Academic literature on the topic 'Classification of Cyber- Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Classification of Cyber- Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Classification of Cyber- Attacks"
Geetha, G., Manjula Rajagopal, and K. Purnachand. "An intelligent hybrid model for cyber attack classification with selected feature set." Intelligent Decision Technologies 18, no. 3 (2024): 2191–212. http://dx.doi.org/10.3233/idt-240362.
Full textAbirami, A., S. Lakshmanaprakash, R. L. Priya, Vaishali Hirlekar, and Bhargavi Dalal. "Proactive Analysis and Detection of Cyber-attacks using Deep Learning Techniques." Indian Journal Of Science And Technology 17, no. 15 (2024): 1596–605. http://dx.doi.org/10.17485/ijst/v17i15.3044.
Full textMT, Suryadi, Achmad Eriza Aminanto, and Muhamad Erza Aminanto. "Empowering Digital Resilience: Machine Learning-Based Policing Models for Cyber-Attack Detection in Wi-Fi Networks." Electronics 13, no. 13 (2024): 2583. http://dx.doi.org/10.3390/electronics13132583.
Full textDasari, Kishore Babu, and Nagaraju Devarakonda. "Detection of DDoS Attacks Using Machine Learning Classification Algorithms." International Journal of Computer Network and Information Security 14, no. 6 (2022): 89–97. http://dx.doi.org/10.5815/ijcnis.2022.06.07.
Full textFarane Shradha, Gotane Rutuja, Chandanshive Sakshi, Agrawal Khushi, and Khandekar Srushti. "Detection of cyber-attacks and network attacks using Machine Learning." World Journal of Advanced Engineering Technology and Sciences 12, no. 1 (2024): 128–32. http://dx.doi.org/10.30574/wjaets.2024.12.1.0184.
Full textal-Khateeb, Haider, Rafael Salema Marques, Gregory Epiphaniou, and Carsten Maple. "Pivot Attack Classification for Cyber Threat Intelligence." Journal of Information Security and Cybercrimes Research 5, no. 2 (2022): 91–103. http://dx.doi.org/10.26735/zntl3639.
Full textA, Abirami, Lakshmanaprakash S, L. Priya R, Hirlekar Vaishali, and Dalal Bhargavi. "Proactive Analysis and Detection of Cyber-attacks using Deep Learning Techniques." Indian Journal of Science and Technology 17, no. 15 (2024): 1596–605. https://doi.org/10.17485/IJST/v17i15.3044.
Full textHasan Jarjis, Alend, Nassima Yousef Saleem Al Zubaidi, and Meltem Kurt Pehlivanoglu. "Cyber Attacks Classification on Enriching IoT Datasets." EAI Endorsed Transactions on Internet of Things 9, no. 3 (2023): e2. http://dx.doi.org/10.4108/eetiot.v9i3.3030.
Full textDasari, Kishore Babu, and Nagaraju Devarakonda. "Detection of Different DDoS Attacks Using Machine Learning Classification Algorithms." Ingénierie des systèmes d information 26, no. 5 (2021): 461–68. http://dx.doi.org/10.18280/isi.260505.
Full textKadirov, M. M. "АНАЛИЗ И КЛАССИФИКАЦИЯ КИБЕРАТАК НА ИНФОРМАЦИОННО-КОММУНИКАЦИОННЫЕ СИСТЕМЫ". Journal of Science and Innovative Development 6, № 4 (2023): 27–36. http://dx.doi.org/10.36522/2181-9637-2023-4-3.
Full textDissertations / Theses on the topic "Classification of Cyber- Attacks"
Lyn, Kevin G. "Classification of and resilience to cyber-attacks on cyber-physical systems." Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53926.
Full textThames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Full textHurst, William. "Behavioural observation for critical infrastructure security support." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4382/.
Full textKameníček, Lukáš. "Kybernetická bezpečnost z pohledu podnikové informatiky." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-264292.
Full textBedhammar, Jennifer, and Oliver Johansson. "Visualization of cyber security attacks." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167144.
Full textMasood, Ummi Hani Binti. "Countering cyber attacks in Malaysian law : assessing the concept of cyber attacks and the countermeasures." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/17787/.
Full textHätty, Niklas. "Representing attacks in a cyber range." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159838.
Full textLiivakant, André. "Web Warfare : NATO, Cyber-attacks and Territoriality." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-341302.
Full textDai, Pei-Ying. "Non-technical approaches to fighting cyber attacks." Thesis, University of Lincoln, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.685305.
Full textYermalovich, Pavel. "Risk estimation and prediction of cyber attacks." Doctoral thesis, Université Laval, 2021. http://hdl.handle.net/20.500.11794/67982.
Full textBooks on the topic "Classification of Cyber- Attacks"
Amoroso, Edward G. Cyber attacks: Protecting national infrastructure. Butterworth-Heinemann, 2012.
Find full textIglezakis, Ioannis. The legal regulation of cyber attacks. Kluwer Law International B. V., 2016.
Find full textBhardwaj, Akashdeep, and Varun Sapra, eds. Security Incidents & Response Against Cyber Attacks. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69174-5.
Full textAmoroso, Edward. Cyber Attacks: Protecting National Infrastructure. Elsevier Science & Technology Books, 2010.
Find full textStiennon, Richard. Cyber Defense: Countering Targeted Attacks. Rowman & Littlefield Publishers, Incorporated, 2012.
Find full textBook chapters on the topic "Classification of Cyber- Attacks"
Toms, Joel Mathew, Setareh Jalali Ghazaani, Sina Pournouri, and Eghe Ehiorobo. "Profiling Suspected Chinese Cyber Attacks by Classification Techniques." In Advanced Sciences and Technologies for Security Applications. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-20160-8_16.
Full textSpecht, Felix, and Jens Otto. "Hardening Deep Neural Networks in Condition Monitoring Systems against Adversarial Example Attacks." In Machine Learning for Cyber Physical Systems. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-62746-4_11.
Full textKapoor, Meet, Rishabh Aggarwal, and Suman Madan. "Cyber-Security: Critical Analysis on Attacks, Classification, and Issues." In Innovative Computing and Communications. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-3588-4_40.
Full textHasan, Basil Abbas Hasan, and Muhammad Ilyas. "Improving Classification Accuracy of Cyber Attacks in the Banking Sector." In Computational Intelligence, Data Analytics and Applications. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-27099-4_43.
Full textShahin, Mohammad, F. Chen, Hamed Bouzary, Ali Hosseinzadeh, and Rasoul Rashidifar. "Classification and Detection of Malicious Attacks in Industrial IoT Devices via Machine Learning." In Lecture Notes in Mechanical Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-18326-3_10.
Full textYang, Wenzhuo, and Kwok-Yan Lam. "Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC." In Information and Communications Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41579-2_9.
Full textKumar, Sheo, C. Syamsunda, R. Venkateswara Reddy, R. Suhasini, G. Vinoda Reddy, and Adepu Kiran Kumar. "Analysis on Identifying and Attributing of Cyber-Attacks in Cyber-Physical Classification Through Internet of Things." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-78949-6_37.
Full textAlsadi, Naseem, Hadis Karimipour, Ali Dehghantanha, and Gautam Srivastava. "A Recurrent Attention Model for Cyber Attack Classification." In AI-Enabled Threat Detection and Security Analysis for Industrial IoT. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76613-9_13.
Full textKandula, Pradeep, Monideepa Roy, Kuntal Ghosh, Budipi Nageswara Rao, and Sujoy Datta. "A Classification of Attacks in an IDS Using Sparse Convolutional Autoencoder and DNN." In Proceedings of 3rd International Conference on Smart Computing and Cyber Security. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0573-3_5.
Full textWass, Shannon, Sina Pournouri, and Gregg Ibbotson. "Prediction of Cyber Attacks During Coronavirus Pandemic by Classification Techniques and Open Source Intelligence." In Cybersecurity, Privacy and Freedom Protection in the Connected World. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68534-8_6.
Full textConference papers on the topic "Classification of Cyber- Attacks"
Bennet, Deepthi Tabitha, Preethi Samantha Bennet, Anitha Gracy J, and Sharmila P. "Combating Cyber Attacks by Malware Classification Using Deep Neural Networks." In 2024 International Conference on Intelligent & Innovative Practices in Engineering & Management (IIPEM). IEEE, 2024. https://doi.org/10.1109/iipem62726.2024.10925735.
Full textMaham, Salah Dine, Guy Pujolle, Atiq Ahmed, and Dominique Gaiti. "A New Similarity-Based Classification Scheme of Drone Network Attacks." In 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, 2024. https://doi.org/10.1109/csnet64211.2024.10851739.
Full textFehrman, Brian, Francis Akowuah, and Randy Hoover. "Evading VBA Malware Classification using Model Extraction Attacks and Stochastic Search Methods." In 2024 Cyber Awareness and Research Symposium (CARS). IEEE, 2024. https://doi.org/10.1109/cars61786.2024.10778829.
Full textRuuhwan, Rikza Fauzan Nuradiah, Aso Sudiarjo, Dhema Yunautama, Gunawansyah, and Edi Andriansyah. "A Comparative Analysis of Logistic Regression and Random Forest Algorithm for Cyber Attacks Classification." In 2024 18th International Conference on Telecommunication Systems, Services, and Applications (TSSA). IEEE, 2024. https://doi.org/10.1109/tssa63730.2024.10863823.
Full textBhatnagar, Amrita, Arun Giri, and Aditi Sharma. "Anomaly Intrusion Detection System Based On RNN-LSTM For Cyber-Attack Classification." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687401.
Full textJ, Jasper, Praveen B. M, and Berlin Shaheema S. "Res2-UNeXt Combined with Federated Learning for Cyber-Attack Detection and Classification in Multi Area Smart Grid Power System." In 2024 IEEE Silchar Subsection Conference (SILCON). IEEE, 2024. https://doi.org/10.1109/silcon63976.2024.10910310.
Full textYasir, A., and Kalaivani Kathirvelu. "LDA-OOBO Based Dimensionality Reduction and Classification Using Hybrid BiGRU-MLP for Web Based Cyber-Attack Prediction in Industrial System." In 2024 7th International Conference on Circuit Power and Computing Technologies (ICCPCT). IEEE, 2024. http://dx.doi.org/10.1109/iccpct61902.2024.10673215.
Full textAlmass, Shafeyeen, and Sunil Kumar Chowdhary. "Comprehensive Study on Cyber Security and Cyber Attacks." In 2024 First International Conference on Electronics, Communication and Signal Processing (ICECSP). IEEE, 2024. http://dx.doi.org/10.1109/icecsp61809.2024.10698540.
Full textEspinoza-Zelaya, Carlos, and Young Moon. "Taxonomy of Severity of Cyber-Attacks in Cyber-Manufacturing Systems." In ASME 2022 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/imece2022-94492.
Full textAref, Yazan, and Abdelkader Ouda. "Autonomous Vehicle Cyber-Attacks Classification Framework." In 2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, 2023. http://dx.doi.org/10.1109/comsnets56262.2023.10041387.
Full textReports on the topic "Classification of Cyber- Attacks"
de Barros Barreto, Alexandre, Paulo Costa, and Michael Hieb. Cyber-Argus: Modeling C2 Impacts of Cyber Attacks. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada607024.
Full textBuchanan, Ben, John Bansemer, Dakota Cary, Jack Lucas, and Micah Musser. Automating Cyber Attacks: Hype and Reality. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca002.
Full textJuremi, Julia. Malaysia’s blueprint to block cyber attacks. Edited by Shahirah Hamid and Chris Bartlett. Monash University, 2023. http://dx.doi.org/10.54377/6851-cf78.
Full textDetlefsen, William R. Cyber Attacks, Attribution, and Deterrence: Three Case Studies. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ad1001276.
Full textDong Wei, Yan Lu, Mohsen Jafari, Paul Skare, and Kenneth Rohde. Protecting Intelligent Distributed Power Grids against Cyber Attacks. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/1033753.
Full textAllen, J. Techniques for Judging Intent Behind Network Based Cyber Attacks. Office of Scientific and Technical Information (OSTI), 2004. http://dx.doi.org/10.2172/15013916.
Full textPark, Ji Min. Finding Effective Responses Against Cyber Attacks for Divided Nations. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ad1009192.
Full textVatis, Michael A. Cyber Attacks During the War on Terrorism: A Predictive Analysis. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada386280.
Full textScholten, Wade. Cyber Security Classification Model Evaluation and Comparison. Iowa State University, 2018. http://dx.doi.org/10.31274/cc-20240624-472.
Full textHarriss, Lydia, and Clare West. Cyber Security of Consumer Devices. Parliamentary Office of Science and Technology, 2019. http://dx.doi.org/10.58248/pn593.
Full text