Academic literature on the topic 'Cyber-defense authentication mechanism'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber-defense authentication mechanism.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber-defense authentication mechanism"

1

Li, Bo, Xin Jin, Tingjie Ba, Tingzhe Pan, En Wang, and Zhiming Gu. "Deceptive Cyber-Resilience in PV Grids: Digital Twin-Assisted Optimization Against Cyber-Physical Attacks." Energies 18, no. 12 (2025): 3145. https://doi.org/10.3390/en18123145.

Full text
Abstract:
The increasing integration of photovoltaic (PV) systems into smart grids introduces new cybersecurity vulnerabilities, particularly against cyber-physical attacks that can manipulate grid operations and disrupt renewable energy generation. This paper proposes a multi-layered cyber-resilient PV optimization framework, leveraging digital twin-based deception, reinforcement learning-driven cyber defense, and blockchain authentication to enhance grid security and operational efficiency. A deceptive cyber-defense mechanism is developed using digital twin technology to mislead adversaries, dynamical
APA, Harvard, Vancouver, ISO, and other styles
2

Shradha Pandule, Akshada Ringe, Jaid Sayyed, and Prof. S. C. Puranik. "Keystroke Tracking-Robust System with Dual-Keypad Security." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 05 (2025): 2098–102. https://doi.org/10.47392/irjaeh.2025.0306.

Full text
Abstract:
The development of an advanced authentication mechanism designed to mitigate the increasing risk of keylogging attacks, a prevalent cyber threat that captures keystrokes to steal sensitive information. Traditional authentication methods relying on keyboard input are particularly vulnerable to such attacks. To address this, a novel security framework is introduced, combining two innovative components: a dual-keypad input system and a visual authentication protocol. The dual-keypad system employs two distinct input interfaces—a physical keypad and a virtual keypad—each handling separate aspects
APA, Harvard, Vancouver, ISO, and other styles
3

Pandule, Shradha. "Implementation Towards Enhanced Visual Proof of Identity: Keystroke Tracking-Robust System with Dual-Keypad Security." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47627.

Full text
Abstract:
Abstract: - The project focuses on developing an advanced authentication mechanism to counteract the growing threat of keylogging attacks. Keylogging, a type of cyber-attack that captures keystrokes to steal sensitive information, poses a significant risk to traditional authentication methods that rely on keyboard input. This project introduces a novel security approach combining two key innovations: a dual-keypad input system and a visual authentication protocol. The dual-keypad system consists of two separate input keypad (Normal Keypad and Virtual Keypad), each responsible for a different a
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Mrs Priyanka. "Encrypted Chat Application." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35388.

Full text
Abstract:
In today's cyber landscape, the protection of digital communication channels stands as a paramount concern. This abstract dissects the cyber resilience strategies underpinning the development of secure chat applications, with a particular focus on user interface design using Jetpack Compose and encryption integration leveraging Kotlin. The examination commences with an in-depth analysis of the cyber defence mechanisms ingrained within chat interfaces crafted through Jetpack Compose, the cutting-edge toolkit tailored for native Android UI construction. By meticulously adhering to Material Desig
APA, Harvard, Vancouver, ISO, and other styles
5

Baek, Youngmi, and Seongjoo Shin. "CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks." Sensors 22, no. 7 (2022): 2636. http://dx.doi.org/10.3390/s22072636.

Full text
Abstract:
Automotive cyber-physical systems are in transition from the closed-systems to open-networking systems. As a result, in-vehicle networks such as the controller area network (CAN) have become essential to connect to inter-vehicle networks through the various rich interfaces. Newly exposed security concerns derived from this requirement may cause in-vehicle networks to pose threats to automotive security and driver’s safety. In this paper, to ensure a high level of security of the in-vehicle network for automotive CPS, we propose a novel lightweight and practical cyber defense platform, referred
APA, Harvard, Vancouver, ISO, and other styles
6

Vijayakumaran, C., B. Muthusenthil, and B. Manickavasagam. "A reliable next generation cyber security architecture for industrial internet of things environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 387. http://dx.doi.org/10.11591/ijece.v10i1.pp387-395.

Full text
Abstract:
Architectural changes are happening in the modern industries due to the adaption and the deployment of ‘Internet of Things (IoT)’ for monitoring and controlling various devices remotely from the external world. The most predominant place where the IoT technology makes the most sense is the industrial automation processes in smart industries (Industry 4.0). In this paper, a reliable ‘Next Generation Cyber Security Architecture (NCSA)’ is presented for Industrial IoT (IIoT) environment that detects and thwarts cybersecurity threats and vulnerabilities. It helps to automate the processes of excha
APA, Harvard, Vancouver, ISO, and other styles
7

Rajaa Ahmed Ali. "Enhancing Hand Vein Authentication: Gray Wolf Optimization Mitigates Data Poisoning Attacks." Journal of Information Systems Engineering and Management 10, no. 34s (2025): 1101–9. https://doi.org/10.52783/jisem.v10i34s.5914.

Full text
Abstract:
Nowadays most vital organizations depend on biometric systems to protect their resources and authenticate their customers. Hand vein is one of the biometrics which used for more critical infrastructures. In this paper a hand vein pattern-based biometric authentication system is proposed. The suggested system is designed with attack phase and defense phase. In attack phase, hand veins are preprocessed, and features extracted using PCA-net. These features are clustered using Gray Wolf Optimization (GWO). Lastly, hand veins are poisoned using label flipping mechanism. In defense phase, poisoned h
APA, Harvard, Vancouver, ISO, and other styles
8

C., Vijayakumaran, Muthusenthil B., and Manickavasagam B. "A reliable next generation cyber security architecture for industrial internet of things environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 387–95. https://doi.org/10.11591/ijece.v10i1.pp387-395.

Full text
Abstract:
Architectural changes are happening in the modern industries due to the adaption and the deployment of „Internet of Things (IoT)" for monitoring and controlling various devices remotely from the external world. The most predominant place where the IoT technology makes the most sense is the industrial automation processes in smart industries (Industry 4.0). In this paper, a reliable „Next Generation Cyber Security Architecture (NCSA)" is presented for Industrial IoT (IIoT) environment that detects and thwarts cybersecurity threats and vulnerabilities. It helps to automate the proces
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Manmeet Mahinderjit, Richard Frank, and Wan Mohd Nazmee Wan Zainon. "Cyber-criminology defense in pervasive environment: A study of cybercrimes in Malaysia." Bulletin of Electrical Engineering and Informatics 10, no. 3 (2021): 1658–68. http://dx.doi.org/10.11591/eei.v10i3.3028.

Full text
Abstract:
The growth of technologies; infrastructures and platforms with less or no security protection in emerging big data and internet of things (IoT) trends increase the likelihood of cybercrime attacks. With the rise of coronavirus disease-2019 (Covid-19) pandemic towards mankind, more cybercrimes are designed to penetrate one’s cognitive mind in revealing sensitive details. In this paper; an exploration of cybercrime threats in Southeast Asia country; Malaysia from year 2008 up to 2020 and its hike trends and impacts will be discussed. An investigation revolving the study of cyber-criminology and
APA, Harvard, Vancouver, ISO, and other styles
10

Manmeet, Mahinderjit Singh, Frank Richard, and Mohd Nazmee Wan Zainon Wan. "Cyber-criminology defense in pervasive environment: A study of cybercrimes in Malaysia." Bulletin of Electrical Engineering and Informatics 10, no. 3 (2021): pp. 1658~1668. https://doi.org/10.11591/eei.v10i3.3028.

Full text
Abstract:
The growth of technologies; infrastructures and platforms with less or no security protection in emerging big data and internet of things (IoT) trends increase the likelihood of cybercrime attacks. With the rise of coronavirus disease-2019 (Covid-19) pandemic towards mankind, more cybercrimes are designed to penetrate one’s cognitive mind in revealing sensitive details. In this paper; an exploration of cybercrime threats in Southeast Asia country; Malaysia from year 2008 up to 2020 and its hike trends and impacts will be discussed. An investigation revolving the study of cyber-criminolog
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cyber-defense authentication mechanism"

1

Jiang, Shan, and Hengbo Zhang. "Research on Communication Network Security of Unmanned Surface Vehicle Based on Block Chain." In Advances in Transdisciplinary Engineering. IOS Press, 2024. http://dx.doi.org/10.3233/atde240506.

Full text
Abstract:
The communication network security of unmanned surface vehicle (USV) is the central problem to ensure the stable operation and data transmission of boat system. Based on block chain, this paper studies the communication network security of USV. By introducing the block chain technology into the communication network of USV, the design of identity authentication mechanism based on block chain was made, and the protection method of data integrity was proposed. Then the decentralized trust model is made to provide the protection in aspects of identity authentication, data integrity, non-repudiati
APA, Harvard, Vancouver, ISO, and other styles
2

Savita, Pankaj, and Bhupendra Malviya. "IOT PRIVACY AND SECURITY." In Futuristic Trends in IOT Volume 3 Book 8. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3baio8p2ch2.

Full text
Abstract:
Internet of Things is abundant network comprising of universal things like physical entities, people, appliances and many other kind of devices that are responsible for establishing connection and making communications to interchange data for smart devices and applications. Internet of Things realms is very huge that can include smart homes, smart cities, smart agriculture, e-health and wearable entities etc. Internet of Things is presented in various realms like medical, agriculture, industry, manufacturing, defense etc. plenty of devices are allied in IoT communications system. Such devices
APA, Harvard, Vancouver, ISO, and other styles
3

Vashishth, Tarun Kumar, Vikas Sharma, Kewal Krishan Sharma, Bhupendra Kumar, Sachin Chaudhary, and Rajneesh Panwar. "Enhancing Cloud Security." In Improving Security, Privacy, and Trust in Cloud Computing. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1431-9.ch004.

Full text
Abstract:
Cloud computing has revolutionized the way organizations store, process, and manage data, offering flexibility and scalability. However, the rise in cyber threats poses significant challenges to maintaining robust cloud security. This chapter delves into the pivotal role that Artificial Intelligence (AI) and Machine Learning (ML) play in enhancing cloud security. By harnessing the capabilities of AI and ML, organizations can proactively detect, mitigate, and respond to evolving cyber threats, ultimately fortifying their cloud infrastructure.AI-driven techniques empower security systems to reco
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Harmanjot, Sudhakar Kumar, Sunil K. Singh, et al. "Robust and Secure Communication Protocols for Space Missions." In Advanced Cyber Defense for Space Missions and Operations. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-7939-4.ch008.

Full text
Abstract:
New flagship space missions require larger teams and more complex operations, increasing the need for highly reliable and secure communications to achieve mission goals and protect sensitive information. This chapter explores key security challenges in space mission communications, beginning with the importance of secure communication and the unique difficulties of space-based systems. It focuses on symmetric and asymmetric encryption techniques, offers an overview of communication protocol evolution, and examines key security requirements. Quantum cryptography is discussed as a future solutio
APA, Harvard, Vancouver, ISO, and other styles
5

Vadluri, Aditya, and Snehanshu Ayer. "Zero-Trust Architecture and Blockchain-Based Security Models for IoT-Integrated Industrial Power Electronics Systems." In Power Electronics for IoT-Enabled Smart Grids and Industrial Automation. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552111-13.

Full text
Abstract:
The integration of Zero-Trust Architecture (ZTA) and Blockchain-based Security Models in IoT-driven industrial power electronics systems has emerged as a transformative approach to mitigating cyber threats and ensuring robust access control. Traditional security mechanisms, which rely on perimeter-based defenses, are increasingly ineffective against advanced persistent threats (APTs), insider attacks, and lateral movement techniques within industrial IoT (IIoT) environments. Zero-Trust security enforces continuous verification, least-privilege access, and micro-segmentation, ensuring that no d
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Azeem, Noor Zaman Jhanjhi, Ghassan Ahmed Alı, Sayan Kumar Ray, and Sobia Wassan. "Case Studies and Applications of Generative AI in Real-World Cybersecurity Scenarios." In Advances in Human and Social Aspects of Technology. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-8939-3.ch003.

Full text
Abstract:
This chapter elucidates what the major effects of generative artificial intelligence are: It changes things a lot. It first discusses the overall of what generative AI can do using one kind of generative AI, then it considers what generative AI does to make our defences against new things that can go wrong much more effective, and then it reflects on the major effects of generative AI on detecting malware and things that are subtly making our networks vulnerable. It emphasizes generative AI's ability to detect malware that was created to be hard to see with many examples of real things that at
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber-defense authentication mechanism"

1

Kamila, Gangadhar, Uma Yadav, Satyam Kumar, and Javalkar Dinesh Kumar. "Securing IOT infrastructures: Remote Control Technology as cyber defense Mechanism." In International Conference on Cutting-Edge Developments in Engineering Technology and Science. ICCDETS, 2024. http://dx.doi.org/10.62919/here1331.

Full text
Abstract:
The pervasive integration of the Internet of Things (IoT) in infrastructural applications has raised significant cybersecurity concerns. This research paper delves into the security challenges associated with IoT infrastructures and proposes the implementation of advanced remote-control technologies as a cyber defense mechanism. Through a comprehensive analysis, the paper investigates the vulnerabilities inherent in IoT networks and the potential risks they pose to critical infrastructure systems. By utilizing a combination of encryption techniques, secure authentication protocols, and real-ti
APA, Harvard, Vancouver, ISO, and other styles
2

Jackson, Aldrewvonte, Kofi Kyei, Yasmin Eady, et al. "Biometric Authentication for the Mitigation of Human Risk on a Social Network." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004763.

Full text
Abstract:
The increasing reliance on digital systems in today's interconnected world has brought about a corresponding surge in cyber threats, making cybersecurity a critical concern. While technological advancements have bolstered the defense mechanisms, human factors remain a significant vulnerability. This paper explores the intersection of human factors and cybersecurity, focusing on how biometric authentication can serve as a potent mitigating strategy. The human element in cybersecurity encompasses a range of factors, including user behavior, cognitive biases, and susceptibility to social engineer
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!