Journal articles on the topic 'Cyber alerts'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber alerts.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chen, Haipeng, Andrew Duncklee, Sushil Jajodia, Rui Liu, Sean Mcnamara, and V. S. Subrahmanian. "PCAM: A Data-driven Probabilistic Cyber-alert Management Framework." ACM Transactions on Internet Technology 22, no. 3 (August 31, 2022): 1–24. http://dx.doi.org/10.1145/3511101.
Full textAlbasheer, Hashim, Maheyzah Md Siraj, Azath Mubarakali, Omer Elsier Tayfour, Sayeed Salih, Mosab Hamdan, Suleman Khan, Anazida Zainal, and Sameer Kamarudeen. "Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey." Sensors 22, no. 4 (February 15, 2022): 1494. http://dx.doi.org/10.3390/s22041494.
Full textAlmseidin, Mohammad, Mouhammad Alkasassbeh, Maen Alzubi, and Jamil Al-Sawwa. "Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation." Cryptography 6, no. 2 (May 7, 2022): 24. http://dx.doi.org/10.3390/cryptography6020024.
Full textCheng, Xiang, Jiale Zhang, and Bing Chen. "Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation." Sensors 19, no. 18 (September 19, 2019): 4045. http://dx.doi.org/10.3390/s19184045.
Full textGay, Chris, Barry Horowitz, John Elshaw, Philip Bobko, and Inki Kim. "Operator Suspicion and Decision Responses to Cyber-Attacks on Unmanned Ground Vehicle Systems." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 226–30. http://dx.doi.org/10.1177/1541931213601540.
Full textAngelini, Marco, and Giuseppe Santucci. "Cyber situational awareness: from geographical alerts to high-level management." Journal of Visualization 20, no. 3 (July 12, 2016): 453–59. http://dx.doi.org/10.1007/s12650-016-0377-3.
Full textYang, Gang, Chaojing Tang, and Xingtong Liu. "DualAC2NN: Revisiting and Alleviating Alert Fatigue from the Detection Perspective." Symmetry 14, no. 10 (October 13, 2022): 2138. http://dx.doi.org/10.3390/sym14102138.
Full textPriyawati, Diah, Siti Rokhmah, and Ihsan Cahyo Utomo. "Website Vulnerability Testing and Analysis of Website Application Using OWASP." International Journal of Computer and Information System (IJCIS) 3, no. 3 (August 29, 2022): 142–47. http://dx.doi.org/10.29040/ijcis.v3i3.90.
Full textSahu, Abhijeet, and Katherine Davis. "Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach." Sensors 22, no. 6 (March 9, 2022): 2100. http://dx.doi.org/10.3390/s22062100.
Full textKhosravi, Mehran, and Behrouz Tork Ladani. "Alerts Correlation and Causal Analysis for APT Based Cyber Attack Detection." IEEE Access 8 (2020): 162642–56. http://dx.doi.org/10.1109/access.2020.3021499.
Full textMaia, Eva, Norberto Sousa, Nuno Oliveira, Sinan Wannous, Orlando Sousa, and Isabel Praça. "SMS-I: Intelligent Security for Cyber–Physical Systems." Information 13, no. 9 (August 25, 2022): 403. http://dx.doi.org/10.3390/info13090403.
Full textPark, Hyunjae, and Young-June Choi. "Frequency-Based Representation of Massive Alerts and Combination of Indicators by Heterogeneous Intrusion Detection Systems for Anomaly Detection." Sensors 22, no. 12 (June 10, 2022): 4417. http://dx.doi.org/10.3390/s22124417.
Full textPanwar, Anupam. "Evaluation of Kernel Based Atanassov's Intuitionistic Fuzzy Clustering for Network Forensics and Intrusion Detection." International Journal of Software Innovation 4, no. 1 (January 2016): 1–15. http://dx.doi.org/10.4018/ijsi.2016010101.
Full textLee, Eungyu, Yongsoo Lee, and Teajin Lee. "Automatic False Alarm Detection Based on XAI and Reliability Analysis." Applied Sciences 12, no. 13 (July 4, 2022): 6761. http://dx.doi.org/10.3390/app12136761.
Full textTache Buzățoiu, Elena-Simona, Amalia-Magdalena Dănăilă Calafeteanu, and Monica-Mihaela Drăgan Radu. "The role of the chartered accountant in diminishing the effects of cyber fraud." Journal of Financial Studies 6, no. 11 (November 15, 2021): 141–55. http://dx.doi.org/10.55654/jfs.2021.6.11.11.
Full textIglesias, Aitziber, Goiuria Sagardui, and Cristobal Arellano. "Industrial Cyber-Physical System Evolution Detection and Alert Generation." Applied Sciences 9, no. 8 (April 17, 2019): 1586. http://dx.doi.org/10.3390/app9081586.
Full textAshari, Ilham Firman, Vina Oktarina, Ringgo Galih Sadewo, and Salman Damanhuri. "Analysis of Cross Site Request Forgery (CSRF) Attacks on West Lampung Regency Websites Using OWASP ZAP Tools." Jurnal Sisfokom (Sistem Informasi dan Komputer) 11, no. 2 (August 31, 2022): 276–81. http://dx.doi.org/10.32736/sisfokom.v11i2.1393.
Full textGyőrffy, Krisztina, Ferenc Leitold, and Anthony Arrott. "Individual awareness of cyber-security vulnerability - Citizen and public servant." Central and Eastern European eDem and eGov Days 325 (February 14, 2018): 411–22. http://dx.doi.org/10.24989/ocg.v325.34.
Full textSweet, Christopher, Stephen Moskal, and Shanchieh Jay Yang. "On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks." ACM Transactions on Management Information Systems 11, no. 4 (December 4, 2020): 1–21. http://dx.doi.org/10.1145/3394503.
Full textHulak, Hennadii, Yuliia Zhdanovа, Pavlo Skladannyi, Yevhen Hulak, and Viktor Korniiets. "VULNERABILITIES OF SHORT MESSAGE ENCRYPTION IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS OF CRITICAL INFRASTRUCTURE OBJECTS." Cybersecurity: Education, Science, Technique 1, no. 17 (2022): 145–58. http://dx.doi.org/10.28925/2663-4023.2022.17.145158.
Full textKumar, Ravi, and Parvesh Kumar Chaudhary. "Network Security Enhancement using CTI and Log Analysis." International Journal of Engineering and Computer Science 7, no. 12 (December 18, 2018): 24430–32. http://dx.doi.org/10.18535/ijecs/v7i12.03.
Full textJohnson, Anju P., Hussain Al-Aqrabi, and Richard Hill. "Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems." Sensors 20, no. 3 (February 5, 2020): 844. http://dx.doi.org/10.3390/s20030844.
Full textThivakaran, T. K., and D. Sasikumar. "Enhanced Biometric Based Automated Teller Machine Authenticate Security System Using Low Power Microcontroller." Journal of Computational and Theoretical Nanoscience 16, no. 2 (February 1, 2019): 759–63. http://dx.doi.org/10.1166/jctn.2019.7805.
Full textNalanagula, Swetha, and Arpita Roy. "Cyber Security Operations Centre: A User-Cantered Machine Learning Framework." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 4040–43. http://dx.doi.org/10.22214/ijraset.2022.44546.
Full textOnchis, Darian, Codruta Istin, and Eduard Hogea. "A Neuro-Symbolic Classifier with Optimized Satisfiability for Monitoring Security Alerts in Network Traffic." Applied Sciences 12, no. 22 (November 12, 2022): 11502. http://dx.doi.org/10.3390/app122211502.
Full textKumar, Abhishek, Jyotir Moy Chatterjee, and Vicente García Díaz. "A novel hybrid approach of SVM combined with NLP and probabilistic neural network for email phishing." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 486. http://dx.doi.org/10.11591/ijece.v10i1.pp486-493.
Full textOgogo, Wycliffe Lamech. "Real-Time Monitoring of Network Devices: Its Effectiveness in Enhancing Network Security." East African Journal of Information Technology 3, no. 1 (March 4, 2021): 1–6. http://dx.doi.org/10.37284/eajit.3.1.153.
Full textJaveed, Danish, Muhammad Taimoor Khan, Ijaz Ahmad, Tahir Iqbal, Umar Mohammed Badamasi, Cosmas Obiora Ndubuisi, and Aliyu Umar. "An Efficient Approach of Threat Hunting Using Memory Forensics." International Journal of Computer Networks and Communications Security 8, no. 5 (May 31, 2020): 37–45. http://dx.doi.org/10.47277/ijcncs/8(5)1.
Full textFotiadou, Konstantina, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Dimitrios Skias, Sofia Tsekeridou, and Theodore Zahariadis. "Network Traffic Anomaly Detection via Deep Learning." Information 12, no. 5 (May 19, 2021): 215. http://dx.doi.org/10.3390/info12050215.
Full textMhawi, Doaa N., Ammar Aldallal, and Soukeana Hassan. "Advanced Feature-Selection-Based Hybrid Ensemble Learning Algorithms for Network Intrusion Detection Systems." Symmetry 14, no. 7 (July 17, 2022): 1461. http://dx.doi.org/10.3390/sym14071461.
Full textAliev, Khurshid, and Dario Antonelli. "Proposal of a Monitoring System for Collaborative Robots to Predict Outages and to Assess Reliability Factors Exploiting Machine Learning." Applied Sciences 11, no. 4 (February 10, 2021): 1621. http://dx.doi.org/10.3390/app11041621.
Full textElbasi, Ersin, Ahmet E. Topcu, and Shinu Mathew. "Prediction of COVID-19 Risk in Public Areas Using IoT and Machine Learning." Electronics 10, no. 14 (July 14, 2021): 1677. http://dx.doi.org/10.3390/electronics10141677.
Full textJain*, Pratik, Ravikant Kholwal, and Tavneet Singh Khurana. "Reducing the False Alarm Rate in Intrusion Detection System by Providing Authentication and Improving the Efficiency of Intrusion Detection System by using Filtered Clusterer Algorithm using Weka Tool." International Journal of Engineering and Advanced Technology 10, no. 4 (April 30, 2021): 134–42. http://dx.doi.org/10.35940/ijeat.d2413.0410421.
Full textJain*, Pratik, Ravikant Kholwal, and Muskan Patidar. "To Decrease the Issue of False Alarm Rate by Providing Authentication & Thus Improving the Efficiency of Intrusion Detection System by Comparing the Result of Filtered Clusterer Algorithm & Make-Density Based Clustering Algorithm without Attribute Count." International Journal of Recent Technology and Engineering 10, no. 1 (May 30, 2021): 110–20. http://dx.doi.org/10.35940/ijrte.a5755.0510121.
Full textVieane, Alex, Gregory Funke, Eric Greenlee, Vincent Mancuso, Brett Borghetti, Brent Miller, Lauren Menke, Rebecca Brown, Cyrus K. Foroughi, and Deborah Boehm-Davis. "Task Interruptions Undermine Cyber Defense." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 375–79. http://dx.doi.org/10.1177/1541931213601576.
Full textChang, Victor, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu, and Anna Kobusińska. "A Survey on Intrusion Detection Systems for Fog and Cloud Computing." Future Internet 14, no. 3 (March 13, 2022): 89. http://dx.doi.org/10.3390/fi14030089.
Full textHidayat, Sutan Emir, Ahmad Rafiki, and Maryam Humood Al Khalifa. "The social media adoption of public sector in the Kingdom of Bahrain." Journal of Advances in Management Research 16, no. 1 (February 4, 2019): 23–37. http://dx.doi.org/10.1108/jamr-11-2017-0105.
Full textMaia, Eva, Sinan Wannous, Tiago Dias, Isabel Praça, and Ana Faria. "Holistic Security and Safety for Factories of the Future." Sensors 22, no. 24 (December 16, 2022): 9915. http://dx.doi.org/10.3390/s22249915.
Full textWu, Mingtao, and Young Moon. "Alert Correlation for Cyber-Manufacturing Intrusion Detection." Procedia Manufacturing 34 (2019): 820–31. http://dx.doi.org/10.1016/j.promfg.2019.06.197.
Full textBryce, Alan. "LEADERSHIP: Preventing a cyber attack." Children and Young People Now 2017, no. 13 (September 2, 2017): 57. http://dx.doi.org/10.12968/cypn.2017.13.57.
Full textClarke, Karla, Yair Levy, Laurie Dringus, and Shonda Brown. "How workplace satisfaction affects insider threat detection as a vital variable for the mitigation of malicious cyber insiders." Online Journal of Applied Knowledge Management 7, no. 1 (May 22, 2019): 40–52. http://dx.doi.org/10.36965/ojakm.2019.7(1)40-52.
Full textSonhera, Naume, and David Mhlanga. "REDUCING CYBER INCIDENTS THROUGH GOOD ONLINE BEHAVIORAL NORMS: LESSONS FROM SOUTH AFRICA." EURASIAN JOURNAL OF SOCIAL SCIENCES 10, no. 1 (2022): 37–48. http://dx.doi.org/10.15604/ejss.2022.10.01.004.
Full textBoschee, Pam. "Comments: Complexity of Cyber Crime Skyrockets." Journal of Petroleum Technology 73, no. 06 (June 1, 2021): 8. http://dx.doi.org/10.2118/0621-0008-jpt.
Full textEt.al, Siok Yee Tan. "CYBERGUARD: A Mobile Cyberbullying Detector." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 1805–15. http://dx.doi.org/10.17762/turcomat.v12i3.1008.
Full textSvilicic, Rudan, Jugović, and Zec. "A Study on Cyber Security Threats in a Shipboard Integrated Navigational System." Journal of Marine Science and Engineering 7, no. 10 (October 12, 2019): 364. http://dx.doi.org/10.3390/jmse7100364.
Full textSyed, Romilla. "Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system." Information & Management 57, no. 6 (September 2020): 103334. http://dx.doi.org/10.1016/j.im.2020.103334.
Full textPARASCHIVA, Ion. "WannaCry Ransomware Attack from Romanian Police Perspective." International Journal of Information Security and Cybercrime 8, no. 1 (June 28, 2019): 65–72. http://dx.doi.org/10.19107/ijisc.2019.01.09.
Full textKee, Keh-Kim, Simon Lau Boung Yew, Yun Seng Lim, Yip Ping Ting, and Ramli Rashidi. "Universal cyber physical system, a prototype for predictive maintenance." Bulletin of Electrical Engineering and Informatics 11, no. 1 (February 1, 2022): 42–49. http://dx.doi.org/10.11591/eei.v11i1.3216.
Full textPreuveneers, Davy, and Wouter Joosen. "Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence." Journal of Cybersecurity and Privacy 1, no. 1 (February 26, 2021): 140–63. http://dx.doi.org/10.3390/jcp1010008.
Full textBognár, Eszter Katalin. "Data Mining in Cyber Threat Analysis : Neural Networks for Intrusion Detection." Academic and Applied Research in Military and Public Management Science 15, no. 2 (August 31, 2016): 187–96. http://dx.doi.org/10.32565/aarms.2016.2.7.
Full text