer Network and Information Security 14, no. 4 (2022): 1–13. http://dx.doi.org/10.5815/ijcnis.2022.04.01.
Der volle Inhalt der QuelleLiu, Xin-Rui, Yuan Meng, and Peng Chang. "Node Importance Evaluation of Cyber-Physical System under Cyber-Attacks Spreading." Complexity 2021 (January 16, 2021): 1–15. http://dx.doi.org/10.1155/2021/6641030.
Der volle Inhalt der QuelleChoi, Young Hwan, Ali Sadollah, and Joong Hoon Kim. "Improvement of Cyber-Attack Detection Accuracy from Urban Water Systems Using Extreme Learning Machine." Applied Sciences 10, no. 22 (2020): 8179. http://dx.doi.org/10.3390/app10228179.
Der volle Inhalt der QuelleWan Ahmad Ramzi W.Y, Aznizah Ab.Karim, Mohamad Shaufi Kambaruddin, Afzanizam Alias, and Mohd Faizal Yahaya. "Formulating Tracing and Linking Algorithm For Identifying Cyber Terrorism Website." International Journal of Mechanical, Electrical and Civil Engineering 2, no. 2 (2025): 25–34. https://doi.org/10.61132/ijmecie.v2i2.266.
Der volle Inhalt der QuelleKolosok, Irina, and Liudmila Gurina. "Assessment of Cyber Resilience Indices of Information Collection and Processing Systems in Electric Power Systems Based on Semi-Markov Models." Voprosy kiberbezopasnosti, no. 6(46) (2021): 2–11. http://dx.doi.org/10.21681/2311-3456-2021-6-2-11.
Der volle Inhalt der QuelleCharnanand, Dr Bhumika, and Chetan Rathod. "Various Cyber - Attack on Encryption Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 1929–32. http://dx.doi.org/10.22214/ijraset.2023.55512.
Der volle Inhalt der QuellePremsai, Ranga. "IMPLEMENTING IDENTITY AND ACCESS MANAGEMENT FOR IMPROVING CYBER SECURITY." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01283.
Der volle Inhalt der QuelleDesamsetti, Harshith. "Utilizing Deep Learning to Identify Potentially Dangerous Routing Attacks in the IoT." ABC Journal of Advanced Research 11, no. 2 (2022): 103–14. http://dx.doi.org/10.18034/abcjar.v11i2.699.
Der volle Inhalt der QuelleSharman, Ken, Javier Coronel, and Sergio Sáez. "Design Space Exploration using Evolutionary Optimisation in Cyber-Physical Systems: A Smart Port Case Study." ACM SIGAda Ada Letters 44, no. 2 (2025): 76–80. https://doi.org/10.1145/3742939.3742952.
Der volle Inhalt der QuelleNote, Johan, and Maaruf Ali. "Comparative Analysis of Intrusion Detection System Using Machine Learning and Deep Learning Algorithms." Annals of Emerging Technologies in Computing 6, no. 3 (2022): 19–36. http://dx.doi.org/10.33166/aetic.2022.03.003.
Der volle Inhalt der QuellePrasetyo, Stefanus Eko, Haeruddin Haeruddin, and Arron . "Phishing Website Detection Using the Decision Tree Algorithm Method." Jurnal E-Komtek (Elektro-Komputer-Teknik) 8, no. 2 (2024): 454–65. https://doi.org/10.37339/e-komtek.v8i2.2167.
Der volle Inhalt der QuelleYang, Tingting, Hailong Feng, Jian Zhao, Ruilong Deng, Ying Wang, and Zhou Su. "Genetic optimization–based scheduling in maritime cyber physical systems." International Journal of Distributed Sensor Networks 13, no. 7 (2017): 155014771771716. http://dx.doi.org/10.1177/1550147717717163.
Der volle Inhalt der QuelleJena, Tamanna, Achyut Shankar, and Adyesha Singhdeo. "Harnessing Machine Learning for Effective Cyber security Classifiers." Asian Journal of Research in Computer Science 16, no. 4 (2023): 453–64. http://dx.doi.org/10.9734/ajrcos/2023/v16i4405.
Der volle Inhalt der QuelleRouhani, Seyed Hossein, Hamed Mojallali, and Alfred Baghramian. "Load frequency control in the presence of simultaneous cyber-attack and participation of demand response program." Transactions of the Institute of Measurement and Control 44, no. 10 (2022): 1993–2011. http://dx.doi.org/10.1177/01423312211068645.
Der volle Inhalt der QuelleZaki, Ahmed Mohamed, Abdelaziz A. Abdelhamid, Abdelhameed Ibrahim, Marwa M. Eid, and El-Sayed M. El El-Kenawy. "Metaheuristic Optimization for Enhancing Cyber Security Index Prediction: A DTO+FGW Approach with MLP Integration." International Journal of Advances in Applied Computational Intelligence 4, no. 2 (2023): 15–25. http://dx.doi.org/10.54216/ijaaci.040202.
Der volle Inhalt der QuelleAchar, Sandesh, Nuruzzaman Faruqui, Md Whaiduzzaman, Albara Awajan, and Moutaz Alazab. "Cyber-Physical System Security Based on Human Activity Recognition through IoT Cloud Computing." Electronics 12, no. 8 (2023): 1892. http://dx.doi.org/10.3390/electronics12081892.
Der volle Inhalt der QuelleJagdish F. Pimple, Et al. "Elevating Security Measures in Cyber-Physical Systems: Deep Neural Network-Based Anomaly Detection with Ethereum Blockchain for Enhanced Data Integrity." Journal of Electrical Systems 19, no. 2 (2024): 105–15. http://dx.doi.org/10.52783/jes.696.
Der volle Inhalt der QuelleGupta, Amit. "Security Algorithm Design and Development for Cyber-Physical Systems against Cyber-Attacks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 3 (2018): 1170–77. http://dx.doi.org/10.17762/turcomat.v9i3.13908.
Der volle Inhalt der QuelleP, Karunakaran. "Deep Learning Approach to DGA Classification for Effective Cyber Security." December 2020 2, no. 4 (2021): 203–13. http://dx.doi.org/10.36548/jucct.2020.4.003.
Der volle Inhalt der QuelleRameshwar Saraf, Kundankumar, and P. Malathi. "Security enhancement of cyber-physical system using modified encryption AESGNRSA technique." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 2 (2024): 1177. http://dx.doi.org/10.11591/ijeecs.v33.i2.pp1177-1185.
Der volle Inhalt der QuelleSaraf, Kundankumar Rameshwar, and P. Malathi. "Security enhancement of cyber-physical system using modified encryption AESGNRSA technique." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 2 (2024): 1177–85. https://doi.org/10.11591/ijeecs.v33.i2.pp1177-1185.
Der volle Inhalt der QuelleDesianty, Annisa, and Imelda Imelda. "Systematic Literature Review: Cybersecurity by Utilizing Cryptography Using the Data Encryption Standard (DES) Algorithm." JURNAL TEKNIK INFORMATIKA 17, no. 1 (2024): 30–39. http://dx.doi.org/10.15408/jti.v17i1.37256.
Der volle Inhalt der QuelleOh, Sang Ho, Jeongyoon Kim, Jae Hoon Nah, and Jongyoul Park. "Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity." Electronics 13, no. 3 (2024): 555. http://dx.doi.org/10.3390/electronics13030555.
Der volle Inhalt der QuelleSaleh, Hadeel M., Abdulrahman Kareem Oleiwi, and Ahmed Abed Hwaidi Abed. "Detecting attacks in banks by cyber security: an applied study." Babylonian Journal of Machine Learning 2023 (November 14, 2023): 65–72. https://doi.org/10.58496/bjml/2023/011.
Der volle Inhalt der QuelleDo, ChoXuan, Nguyen Quang Dam, and Nguyen Tung Lam. "Optimization of network traffic anomaly detection using machine learning." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 3 (2021): 2360. http://dx.doi.org/10.11591/ijece.v11i3.pp2360-2370.
Der volle Inhalt der QuelleAgrawal, Aniruddha, and Shaik Affijulla. "A concept for discrimination of electrical fault from cyber attack in smart electric grid." Journal of Electrical Engineering 73, no. 4 (2022): 299–304. http://dx.doi.org/10.2478/jee-2022-0039.
Der volle Inhalt der QuelleRai, Khushbu, and Dr Megha Kamble. "Reviewing a New Optimized an ANFIS-Based Framework for Detecting Intrusion Detection System with Machine Learning Algorithms (Deep Learning Algorithm)." International Journal of Engineering and Advanced Technology 12, no. 3 (2023): 35–42. http://dx.doi.org/10.35940/ijeat.b3916.0212323.
Der volle Inhalt der QuelleKhushbu, Rai, and Megha Kamble Dr. "Reviewing a New Optimized an ANFIS-Based Framework for Detecting Intrusion Detection System with Machine Learning Algorithms (Deep Learning Algorithm)." International Journal of Engineering and Advanced Technology (IJEAT) 12, no. 3 (2023): 35–42. https://doi.org/10.35940/ijeat.B3916.0212323.
Der volle Inhalt der QuelleBanasode, Ms Swapna S., Nidhi K. V, Sabhareesh Balaji P, Tanvi Kamath, and Tushar S. "Cyber Bullying." International Journal for Research in Applied Science and Engineering Technology 11, no. 11 (2023): 1057–60. http://dx.doi.org/10.22214/ijraset.2023.56676.
Der volle Inhalt der QuelleGurina, Liudmila. "Assessment of Cyber Resilience of Operational Dispatch Control System of EPS." Voprosy kiberbezopasnosti, no. 3(49) (2022): 23–31. http://dx.doi.org/10.21681/2311-3456-2022-3-23-31.
Der volle Inhalt der QuelleRanjane, Gayatri Dattatraya, Vishwa Hiteshkumar Joshi, and Priyanshi Lokesh Kumar Singhal. "Cyberattack Analysis, Detection and Prevention using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 1224–33. http://dx.doi.org/10.22214/ijraset.2024.60026.
Der volle Inhalt der QuelleYin, Peng-Yeng, Po-Yen Chen, Ying-Chieh Wei, and Rong-Fuh Day. "Cyber Firefly Algorithm Based on Adaptive Memory Programming for Global Optimization." Applied Sciences 10, no. 24 (2020): 8961. http://dx.doi.org/10.3390/app10248961.
Der volle Inhalt der QuelleMa, Wu Bin, Ming Xing Liu, Su Deng, and Hong Bin Huang. "A Spatial Resource Top-K Query Algorithm in Cyber Physical System." Advanced Materials Research 774-776 (September 2013): 1725–28. http://dx.doi.org/10.4028/www.scientific.net/amr.774-776.1725.
Der volle Inhalt der QuelleJaveed, Danish, Tianhan Gao, and Muhammad Taimoor Khan. "SDN-Enabled Hybrid DL-Driven Framework for the Detection of Emerging Cyber Threats in IoT." Electronics 10, no. 8 (2021): 918. http://dx.doi.org/10.3390/electronics10080918.
Der volle Inhalt der QuellePerumal, Senthilkumar, and Kumaresan Devarajan. "Comparative Performance Analysis of Machine Learning Algorithms: Random Cut Forest, Robust Random Cut Forest, and Amazon Sage Maker Random Cut Forest for Intrusion Detection Systems Using the CIS IDS 2017 Dataset." Turkish Journal of Engineering 9, no. 3 (2025): 535–34. https://doi.org/10.31127/tuje.1614930.
Der volle Inhalt der QuelleN, Valliammal, and Barani Shaju. "Deep learning algorithm based cyber-attack detection in cyber-physical systems-a survey." International Journal of Advanced Technology and Engineering Exploration 5, no. 49 (2018): 489–94. http://dx.doi.org/10.19101/ijatee.2018.547030.
Der volle Inhalt der QuelleAlmajed, Rasha, Amer Ibrahim, Abedallah Zaid Abualkishik, Nahia Mourad, and Faris A Almansour. "Using machine learning algorithm for detection of cyber-attacks in cyber physical systems." Periodicals of Engineering and Natural Sciences (PEN) 10, no. 3 (2022): 261. http://dx.doi.org/10.21533/pen.v10i3.3035.
Der volle Inhalt der QuelleAlrowais, Fadwa, Heba G. Mohamed, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, and Abdelwahed Motwakel. "Cyber attack detection in healthcare data using cyber-physical system with optimized algorithm." Computers and Electrical Engineering 108 (May 2023): 108636. http://dx.doi.org/10.1016/j.compeleceng.2023.108636.
Der volle Inhalt der QuelleAlmajed, Rasha, Amer Ibrahim, Abedallah Zaid Abualkishik, Nahia Mourad, and Faris A. Almansour. "Using machine learning algorithm for detection of cyber-attacks in cyber physical systems." Periodicals of Engineering and Natural Sciences (PEN) 10, no. 3 (2022): 261–75. https://doi.org/10.21533/pen.v10.i3.661.
Der volle Inhalt der QuelleAbdel-Basset, Mohamed, Reda Mohamed, Nazeeruddin Mohammad, Karam Sallam, and Nour Moustafa. "An Adaptive Cuckoo Search-Based Optimization Model for Addressing Cyber-Physical Security Problems." Mathematics 9, no. 10 (2021): 1140. http://dx.doi.org/10.3390/math9101140.
Der volle Inhalt der QuelleKozik, Rafał, and Michał Choraś. "Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection." Security and Communication Networks 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/6047053.
Der volle Inhalt der QuelleAlbakri, Ashwag, Bayan Alabdullah, and Fatimah Alhayan. "Blockchain-Assisted Machine Learning with Hybrid Metaheuristics-Empowered Cyber Attack Detection and Classification Model." Sustainability 15, no. 18 (2023): 13887. http://dx.doi.org/10.3390/su151813887.
Der volle Inhalt der Quelle