Journal articles on the topic 'Attack Detection Automation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Attack Detection Automation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wressnegger, Christian. "Efficient machine learning for attack detection." it - Information Technology 62, no. 5-6 (2020): 279–86. http://dx.doi.org/10.1515/itit-2020-0015.
Full textBeshah, Yonas Kibret, Surafel Lemma Abebe, and Henock Mulugeta Melaku. "Drift Adaptive Online DDoS Attack Detection Framework for IoT System." Electronics 13, no. 6 (2024): 1004. http://dx.doi.org/10.3390/electronics13061004.
Full textOkello, Fredrick Ochieng, Dennis Kaburu, and Ndia G. John. "Automation-Based User Input Sql Injection Detection and Prevention Framework." Computer and Information Science 16, no. 2 (2023): 51. http://dx.doi.org/10.5539/cis.v16n2p51.
Full textVennapureddy, Rajasree, and T. Srinivasulu. "Pragmatic Study of Botnet Attack Detection In An IoT Environment." E3S Web of Conferences 591 (2024): 09012. http://dx.doi.org/10.1051/e3sconf/202459109012.
Full textHoush, Mashor, Noy Kadosh, and Jack Haddad. "Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks." Sensors 22, no. 16 (2022): 6035. http://dx.doi.org/10.3390/s22166035.
Full textYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang, and Zhihao Liang. "Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study." Transactions on Computer Science and Intelligent Systems Research 3 (April 10, 2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.
Full textKarthik Krishnan, T., S. Sridevi, G. Bindu, and R. Anandan. "Comparison and detail study of attacks and detection methods for wireless sensor network." International Journal of Engineering & Technology 7, no. 2.21 (2018): 405. http://dx.doi.org/10.14419/ijet.v7i2.21.12453.
Full textBinbusayyis, Adel. "Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers." Mathematics 12, no. 11 (2024): 1720. http://dx.doi.org/10.3390/math12111720.
Full textSztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny, and Zuzanna Górecka. "Controller Cyber-Attack Detection and Isolation." Sensors 23, no. 5 (2023): 2778. http://dx.doi.org/10.3390/s23052778.
Full textAlmedires, Motaz Abdulaziz, Ahmed Elkhalil, and Mohammed Amin. "Adversarial Attack Detection in Industrial Control Systems Using LSTM-Based Intrusion Detection and Black-Box Defense Strategies." Journal of Cyber Security and Risk Auditing 2025, no. 3 (2025): 4–22. https://doi.org/10.63180/jcsra.thestap.2025.3.2.
Full textDe La Cruz, Arvin, Florante Sangrenes, Glen Maquiran, Jonicio Dacuya, Davie Rose Taya-an, and Rey Oronos Jr. "Machine Learning-Enabled Detection of Remote Manipulation Attacks on Integrated Circuits in Hybrid AGV-Drone Systems." Technologique: A Global Journal on Technological Developments and Scientific Innovations 4, no. 1 (2025): 1–18. https://doi.org/10.62718/vmca.tech-gjtdsi.3.1.sc-0125-020.
Full textKim, Ye-Eun, Yea-Sul Kim, and Hwankuk Kim. "Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network." Sensors 22, no. 10 (2022): 3819. http://dx.doi.org/10.3390/s22103819.
Full textOruganti, Rakesh, Jeeshitha J, and Rama Koteswara Rao G. "A Extensive Study on DDosBotnet Attacks in Multiple Environments Using Deep Learning and Machine Learning Techniques." ECS Transactions 107, no. 1 (2022): 15181–93. http://dx.doi.org/10.1149/10701.15181ecst.
Full textLeal Piedrahita, Erwin Alexander. "Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations." Ciencia e Ingeniería Neogranadina 30, no. 1 (2019): 75–88. http://dx.doi.org/10.18359/rcin.4236.
Full textAlotaibi, Nouf Saeed, Hassan Ibrahim Ahmed, and Samah Osama M. Kamel. "Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City." Sensors 23, no. 16 (2023): 7135. http://dx.doi.org/10.3390/s23167135.
Full textAslam, Muhammad Muzamil, Zahoor Ahmed, Liping Du, Muhammad Zohaib Hassan, Sajid Ali, and Muhammad Nasir. "An Overview of Recent Advances of Resilient Consensus for Multiagent Systems under Attacks." Computational Intelligence and Neuroscience 2022 (August 2, 2022): 1–26. http://dx.doi.org/10.1155/2022/6732343.
Full textHtwe, Chaw Su, Zin Thu Thu Myint, and Yee Mon Thant. "IoT Security Using Machine Learning Methods with Features Correlation." Journal of Computing Theories and Applications 2, no. 2 (2024): 151–63. http://dx.doi.org/10.62411/jcta.11179.
Full textAlkahtani, Hasan, and Theyazn H. H. Aldhyani. "Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems." Electronics 11, no. 11 (2022): 1717. http://dx.doi.org/10.3390/electronics11111717.
Full textNIKLEKAJ, Malvina, and Elfat MEMAJ. "Analyzing and Mitigating Distributed Denial-of-Service (DDoS) Attacks - A Python-Based Simulation Approach." INGENIOUS 5, no. 1 (2025): 20–36. https://doi.org/10.58944/adif5937.
Full textOluwakemi, Oduwole Omolara, Muhammad, Umar Abdullahi, and Kene Tochukwu Anyachebelu. "Comparative Evaluation of Machine Learning Algorithms for Intrusion Detection." Asian Journal of Research in Computer Science 16, no. 4 (2023): 8–22. http://dx.doi.org/10.9734/ajrcos/2023/v16i4366.
Full textKhalid, Nashmia, Sadaf Hina, Khurram Shabih Zaidi, Tarek Gaber, Lee Speakman, and Zainab Noor. "An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks." PLOS ONE 20, no. 1 (2025): e0306747. https://doi.org/10.1371/journal.pone.0306747.
Full textNoor, Hisham Kamis, Yassin Warusia, Faizal Abdollah Mohd, Fatimah Abdul Razak Siti, and Yogarayan Sumendra. "Blackhole attacks in internet of things networks: a review." Blackhole attacks in internet of things networks: a review 30, no. 2 (2023): 1080–90. https://doi.org/10.11591/ijeecs.v30.i2.pp1080-1090.
Full textChoi, In-Sun, Junho Hong, and Tae-Wan Kim. "Multi-Agent Based Cyber Attack Detection and Mitigation for Distribution Automation System." IEEE Access 8 (2020): 183495–504. http://dx.doi.org/10.1109/access.2020.3029765.
Full textDAMANIK, HILLMAN AKHYAR, and MERRY ANGGRAENI. "Pola Pengelompokan dan Pencegahan Public Honeypot menggunakan Teknik K-Means dan Automation Shell-Script." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 12, no. 1 (2024): 65. http://dx.doi.org/10.26760/elkomika.v12i1.65.
Full textThompson, Aderonke, and Jani Suomalainen. "GAOR: Genetic Algorithm-Based Optimization for Machine Learning Robustness in Communication Networks." Network 5, no. 1 (2025): 6. https://doi.org/10.3390/network5010006.
Full textAlshamsi, Omar, Khaled Shaalan, and Usman Butt. "Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach." Information 15, no. 10 (2024): 631. http://dx.doi.org/10.3390/info15100631.
Full textMohit Angurala. "Enhancing Cybersecurity in Wireless Sensor Networks: AI Solutions to Simulated Attacks." Journal of Information Systems Engineering and Management 10, no. 3s (2025): 217–29. https://doi.org/10.52783/jisem.v10i3s.373.
Full textWei, Min, Kee Wook Rim, and Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks." Applied Mechanics and Materials 121-126 (October 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.
Full textVinay Tila Patil. "Deep Learning-Driven IoT Defence: Comparative Analysis of CNN and LSTM for DDoS Detection and Mitigation." Journal of Information Systems Engineering and Management 10, no. 8s (2025): 08–21. https://doi.org/10.52783/jisem.v10i8s.951.
Full textKasturi, Santanam, Xiaolong Li, Peng Li, and John Pickard. "A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems." American Journal of Networks and Communications 13, no. 1 (2024): 19–29. http://dx.doi.org/10.11648/j.ajnc.20241301.12.
Full textLu, Kang-Di, Guo-Qiang Zeng, Xizhao Luo, Jian Weng, Weiqi Luo, and Yongdong Wu. "Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System." IEEE Transactions on Industrial Informatics 17, no. 11 (2021): 7618–27. http://dx.doi.org/10.1109/tii.2021.3053304.
Full textGopi R. "Cyber-Physical System Defense Against Structured False Data Injection Attacks Using an Adaptive Security Framework with Passivity Enhancement." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 234–44. https://doi.org/10.52783/jisem.v10i43s.8360.
Full textKhan, Zulfiqar Ali, and Akbar Siami Namin. "A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology." Electronics 11, no. 23 (2022): 3892. http://dx.doi.org/10.3390/electronics11233892.
Full textGuo, Hui Ling. "Research on Rule Extraction Technology Based on Genetic Algorithm in Intrusion Detection." Advanced Materials Research 760-762 (September 2013): 857–61. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.857.
Full textMeleshko, Alexey, Anton Shulepov, Vasily Desnitsky, Evgenia Novikova, and Igor Kotenko. "Visualization Assisted Approach to Anomaly and Attack Detection in Water Treatment Systems." Water 14, no. 15 (2022): 2342. http://dx.doi.org/10.3390/w14152342.
Full textSun, Zhong, and Xinchun Jie. "Research on Attack Node Localization in Cyber–Physical Systems Based on Residual Analysis and Cooperative Game Theory." Electronics 14, no. 15 (2025): 2943. https://doi.org/10.3390/electronics14152943.
Full textSayali Renuse. "Enhancing IoT Security with Activity-Based Attack Modeling and Hybrid Classification Techniques." Panamerican Mathematical Journal 34, no. 1 (2024): 1–13. http://dx.doi.org/10.52783/pmj.v34.i1.900.
Full textAakarsh Mavi. "Bridging the Gap: Cybersecurity Automation for Legacy Manufacturing Systems." Journal of Information Systems Engineering and Management 10, no. 30s (2025): 21–33. https://doi.org/10.52783/jisem.v10i30s.4768.
Full textBarletta, Vita Santa, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera, and Manuel Ángel Serrano Martín. "V-SOC4AS: A Vehicle-SOC for Improving Automotive Security." Algorithms 16, no. 2 (2023): 112. http://dx.doi.org/10.3390/a16020112.
Full textHan-Mei Liu. "AI-Enabled Adaptive Cybersecurity Response Using Reinforcement Learning." Frontiers in Artificial Intelligence Research 2, no. 1 (2025): 1–12. https://doi.org/10.71465/gwa30h81.
Full textT, Sowmika, Rohith Paul L, and Malathi G. "IOT Based Smart Rodent Detection and Fire Alert System in Farmland." International Research Journal of Multidisciplinary Technovation 2, no. 3 (2020): 1–6. http://dx.doi.org/10.34256/irjmt2031.
Full textB, Vivekanadam. "IoT based Smart Grid Attack Resistance in AC and DC State Estimation." Journal of Electrical Engineering and Automation 2, no. 3 (2021): 118–22. http://dx.doi.org/10.36548/jeea.2020.3.002.
Full textRao, Alwal Keerthan, and T. Rajashekar Reddy. "AUTONOMOUS MISSILE DEFENSE SYSTEM: INTEGRATING ADVANCED SONAR-BASED TRACKING FOR PRECISE DETECTION." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 14, no. 2 (2023): 1055–60. http://dx.doi.org/10.61841/turcomat.v14i2.14332.
Full textIlokanuno, Ogochukwu A. "Smart Meter Tampering Detection Using IoT Based Unsupervised Machine Learning." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 5434–45. http://dx.doi.org/10.22214/ijraset.2024.61153.
Full textToliupa, Serhii, and Maksym Kotov. "PROTECTION MODEL AGAINST DISTRIBUTED GRADUAL DEGRADATION ATTACKS BASED ON STATISTICAL AND SEMANTIC APPROACHES." Information systems and technologies security, no. 2 (8) (2024): 26–33. https://doi.org/10.17721/ists.2024.8.26-33.
Full textFeng, Tao, and Bugang Zhang. "Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB." Information 14, no. 12 (2023): 653. http://dx.doi.org/10.3390/info14120653.
Full textDinkar, Amit Kumar, and Ajay Kumar Choudhary. "Exploring Intrusion Detection Systems (IDS) in IoT Environments." Seminars in Medical Writing and Education 3 (December 30, 2024): 552. https://doi.org/10.56294/mw2024552.
Full textDaniel, Nir, Florian Klaus Kaiser, Shay Giladi, et al. "Labeling Network Intrusion Detection System (NIDS) Rules with MITRE ATT&CK Techniques: Machine Learning vs. Large Language Models." Big Data and Cognitive Computing 9, no. 2 (2025): 23. https://doi.org/10.3390/bdcc9020023.
Full textAlNusif, Mohammed. "Emerging Threats in Cybersecurity: A Comprehensive Analysis of DDoS and Social Engineering Attacks." International Journal of Engineering and Computer Science 14, no. 07 (2025): 27473–87. https://doi.org/10.18535/ijecs.v14i07.5185.
Full textLee, Juyoung, Yeonsu Jeong, Taehyun Han, and Taejin Lee. "LogRESP-Agent: A Recursive AI Framework for Context-Aware Log Anomaly Detection and TTP Analysis." Applied Sciences 15, no. 13 (2025): 7237. https://doi.org/10.3390/app15137237.
Full text