Academic literature on the topic 'Attack Detection Automation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attack Detection Automation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Attack Detection Automation"
Wressnegger, Christian. "Efficient machine learning for attack detection." it - Information Technology 62, no. 5-6 (2020): 279–86. http://dx.doi.org/10.1515/itit-2020-0015.
Full textBeshah, Yonas Kibret, Surafel Lemma Abebe, and Henock Mulugeta Melaku. "Drift Adaptive Online DDoS Attack Detection Framework for IoT System." Electronics 13, no. 6 (2024): 1004. http://dx.doi.org/10.3390/electronics13061004.
Full textOkello, Fredrick Ochieng, Dennis Kaburu, and Ndia G. John. "Automation-Based User Input Sql Injection Detection and Prevention Framework." Computer and Information Science 16, no. 2 (2023): 51. http://dx.doi.org/10.5539/cis.v16n2p51.
Full textVennapureddy, Rajasree, and T. Srinivasulu. "Pragmatic Study of Botnet Attack Detection In An IoT Environment." E3S Web of Conferences 591 (2024): 09012. http://dx.doi.org/10.1051/e3sconf/202459109012.
Full textHoush, Mashor, Noy Kadosh, and Jack Haddad. "Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks." Sensors 22, no. 16 (2022): 6035. http://dx.doi.org/10.3390/s22166035.
Full textYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang, and Zhihao Liang. "Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study." Transactions on Computer Science and Intelligent Systems Research 3 (April 10, 2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.
Full textKarthik Krishnan, T., S. Sridevi, G. Bindu, and R. Anandan. "Comparison and detail study of attacks and detection methods for wireless sensor network." International Journal of Engineering & Technology 7, no. 2.21 (2018): 405. http://dx.doi.org/10.14419/ijet.v7i2.21.12453.
Full textBinbusayyis, Adel. "Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers." Mathematics 12, no. 11 (2024): 1720. http://dx.doi.org/10.3390/math12111720.
Full textSztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny, and Zuzanna Górecka. "Controller Cyber-Attack Detection and Isolation." Sensors 23, no. 5 (2023): 2778. http://dx.doi.org/10.3390/s23052778.
Full textAlmedires, Motaz Abdulaziz, Ahmed Elkhalil, and Mohammed Amin. "Adversarial Attack Detection in Industrial Control Systems Using LSTM-Based Intrusion Detection and Black-Box Defense Strategies." Journal of Cyber Security and Risk Auditing 2025, no. 3 (2025): 4–22. https://doi.org/10.63180/jcsra.thestap.2025.3.2.
Full textDissertations / Theses on the topic "Attack Detection Automation"
Toure, Almamy. "Collection, analysis and harnessing of communication flows for cyber-attack detection." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Full textŠtangler, Jan. "Architektura a správa zabezpečených sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413065.
Full textNama, Sumanth. "Detecting attacks in building automation system." Thesis, California State University, Long Beach, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1597784.
Full textYadav, Tarun Kumar. "Automatic Detection and Prevention of Fake Key Attacks in Signal." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/9072.
Full textGiunta, Alberto. "Implementazione e analisi comparativa di tecniche di Face Morphing Detection." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17029/.
Full textGill, Rupinder S. "Intrusion detection techniques in wireless local area networks." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/29351/1/Rupinder_Gill_Thesis.pdf.
Full textGill, Rupinder S. "Intrusion detection techniques in wireless local area networks." Queensland University of Technology, 2009. http://eprints.qut.edu.au/29351/.
Full textBláha, Lukáš. "Analýza automatizovaného generování signatur s využitím Honeypotu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236430.
Full textLin, Yu-Ren, and 林育任. "Automatic Construction of Primitive Attack Templates for Primitive Attack-based Heterogeneous Intrusion Detection." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/50928028528463091853.
Full textLiang, Ti-Hung, and 梁滌宏. "A Study on Network ARP Attack Detection, Prevention and Automatic Connection Restoration." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/21127536084053917591.
Full textBook chapters on the topic "Attack Detection Automation"
Alsabbagh, Wael, and Peter Langendoerfer. "A Remote Attack Tool Against Siemens S7-300 Controllers: A Practical Report." In Technologien für die intelligente Automation. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64283-2_1.
Full textZhang, Yanjing, Jianming Cui, and Ming Liu. "Research on Adversarial Patch Attack Defense Method for Traffic Sign Detection." In Communications in Computer and Information Science. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_15.
Full textDoniyorbek, Usmanbayev, and Bozorov Suhrobjon. "Analysis of Algorithm of Binary Classifiers to Improve Attack Detection Systems." In 12th World Conference “Intelligent System for Industrial Automation” (WCIS-2022). Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-51521-7_12.
Full textFritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.
Full textWurzenberger, Markus, Max Landauer, Agron Bajraktari, and Florian Skopik. "Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_7.
Full textHoyos, Isaias, Bruno Esposito, and Miguel Nunez-del-Prado. "DETECTOR: Automatic Detection System for Terrorist Attack Trajectories." In Information Management and Big Data. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11680-4_17.
Full textLebrun, Stéphanie, Stéphane Kaloustian, Raphaël Rollier, and Colin Barschel. "GNSS Positioning Security: Automatic Anomaly Detection on Reference Stations." In Critical Information Infrastructures Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93200-8_4.
Full textYang, Xu, Qian Li, Cong Li, and Yong Qi. "Robust Malware Detection System Against Adversarial Attacks." In Advances in Intelligent Automation and Soft Computing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81007-8_122.
Full textPerkins, Jeff, Jordan Eikenberry, Alessandro Coglio, Daniel Willenson, Stelios Sidiroglou-Douskos, and Martin Rinard. "AutoRand: Automatic Keyword Randomization to Prevent Injection Attacks." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40667-1_3.
Full textJin, Shuyuan, Zhi Yang, and Xiang Cui. "Automatic Covert Channel Detection in Asbestos System (Poster Abstract)." In Research in Attacks, Intrusions, and Defenses. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33338-5_22.
Full textConference papers on the topic "Attack Detection Automation"
Ghamarilangroudi, Azam, Shahin Hashtrudi Zad, and Youmin Zhang. "Replay Attack Detection using Switching Multi-sine Watermarking." In 2025 33rd Mediterranean Conference on Control and Automation (MED). IEEE, 2025. https://doi.org/10.1109/med64031.2025.11073356.
Full textLi, Mingyang, Wei Zhang, Yadong Wang, et al. "CFA: Consistent Feature Attribution for Black-Box Adversarial Attack Against Object Detection." In 2024 China Automation Congress (CAC). IEEE, 2024. https://doi.org/10.1109/cac63892.2024.10864831.
Full textZhang, Ruo, Guiqin Yang, and Wei Zhang. "DDoS Attack Detection System Based on GBDT Under SDN." In 2024 IEEE 7th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 2024. http://dx.doi.org/10.1109/itnec60942.2024.10733143.
Full textZhang, Wei, Guiqin Yang, and Ruo Zhang. "DDoS Attack Detection Based on Rényi-RF in SDN Environment." In 2024 IEEE 7th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 2024. http://dx.doi.org/10.1109/itnec60942.2024.10733276.
Full textZhu, Mengjiang, Tianfu Xu, Qun He, et al. "Research on APT Attack Detection Methods for Power Information Systems." In 2024 IEEE 7th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 2024. http://dx.doi.org/10.1109/itnec60942.2024.10733125.
Full textRajmohan, R., A. Meiappane, Chirag Gupta, and Shivam Bhavsar. "Intelligent SSH Attack Detection Model Using K-Clique Clustering and Reinforcement Learning." In 2024 International Conference on System, Computation, Automation and Networking (ICSCAN). IEEE, 2024. https://doi.org/10.1109/icscan62807.2024.10894529.
Full textHuang, Siyu, Chen Ma, Yinhao Wang, Aibing Qiu, and Jingfeng Mao. "Model-Based Covert Cyber-Attack Detection for Cooling System in Data Center." In 2024 7th International Conference on Robotics, Control and Automation Engineering (RCAE). IEEE, 2024. https://doi.org/10.1109/rcae62637.2024.10834175.
Full textGómez, Álvaro Martín, Sina Hassani, and Rafał Wiśniewski. "Reference Model-Based Cyber-Attack Detection for Wind Turbine Systems with Polytopic Uncertainties." In 2025 33rd Mediterranean Conference on Control and Automation (MED). IEEE, 2025. https://doi.org/10.1109/med64031.2025.11073450.
Full textDesnitsky, Vasily, and Alexey Meleshko. "Modeling and Analysis of Secure Blockchain-Driven Self-Organized Decentralized Wireless Sensor Networks for Attack Detection." In 2024 International Russian Automation Conference (RusAutoCon). IEEE, 2024. http://dx.doi.org/10.1109/rusautocon61949.2024.10694225.
Full textLudun, Liu. "Research on Communication Network Attack Detection and Defense Mechanism Based on Deep Learning." In 2024 IEEE 7th International Conference on Automation, Electronics and Electrical Engineering (AUTEEE). IEEE, 2024. https://doi.org/10.1109/auteee62881.2024.10869774.
Full textReports on the topic "Attack Detection Automation"
Berney, Ernest, Naveen Ganesh, Andrew Ward, J. Newman, and John Rushing. Methodology for remote assessment of pavement distresses from point cloud analysis. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/40401.
Full textPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full text