Journal articles on the topic 'Classification of Cyber- Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Classification of Cyber- Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Geetha, G., Manjula Rajagopal, and K. Purnachand. "An intelligent hybrid model for cyber attack classification with selected feature set." Intelligent Decision Technologies 18, no. 3 (2024): 2191–212. http://dx.doi.org/10.3233/idt-240362.
Full textAbirami, A., S. Lakshmanaprakash, R. L. Priya, Vaishali Hirlekar, and Bhargavi Dalal. "Proactive Analysis and Detection of Cyber-attacks using Deep Learning Techniques." Indian Journal Of Science And Technology 17, no. 15 (2024): 1596–605. http://dx.doi.org/10.17485/ijst/v17i15.3044.
Full textMT, Suryadi, Achmad Eriza Aminanto, and Muhamad Erza Aminanto. "Empowering Digital Resilience: Machine Learning-Based Policing Models for Cyber-Attack Detection in Wi-Fi Networks." Electronics 13, no. 13 (2024): 2583. http://dx.doi.org/10.3390/electronics13132583.
Full textDasari, Kishore Babu, and Nagaraju Devarakonda. "Detection of DDoS Attacks Using Machine Learning Classification Algorithms." International Journal of Computer Network and Information Security 14, no. 6 (2022): 89–97. http://dx.doi.org/10.5815/ijcnis.2022.06.07.
Full textFarane Shradha, Gotane Rutuja, Chandanshive Sakshi, Agrawal Khushi, and Khandekar Srushti. "Detection of cyber-attacks and network attacks using Machine Learning." World Journal of Advanced Engineering Technology and Sciences 12, no. 1 (2024): 128–32. http://dx.doi.org/10.30574/wjaets.2024.12.1.0184.
Full textal-Khateeb, Haider, Rafael Salema Marques, Gregory Epiphaniou, and Carsten Maple. "Pivot Attack Classification for Cyber Threat Intelligence." Journal of Information Security and Cybercrimes Research 5, no. 2 (2022): 91–103. http://dx.doi.org/10.26735/zntl3639.
Full textA, Abirami, Lakshmanaprakash S, L. Priya R, Hirlekar Vaishali, and Dalal Bhargavi. "Proactive Analysis and Detection of Cyber-attacks using Deep Learning Techniques." Indian Journal of Science and Technology 17, no. 15 (2024): 1596–605. https://doi.org/10.17485/IJST/v17i15.3044.
Full textHasan Jarjis, Alend, Nassima Yousef Saleem Al Zubaidi, and Meltem Kurt Pehlivanoglu. "Cyber Attacks Classification on Enriching IoT Datasets." EAI Endorsed Transactions on Internet of Things 9, no. 3 (2023): e2. http://dx.doi.org/10.4108/eetiot.v9i3.3030.
Full textDasari, Kishore Babu, and Nagaraju Devarakonda. "Detection of Different DDoS Attacks Using Machine Learning Classification Algorithms." Ingénierie des systèmes d information 26, no. 5 (2021): 461–68. http://dx.doi.org/10.18280/isi.260505.
Full textKadirov, M. M. "АНАЛИЗ И КЛАССИФИКАЦИЯ КИБЕРАТАК НА ИНФОРМАЦИОННО-КОММУНИКАЦИОННЫЕ СИСТЕМЫ". Journal of Science and Innovative Development 6, № 4 (2023): 27–36. http://dx.doi.org/10.36522/2181-9637-2023-4-3.
Full textVenčkauskas, Algimantas, Jevgenijus Toldinas, and Nerijus Morkevičius. "Improving Multi-Class Classification for Recognition of the Prioritized Classes Using the Analytic Hierarchy Process." Applied Sciences 15, no. 13 (2025): 7071. https://doi.org/10.3390/app15137071.
Full textNdolu, Fajar Henri Erasmus, and Ruki Harwahyu. "Intrusion Detection System on Nowaday's Attack using Ensemble Learning." IJNMT (International Journal of New Media Technology) 10, no. 1 (2023): 42–50. http://dx.doi.org/10.31937/ijnmt.v10i1.3210.
Full textAlbakri, Ashwag, Bayan Alabdullah, and Fatimah Alhayan. "Blockchain-Assisted Machine Learning with Hybrid Metaheuristics-Empowered Cyber Attack Detection and Classification Model." Sustainability 15, no. 18 (2023): 13887. http://dx.doi.org/10.3390/su151813887.
Full textWITKOWSKI, Marek, and Anna WOJACZEK. "CYBER ATTACKS AND THREATS." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 184, no. 2 (2017): 184–94. http://dx.doi.org/10.5604/01.3001.0010.4908.
Full textOgunbodede, Olajide O. "Game Theory Classification in Cybersecurity: A Survey." Applied and Computational Engineering 2, no. 1 (2023): 670–78. http://dx.doi.org/10.54254/2755-2721/2/20220644.
Full textAslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz, and Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions." Electronics 12, no. 6 (2023): 1333. http://dx.doi.org/10.3390/electronics12061333.
Full textVeerasamy, N., and M. M. Grobler. "Logic Tester for the Classification of Cyberterrorism Attacks." International Journal of Cyber Warfare and Terrorism 5, no. 1 (2015): 30–46. http://dx.doi.org/10.4018/ijcwt.2015010103.
Full textLee, GyungMin, ShinWoo Shim, ByoungMo Cho, TaeKyu Kim, and KyoungGon Kim. "The Classification Model of Fileless Cyber Attacks." Journal of KIISE 47, no. 5 (2020): 454–65. http://dx.doi.org/10.5626/jok.2020.47.5.454.
Full textAkash, V. S., P. Johnson Akshay, P. S. Alakanandha, and Reji C. Joy Dr. "Cybersecurity in the Digital Age: Benefits and Protective Measures." Recent Trends in Cyber Criminology Research 1, no. 1 (2025): 22–31. https://doi.org/10.5281/zenodo.15188459.
Full textKim, Ki Beom, Eugene Lim, and Hun Yeong Kwon. "Processing Model and Classification of Cybercognitive Attacks: Based on Cognitive Psychology." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 248–56. http://dx.doi.org/10.34190/eccws.22.1.1015.
Full textRohit Khedkar et al. "Detection of Cyber Attacks and Network Attacks Using Machine Learning Algorithms." Proceeding International Conference on Science and Engineering 11, no. 1 (2023): 241–52. http://dx.doi.org/10.52783/cienceng.v11i1.120.
Full textJimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 2, no. 1 (2024): 129–71. http://dx.doi.org/10.60087/jaigs.v2i1.102.
Full textJimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.
Full textJimmy, Fnu. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.
Full textStyazhkina, S. A. "VICTIMOLOGICAL PREVENTION OF CYBER-ATTACKS." Bulletin of Udmurt University. Series Economics and Law 32, no. 3 (2022): 546–52. http://dx.doi.org/10.35634/2412-9593-2022-32-3-546-552.
Full textAbu Al-Haija, Qasem, and Saleh Zein-Sabatto. "An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks." Electronics 9, no. 12 (2020): 2152. http://dx.doi.org/10.3390/electronics9122152.
Full textYeboah-Ofori, Abel, Cameron Swart, Francisca Afua Opoku-Boateng, and Shareeful Islam. "Cyber resilience in supply chain system security using machine learning for threat predictions." Continuity & Resilience Review 4, no. 1 (2022): 1–36. http://dx.doi.org/10.1108/crr-10-2021-0034.
Full textSaif Qassim, Qais, Norziana Jamil, Razali Jidin, et al. "A review: towards practical attack taxonomy for industrial control systems." International Journal of Engineering & Technology 7, no. 2.14 (2018): 145. http://dx.doi.org/10.14419/ijet.v7i2.14.12815.
Full textMaulana, Muhamad, Ahmad Luthfi, and Dwi Kurnia Wibowo. "Network Attacks Classification for Network Forensics Investigation: Literature Reviews." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7, no. 5 (2023): 1132–39. http://dx.doi.org/10.29207/resti.v7i5.5153.
Full textClavijo Mesa, Maria Valentina, Carmen Elena Patino-Rodriguez, and Fernando Jesus Guevara Carazas. "Cybersecurity at Sea: A Literature Review of Cyber-Attack Impacts and Defenses in Maritime Supply Chains." Information 15, no. 11 (2024): 710. http://dx.doi.org/10.3390/info15110710.
Full textSingh, Khundrakpam Johnson, and Tanmay De. "Efficient Classification of DDoS Attacks Using an Ensemble Feature Selection Algorithm." Journal of Intelligent Systems 29, no. 1 (2017): 71–83. http://dx.doi.org/10.1515/jisys-2017-0472.
Full textSyrmakesis, Andrew Dorotheos, Cristina Alcaraz, and Nikos Hatziargyriou. "Classifying resilience approaches for protecting smart grids against cyber threats." International Journal of Information Security 21, no. 5 (2022): 1189–210. https://doi.org/10.1007/s10207-022-00594-7.
Full textJeamaon, Aomduan, and Chaiyaporn Khemapatapan. "Development Cyber Risk Assessment for Intrusion Detection Using Enhanced Random Forest." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 18, no. 4 (2024): 429–42. http://dx.doi.org/10.37936/ecti-cit.2024184.256185.
Full textKumar, Janani, and Gunasundari Ranganathan. "Malware Attack Detection in Large Scale Networks using the Ensemble Deep Restricted Boltzmann Machine." Engineering, Technology & Applied Science Research 13, no. 5 (2023): 11773–78. http://dx.doi.org/10.48084/etasr.6204.
Full textAmrish, R., K. Bavapriyan, V. Gopinaath, A. Jawahar, and C. Vinoth Kumar. "DDoS Detection using Machine Learning Techniques." March 2022 4, no. 1 (2022): 24–32. http://dx.doi.org/10.36548/jismac.2022.1.003.
Full textSayali Renuse. "Enhancing IoT Security with Activity-Based Attack Modeling and Hybrid Classification Techniques." Panamerican Mathematical Journal 34, no. 1 (2024): 1–13. http://dx.doi.org/10.52783/pmj.v34.i1.900.
Full textMohd Yusof, Nur Nadiah, and Noor Suhana Sulaiman. "Cyber Attack Detection Dataset: A Review." Journal of Physics: Conference Series 2319, no. 1 (2022): 012029. http://dx.doi.org/10.1088/1742-6596/2319/1/012029.
Full textSemendawai, Jaka Naufal, Deris Stiawan, and Iwan Pahendra. "Shellcode Classification with Machine Learning Based on Binary Classification." Jurnal Indonesia Sosial Teknologi 6, no. 2 (2025): 833–44. https://doi.org/10.59141/jist.v6i2.3233.
Full textShchetinin, Eugeny Yu, and Tatyana R. Velieva. "Detection of cyber-attacks on the power smart grids using semi-supervised deep learning models." Discrete and Continuous Models and Applied Computational Science 30, no. 3 (2022): 258–68. http://dx.doi.org/10.22363/2658-4670-2022-30-3-258-268.
Full textMousa, Rama Soliman, and Rami Shehab. "Applying risk analysis for determining threats and countermeasures in workstation domain." Journal of Cyber Security and Risk Auditing 2025, no. 1 (2025): 12–21. https://doi.org/10.63180/jcsra.thestap.2025.1.2.
Full textGuven, Ebu Yusuf, Sueda Gulgun, Ceyda Manav, Behice Bakir, and Zeynep Gurkas Aydin. "Multiple Classification of Cyber Attacks Using Machine Learning." Electrica 22, no. 2 (2022): 313–20. http://dx.doi.org/10.54614/electrica.2022.22031.
Full textVenkatesan, K. G. S., Soumitra Das, and K. Vijaya Babu. "Optimised Ensemble Classification Model for Detecting Cyber Attacks." International Journal of Scientific Methods in Intelligence Engineering Networks 01, no. 05 (2023): 41–47. http://dx.doi.org/10.58599/ijsmien.2023.1505.
Full textNidhi. "An Ensemble Model for Cyber Attack and Threat Detection in Applications Network Using Random Forest, Lightgbm and Xgboost." Advances in Nonlinear Variational Inequalities 28, no. 3s (2024): 523–34. https://doi.org/10.52783/anvi.v28.3121.
Full textAnusha, G., Gouse Baigmohammad, and Uma Mageswari. "Detection of cyber attacks on IoT based cyber physical systems." MATEC Web of Conferences 392 (2024): 01166. http://dx.doi.org/10.1051/matecconf/202439201166.
Full textOzkan-Okay, Merve, Refik Samet, Ömer Aslan, Selahattin Kosunalp, Teodor Iliev, and Ivaylo Stoyanov. "A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications." Applied Sciences 13, no. 19 (2023): 11067. http://dx.doi.org/10.3390/app131911067.
Full textPatil, Shruti, Vijayakumar Varadarajan, Devika Walimbe, et al. "Improving the Robustness of AI-Based Malware Detection Using Adversarial Machine Learning." Algorithms 14, no. 10 (2021): 297. http://dx.doi.org/10.3390/a14100297.
Full textCheena, Ms, and Dr S. Radha Rammohan. "Detection and Prevention of Phishing Attacks in DDoS Using Collaborative Learning Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 2 (2023): 747–50. http://dx.doi.org/10.22214/ijraset.2023.48906.
Full textAl-Otaibi, Abdulrahman Hajed F. "[Cyber Algorithms in Protecting Network Systems and Detecting Attacks]." International Journal of Scientific Studies Publishing 23, no. 3 (2024): 497–503. https://doi.org/10.62690/ijssp23318.
Full textAjdani, Mahdi. "Deep Learning-Based Intrusion Detection Systems." International Journal of Information Security and Privacy 19, no. 1 (2025): 1–15. https://doi.org/10.4018/ijisp.383299.
Full textLe, Thi-Thu-Huong, Yustus Eko Oktian, and Howon Kim. "XGBoost for Imbalanced Multiclass Classification-Based Industrial Internet of Things Intrusion Detection Systems." Sustainability 14, no. 14 (2022): 8707. http://dx.doi.org/10.3390/su14148707.
Full text