To see the other types of publications on this topic, follow the link: Digital attacks.

Journal articles on the topic 'Digital attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Digital attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–24. http://dx.doi.org/10.22624/aims/digital/v11n2p2x.

Full text
Abstract:
Network Time Protocol amplification attack is a form of distributed denial-of-service (DDoS) attack in which an attacker exploits or sends a request to a vulnerable NTP server by using their IP address to flood a targeted network or server with an overwhelming volume of User Datagram Protocol (UDP) traffic. In the past, the techniques that involved reflecting traffic off NTP servers to the victim, with the attacker hiding their identity by spoofing the source IP address were carried out using mainly Domain Name Server (DNS) servers but the use of vulnerable NTP servers as reflectors in DDoS at
APA, Harvard, Vancouver, ISO, and other styles
2

Jimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–36. http://dx.doi.org/10.22624/aims/digital/v11n2p2.

Full text
Abstract:
Network Time Protocol amplification attack is a form of distributed denial-of-service (DDoS) attack in which an attacker exploits or sends a request to a vulnerable NTP server by using their IP address to flood a targeted network or server with an overwhelming volume of User Datagram Protocol (UDP) traffic. In the past, the techniques that involved reflecting traffic off NTP servers to the victim, with the attacker hiding their identity by spoofing the source IP address were carried out using mainly Domain Name Server (DNS) servers but the use of vulnerable NTP servers as reflectors in DDoS at
APA, Harvard, Vancouver, ISO, and other styles
3

Dugyala, Raman, N. Hanuman Reddy, Raghuram G, and J. Lakshminarayana. "Decentralized Secure Online Digital Data Registrations." International Journal of Engineering & Technology 7, no. 4.6 (2018): 42. http://dx.doi.org/10.14419/ijet.v7i4.6.20231.

Full text
Abstract:
A potential challenge in the present secure transaction lies in illegitimate access to premium digital data available in various formats on various service-sectors for Government and Non-Government process models. This vulnerable scenario leads to identity attacks, man in the middle (MITM) attacks and denial of service (DoS) attacks. Our proposed model uses blockchain technology with machine learning classifiers to identify and detect possible attacks within a peer-to-peer network. Blockchain uses digital signatures, proof-of-work algorithm and consensus algorithms to protect system from possi
APA, Harvard, Vancouver, ISO, and other styles
4

Nwaocha, Vivian O., and Ayodele Oloyede. "Averting DDOS Attacks in Web-Based Applications." Advances in Multidisciplinary and scientific Research Journal Publication 11, no. 1 (2023): 51–63. http://dx.doi.org/10.22624/aims/digital/v11n1p4.

Full text
Abstract:
Distributed Denial-of-Service attacks are becoming increasingly pervasive, especially in web-based applications, and their impact have been devastating and affect businesses and organisations negatively. This research highlights web-based applications which enables users connect with a remote server via a web browser. The web apps are used on a range of devices, including desktops, laptops, tablets, and smartphones, which are prone to various attacks and predominantly DDoS attacks. Consequently, effective strategies, Mitigation Service are proposed for detecting DDoS attacks and blocking malic
APA, Harvard, Vancouver, ISO, and other styles
5

Stein, Zvi, Adir Hazan, and Adrian Stern. "Invisible CMOS Camera Dazzling for Conducting Adversarial Attacks on Deep Neural Networks." Sensors 25, no. 7 (2025): 2301. https://doi.org/10.3390/s25072301.

Full text
Abstract:
Despite the outstanding performance of deep neural networks, they remain vulnerable to adversarial attacks. While digital domain adversarial attacks are well-documented, most physical-world attacks are typically visible to the human eye. Here, we present a novel invisible optical-based physical adversarial attack via dazzling a CMOS camera. This attack involves using a designed light pulse sequence spatially transformed within the acquired image due to the camera’s shutter mechanism. We provide a detailed analysis of the photopic conditions required to keep the attacking light source invisible
APA, Harvard, Vancouver, ISO, and other styles
6

Kpieleh, Ferdinand. "A Review of Ddos Attack Detection in Iot Networks." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 43–54. http://dx.doi.org/10.22624/aims/digital/v10n4p6.

Full text
Abstract:
The security risks and vulnerabilities associated with these resource-constrained Internet of Things (IoT) devices grow as their usability rises. Distributed Denial of Service is one of the main dangers to Internet of Things devices (DDoS). Continuous monitoring, early detection, and adaptive decision-making are necessary for IoT device security to be robust and effective. With software-defined networking (SDN), these issues can be solved, giving IoT devices the chance to manage DDoS threats in an efficient manner. This study suggests a unique SDN-based secure IoT framework that uses IP Payloa
APA, Harvard, Vancouver, ISO, and other styles
7

Kansaon, Daniel, Philipe de Freitas Melo, Savvas Zannettou, Anja Feldmann, and Fabrício Benevenuto. "Strategies and Attacks of Digital Militias in WhatsApp Political Groups." Proceedings of the International AAAI Conference on Web and Social Media 18 (May 28, 2024): 813–25. http://dx.doi.org/10.1609/icwsm.v18i1.31354.

Full text
Abstract:
WhatsApp provides a fertile ground for the large-scale dissemination of information, particularly in countries like Brazil and India. Given its increasing popularity and use for political discussions, it is paramount to ensure that WhatsApp groups are adequately protected from attackers who aim to disrupt the activity of WhatsApp groups. Motivated by this, in this work, we characterize two types of attacks that may disrupt WhatsApp groups. We look into the flooding attack, where an attacker shares a large number of usually duplicate messages within a short period, and the hijacking attack, whe
APA, Harvard, Vancouver, ISO, and other styles
8

Beny Abukhaer Tatara, Bisma Abdurachman, Desta Lesmana Mustofa, and David Yacobus. "The Potential of Cyber Attacks in Indonesia's Digital Economy Transformation." NUANSA: Jurnal Penelitian Ilmu Sosial dan Keagamaan Islam 20, no. 1 (2023): 19–37. http://dx.doi.org/10.19105/nuansa.v20i1.7362.

Full text
Abstract:
In the era of the industrial revolution 4.0, many activities use the internet and computers, including economic activities. Many activities in real space are transformed into cyberspace. Currently, the world economy is transforming from conventional methods to digital. Thus, almost all countries in the world are competing to adapt to these changes, one of which is Indonesia which, based on the McKinsey report, ranks first as the country with the fastest growth in adopting the digital economy. The purpose of writing this article is to analyze the potential for cyber attacks that can affect the
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Zao. "Federated Learning based on Homomorphic Encryption and Digital Signatures." Highlights in Science, Engineering and Technology 39 (April 1, 2023): 595–603. http://dx.doi.org/10.54097/hset.v39i.6596.

Full text
Abstract:
Federated learning aims to train a centralized federated model using decentralized data sources and to ensure the security and privacy of user data during system training process. Federal learning still faces four challenges: high communication costs, system heterogeneity, data heterogeneity, and data security, The primary attacks facing federal learning include confidentiality, integrity, and usability attacks. Attackers mainly target confidential attacks, while malicious attackers target integrity attacks and usability attacks. Homomorphism encryption refers to the encryption algorithm that
APA, Harvard, Vancouver, ISO, and other styles
10

Thomas, Reji, Vibisha V, Tabassum A, and Thanuja S. "Digital Watermarking." International Research Journal of Computer Science 10, no. 05 (2023): 124–29. http://dx.doi.org/10.26562/irjcs.2023.v1005.04.

Full text
Abstract:
The paper introduces the digital watermarking technology which is a data hiding technique that embeds a message into a multimedia work such as an image or text or other digital object. The proposed technique has several important applications; the majorly important is the digital copyrights protection. The digital watermarking system as any other data hiding technique has its own requirements that make the digital watermark strong as possible. Technologies of digital watermarking are mainly classified depending on their domain to spatial domain watermarks, Watermarks belonging to frequency (tr
APA, Harvard, Vancouver, ISO, and other styles
11

Ren, Na, Xinyan Pang, Changqing Zhu, Shuitao Guo, and Ying Xiong. "Blind and Robust Watermarking Algorithm for Remote Sensing Images Resistant to Geometric Attacks." Photogrammetric Engineering & Remote Sensing 89, no. 5 (2023): 60–71. http://dx.doi.org/10.14358/pers.22-00114r2.

Full text
Abstract:
To address the problem of weak robustness against geometric attacks of remote sensing images' digital watermarking, a robust watermark- ing algorithm based on template watermarking is proposed in this paper, which improves the robustness of digital watermarking against geometric attacks by constructing stable geometric attack invari- ant features. In this paper, the Discrete Fourier Transform domain template watermark is used as the invariant feature against geometric attacks, and the embedding of the cyclic watermark is used to improve the watermark robustness for recovering the watermark syn
APA, Harvard, Vancouver, ISO, and other styles
12

Akash, V. S., P. Johnson Akshay, P. S. Alakanandha, and Reji C. Joy Dr. "Cybersecurity in the Digital Age: Benefits and Protective Measures." Recent Trends in Cyber Criminology Research 1, no. 1 (2025): 22–31. https://doi.org/10.5281/zenodo.15188459.

Full text
Abstract:
<em>Cyber attacks are malicious attempts to compromise systems, disrupt operations, and steal data, posing significant risks to individuals, organizations, and governments. These attacks exploit vulnerabilities through malware, phishing, ransom ware, and DoS attacks, leading to financial losses, reputational damage, and security threats. Preventive measures, such as strong passwords, multifactor authentication, and encryption, enhance cybersecurity. Firewalls, IDSs, and IPSs play a crucial role in defending networks. Advanced techniques like SYN flood monitoring and DoS filtering mitigate thre
APA, Harvard, Vancouver, ISO, and other styles
13

Yang, Xiao, Zhenzhen Zhang, Yueshuang Jiao, and Zichen Li. "A Robust Video Watermarking Algorithm Based on Two-Dimensional Discrete Fourier Transform." Electronics 12, no. 15 (2023): 3271. http://dx.doi.org/10.3390/electronics12153271.

Full text
Abstract:
Due to the continuous development and popularity of digital video technology, the copyright protection of digital video content has become an increasingly prominent issue. Digital video watermarking, as an effective means of digital copyright protection, has attracted widespread attention from academia and industry. The two-dimensional discrete Fourier transform (2D-DFT) template-based method has the advantages of good real-time performance and robustness, but the embedding capacity is small and cannot resist frame-dropping attack. To address this problem, a new template construction method is
APA, Harvard, Vancouver, ISO, and other styles
14

Ahmed, Ahmed, Noor D. AL AL-Shakarchy, and Mais Saad Safoq. "Early DDoS Attack Detection Using Lightweight Deep Neural Network." Fusion: Practice and Applications 19, no. 2 (2025): 392–401. https://doi.org/10.54216/fpa.190228.

Full text
Abstract:
In the digital age, e-commerce platforms are critical components of the global economy, facilitating seamless transactions and interactions between businesses and consumers. The digital infrastructure of these institutions is frequently attacked, either to hack or disrupt online services, leading to significant financial losses and damage to reputation. The most famous of these attacks are DDoS attacks, which lead to an increase in the volume of traffic to the platform's website beyond the capacity of the servers, thus causing the platform to respond slowly and crash and customers to be unable
APA, Harvard, Vancouver, ISO, and other styles
15

Repka, Marek, Michal Varchola, and Miloš Drutarovský. "Improving CPA Attack Against DSA and ECDSA." Journal of Electrical Engineering 66, no. 3 (2015): 159–63. http://dx.doi.org/10.2478/jee-2015-0025.

Full text
Abstract:
Abstract In this work, we improved Correlation Power Analysis (CPA) attack against Digital Signature Algorithm (DSA) and its various derivations, such as Elliptic Curve Digital Signature Algorithm (ECDSA). The attack is aimed against integer multiplication with constant secret operand. We demonstrate this improvement on 16-bit integer multiplier in FPGA. The improvement makes it possible to guess more blocks of key, and the improvement also eliminates errors of simulated attacks what is very important when approximating attack success rate and complexity based on simulated attacks. We also dis
APA, Harvard, Vancouver, ISO, and other styles
16

Shinkaretskaya, Galina Georgievna, and Alisa Mikhailovna Berman. "Cyber-attacks – an unlawful use of digital technologies." Международное право, no. 1 (January 2022): 40–50. http://dx.doi.org/10.25136/2644-5514.2022.1.37271.

Full text
Abstract:
This article notes that cyber-attacks, i.e. disruption of the information systems of persons, companies or countries, are a new type of criminal activity. International law does not yet have does not have normative documents that regulate the procedure of countering cyber-attacks. It is complicated by the fact that in the international law the grounds for taking coercive measures against other country is aggression (armed attack), which confers the right to individual or collective self-defense of the country. It is indicated that the doctrine legitimizes drawing parallels between common opera
APA, Harvard, Vancouver, ISO, and other styles
17

Nik Aein Koupaei, Alireza. "The Evolving Nature of Cyber Attacks and the Need for Proactive Defense Measures." Journal of Research in Engineering and Applied Sciences 8, no. 4 (2023): 634–39. http://dx.doi.org/10.46565/jreas.202384634-639.

Full text
Abstract:
IA growing and pervasive threat in today’s interconnected digital landscape. Cyber-attacks refer to malicious activities carried out by individuals or groups to compromise computer systems, networks, or data for various purposes, including financial gain, espionage, or disruption of services. The research highlights the evolving nature of cyber-attacks, with attackers constantly adapting their tactics, techniques, and procedures to exploit vulnerabilities in technology and human behavior. The analysis emphasizes the wide range of cyber-attack types, such as phishing, malware infections, ransom
APA, Harvard, Vancouver, ISO, and other styles
18

Li, Ying Jiang, and Ying Fang Li. "Randon and Ridgelet Transformation Applicaton in Image Digital Watermark." Advanced Materials Research 756-759 (September 2013): 1925–29. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1925.

Full text
Abstract:
Propose a digital watermark algorithm that can be resisted geometric attack, in order to enhance the capacity to resist attacks such as rotation, use the 0° angle Randon transformation as the reference vector, estimate and correct the rotation transformation of the carrier image, recover the watermark synchronization. when watermark is embedded, perform wavelet transform on original image and blocked the LF sub-band, perform the Ridgelet transformation on each block; change two-value watermark to one-dimension, embedded the watermark bit into the Maximum energy direction of Ridgelet. The simul
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Zheng Bao, and Chao Jia. "Digital Image Zero-Watermarking Algorithm Based on Improved Wavelet Moment." Applied Mechanics and Materials 347-350 (August 2013): 3232–36. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3232.

Full text
Abstract:
Lots of anti-RST attacks watermarking algorithms have been proposed, but few solutions for local geometric attacks, in this paper it proposed a new algorithm combined with the the Wavelet Moment for an anti-geometric attacks. Since wavelet moment was proposed, it is widely used in the field of computer vision, image processing, but the large amount of computation must be improved to be applied to digital watermarking technology so that it can adapt to the real-time detection of digital watermarking. By image rotation, scaling, translation, shear, local distortions, filtering attack operations
APA, Harvard, Vancouver, ISO, and other styles
20

MT, Suryadi, Achmad Eriza Aminanto, and Muhamad Erza Aminanto. "Empowering Digital Resilience: Machine Learning-Based Policing Models for Cyber-Attack Detection in Wi-Fi Networks." Electronics 13, no. 13 (2024): 2583. http://dx.doi.org/10.3390/electronics13132583.

Full text
Abstract:
In the wake of the COVID-19 pandemic, there has been a significant digital transformation. The widespread use of wireless communication in IoT has posed security challenges due to its vulnerability to cybercrime. The Indonesian National Police’s Directorate of Cyber Crime is expected to play a preventive role in supervising these attacks, despite lacking a specific cyber-attack prevention function. An Intrusion Detection System (IDS), employing artificial intelligence, can differentiate between cyber-attacks and non-attacks. This study focuses on developing a machine learning-based policing mo
APA, Harvard, Vancouver, ISO, and other styles
21

Damayanti, Tri Hesti, and Ira Rosianal Hikmah. "Network Forensic Serangan DoS pada Jaringan Cloud berdasarkan Generic Framework for Network Forensics (GFNF)." Edumatic: Jurnal Pendidikan Informatika 6, no. 2 (2022): 334–43. http://dx.doi.org/10.29408/edumatic.v6i2.6466.

Full text
Abstract:
The attacks on cloud-based networks have increased and could lead to various disadvantages such as the inaccessibility of services until the loss of user’s trust. Owncloud is one cloud implementation that runs on a network with more than 200 million users. The aims of these researches are to find digital evidence from DoS attacks. Some DoS attacks are SSH brute force, SYN flood, ping of death, and port scanning on the Owncloud network and then finding the digital evidence such as the attacker's IP, time occurred of the attack, types of the attack, also the resource usage of CPU and RAM. This r
APA, Harvard, Vancouver, ISO, and other styles
22

Rizal, Randi, Siti Rahayu Selamat, Mohd Zaki Mas’ud, and Nur Widiyasono. "Enhanced Readiness Forensic Framework for the Complexity of Internet of Things (IoT) Investigation Based on Artificial Intelligence." Journal of Advanced Research in Applied Sciences and Engineering Technology 50, no. 1 (2024): 121–35. http://dx.doi.org/10.37934/araset.50.1.121135.

Full text
Abstract:
The growing versatility of Internet of Things devices increases the possibility of multiple attacks occurring and being carried out continuously. The limited processing capabilities and memory capacity of Internet of Things devices pose challenges for security and forensic analysis in collecting and documenting various attacks targeting these devices during the forensic investigation process. Thus, forensic investigative analysis goes beyond expectations, offering a holistic understanding of the complex consequences arising from IoT device attacks that have occurred. These issues and challenge
APA, Harvard, Vancouver, ISO, and other styles
23

Alzahrani, Ali. "Detecting Digital Watermarking Image Attacks Using a Convolution Neural Network Approach." Security and Communication Networks 2022 (June 6, 2022): 1–12. http://dx.doi.org/10.1155/2022/4408336.

Full text
Abstract:
In scientific research, one of the most significant problems of recent years has been and continues to be the protection of digital material. The advancement of Internet technology has allowed for the illicit duplication, authentication, and distribution of digital material by unauthorized individuals. For this reason, a variety of watermarking systems have been investigated for a variety of purposes, including broadcast monitoring, intellectual property protection, content authentication, and copy control. There are various types of the watermarking image attacks that impact the quality of th
APA, Harvard, Vancouver, ISO, and other styles
24

Courtney, M. "Digital doomsday [simultaneous cyber attacks]." Engineering & Technology 14, no. 10 (2019): 26–29. http://dx.doi.org/10.1049/et.2019.1000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Vijayalakshmi K, N. V. S. K., Dr J. Sasikala, and Dr C. Shanmuganathan. "Advancements in Image-Based Attack Detection: A Comparative Analysis of Copy-Paste and Medical Image Attacks Using Deep Learning Techniques." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–7. https://doi.org/10.55041/ijsrem.ncft028.

Full text
Abstract:
In this paper, a comparative analysis of two distinct types of attacks is conducted: copy-paste attacks and attacks on medical images. The first part of the analysis focuses on techniques for detecting copy-paste attacks, involving the unauthorized duplication and manipulation of digital content. Methodologies, datasets, and performance metrics utilized in existing research are examined to evaluate the efficacy of detection methods. The second part of the analysis shifts focus to attacks on medical images. One approach involves detecting attacks using features extracted from Principal Componen
APA, Harvard, Vancouver, ISO, and other styles
26

Ahmad, Musheer, and Hamed D. AlSharari. "Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map." International Journal of Rough Sets and Data Analysis 5, no. 4 (2018): 61–73. http://dx.doi.org/10.4018/ijrsda.2018100104.

Full text
Abstract:
In the recent past, a new statistically efficient digital image watermarking scheme based on chaotic map was proposed. The authors of this watermarking scheme claimed under study that their scheme is efficient, secure, and highly robust against various attacks. However, the security analysis of the scheme unveils that it has serious inherent flaws. In this article, the shortcomings of the proposed watermarking scheme and cryptanalysis are presented to demonstrate that the scheme is not secure against the proposed attacks. Specifically, with the chosen host image and chosen watermarks, we can s
APA, Harvard, Vancouver, ISO, and other styles
27

Leontyev, Alexander S., and Dmitry V. Zhmatov. "Probabilistic characteristics analysis of virus attack effect on digital substations." Russian Technological Journal 13, no. 1 (2025): 28–37. https://doi.org/10.32362/2500316x-2025-13-1-28-37.

Full text
Abstract:
Objectives. This study aims to create analytical methods for evaluating the probabilistic safety characteristics of information and software elements in digital substations in order to ensure security in different virus scenarios.Methods. The methods of reliability theory, random process theory, and recovery theory were used.Results. The derived integral ratios were further used to estimate the probability characteristics of information processing security when performing functional tasks in various scenarios of attacks on digital substations, as well as multiple technologies used for protecti
APA, Harvard, Vancouver, ISO, and other styles
28

Palaniappan, Sellappan, Rajasvaran Logeswaran, Shapla Khanam, and Pulasthi Gunawardhana. "Social Engineering Threat Analysis Using Large-Scale Synthetic Data." Journal of Informatics and Web Engineering 4, no. 1 (2025): 70–80. https://doi.org/10.33093/jiwe.2025.4.1.6.

Full text
Abstract:
We frequently hear news about compromised systems, virus attacks, spam emails, stolen bank account numbers, and loss of money. Safeguarding and protecting digital assets against these and other cyber-attacks are extremely important in our digital connected world today. Many organizations spend substantial amounts of money to protect their digital assets. One type of cyber threat that is rampant these days is social engineering attacks that work on human psychology. These attacks typically persuade, convince, trick and threaten naïve and innocent individuals to divulge sensitive information to
APA, Harvard, Vancouver, ISO, and other styles
29

Samer, Moein1, Aaron Gulliver1 T., Gebali1 Fayez, and Alkandari2 Abdulrahman. "Hardware Attack Mitigation Techniques Analysis." International Journal on Cryptography and Information Security (IJCIS) 7, no. 1 (2017): 1–20. https://doi.org/10.5281/zenodo.1186619.

Full text
Abstract:
ABSTRACT The goal of a hardware attack is to physically access a digital system to obtain secret information or modify the system behavior. These attacks can be classified as covert or overt based on the awareness of the attack. Each hardware attack has capabilities as well as objectives. Some employ hardware trojans, which are inserted during, manufacture, while others monitor system emissions. Once a hardware attack has been identified, mitigation techniques should be employed to protect the system. There are now a wide variety of techniques, which can be used against hardware attacks. In th
APA, Harvard, Vancouver, ISO, and other styles
30

Joseph, Paul, and Jasmine Norman. "Systematic Memory Forensic Analysis of Ransomware using Digital Forensic Tools." International Journal of Natural Computing Research 9, no. 2 (2020): 61–81. http://dx.doi.org/10.4018/ijncr.2020040105.

Full text
Abstract:
Cybercrimes catastrophically caused great financial loss in the year 2018 as powerful obfuscated malware known as ransomware continued to be a continual threat to governments and organizations. Advanced malwares capable of system encryption with sophisticated obscure keys left organizations paying the ransom that hackers demand. Since every individual is vulnerable to this assault, cyber forensics play a vital role either in educating society or combating the attacks. As cyber forensics is classified into many subdomains, memory forensics is the domain that leads in curbing these types of atta
APA, Harvard, Vancouver, ISO, and other styles
31

Lavrova, Darya, Pavel Semyanov, Anna Shtyrkina, and Peter Zegzhda. "Wavelet-analysis of network traffic time-series for detection of attacks on digital production infrastructure." SHS Web of Conferences 44 (2018): 00052. http://dx.doi.org/10.1051/shsconf/20184400052.

Full text
Abstract:
Digital production integrates with all the areas of human activity including critical industries, therefore the task of detecting network attacks has a key priority in protecting digital manufacture systems. This article offers an approach for analysis of digital production security based on evaluation of a posteriori probability for change point in time-series, which are based on the change point coefficient values of digital wavelet-transform in the network traffic time-series. These time-series make it possible to consider the network traffic from several points of view at the same time, wh
APA, Harvard, Vancouver, ISO, and other styles
32

Zay, Rani Aflisa, and Mesran Mesran. "Analisa Metode MGR Untuk Mendeteksi Keaslian Citra Digital." TIN: Terapan Informatika Nusantara 2, no. 8 (2022): 492–500. http://dx.doi.org/10.47065/tin.v2i8.1029.

Full text
Abstract:
Digital image processing is an important part that underlies various real applications, such as pattern recognition, remote sensing via satellite or aircraft, and machine vision. In pattern recognition, digital image processing plays a role in separating objects from the background automatically. Almost all applications of information technology use cryptography as a tool to ensure the security and confidentiality of data or information. Because of this, cryptography has become a rapidly growing science and in a short time many new algorithms have emerged which are considered superior to their
APA, Harvard, Vancouver, ISO, and other styles
33

Mahmoud, Mahmoud, and Ahmed A. Metwaly. "Enhancing Wireless Ad-Hoc Network Security by Mitigating Distributed Denial-of-Service (DDoS) Attacks." International Journal of Wireless and Ad Hoc Communication 8, no. 2 (2024): 46–52. http://dx.doi.org/10.54216/ijwac.080205.

Full text
Abstract:
The increasing threat landscape of Distributed Denial-of-Service (DDoS) attacks makes network security a major concern. These attacks are a serious challenge to the stability and integrity of digital infrastructures. This research paper is an in-depth study on how to enhance network security through the detection and mitigation of DDoS attacks. The study reviews existing literature on DDoS attack mitigation strategies, emphasizing the evolving nature of these threats and the imperative for robust defense mechanisms. The research uses statistical analysis and logistic regression to provide a de
APA, Harvard, Vancouver, ISO, and other styles
34

Voloshynovskiy, S., S. Pereira, T. Pun, J. J. Eggers, and J. K. Su. "Attacks on digital watermarks: classification, estimation based attacks, and benchmarks." IEEE Communications Magazine 39, no. 8 (2001): 118–26. http://dx.doi.org/10.1109/35.940053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kingsley O., Igboji, Ogbaga Ignatius N., and Otubo Chika T. "Enabling Adaptable Cybersecurity Precepts Classifier and Optimization Strategies For Cloud Navigation Safety - A Technical Review." advances in multidisciplinary & scientific research journal publication 13, no. 1 (2025): 99–110. https://doi.org/10.22624/aims/digital/v13n1p7.

Full text
Abstract:
Emerging trends in technology innovations and persistent quest for a digitally driven society has geometrically increased the spate of cybercrimes across different domains and sectors. As a result, classified advances in cybersecurity enable cyber experts to withstand, prevent and conquer the activities of cybercriminals. Cybersecurity entails the practice of devising robust measures to protect computer networks, digital devices, and sensitive data from unauthorized access or criminal attacks. It focuses on ensuring confidentiality, integrity, and availability which is the CIA triad of informa
APA, Harvard, Vancouver, ISO, and other styles
36

Qiu, Hanshuo, Xiangzi Zhang, Huaixiao Yue, and Jizhao Liu. "A Novel Eighth-Order Hyperchaotic System and Its Application in Image Encryption." Mathematics 11, no. 19 (2023): 4099. http://dx.doi.org/10.3390/math11194099.

Full text
Abstract:
With the advancement in information and communication technologies (ICTs), the widespread dissemination and sharing of digital images has raised concerns regarding privacy and security. Traditional methods of encrypting images often suffer from limitations such as a small key space and vulnerability to brute-force attacks. To address these issues, this paper proposes a novel eighth-order hyperchaotic system. This hyperchaotic system exhibits various dynamic behaviors, including hyperchaos, sub-hyperchaos, and chaos. The encryption scheme based on this system offers a key space larger than 2233
APA, Harvard, Vancouver, ISO, and other styles
37

Adani, Dwi Wina, Ida Nurhayati, and R. Elly Mirati. "The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia." SOSHUM : Jurnal Sosial dan Humaniora 14, no. 3 (2024): 207–14. https://doi.org/10.31940/soshum.v14i3.207-214.

Full text
Abstract:
The advent of the digital world does not always have positive impacts, it often poses serious attacks that can be highly detrimental to its users, one of which is phishing. Phishing attacks are among the attacks that have been continuously rising in the digital world. With its various forms, phishing stands out as a significant attack, particularly harmful to housewives. Therefore, cultivating security awareness is of paramount importance in preventing customers from becoming victims of phishing attacks. This research aims to explain the importance of security awareness in preventing phishing
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Shunxin, Ajian Liu, Junze Zheng, et al. "Mixture-of-Attack-Experts with Class Regularization for Unified Physical-Digital Face Attack Detection." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 2 (2025): 2195–203. https://doi.org/10.1609/aaai.v39i2.32218.

Full text
Abstract:
Unified detection of digital and physical attacks in facial recognition systems has become a focal point of research in recent years. However, current multi-modal methods typically ignore the intra-class and inter-class variability across different types of attacks, leading to degraded performance. To address this limitation, we propose MoAE-CR, a framework that effectively leverages class-aware information for improved attack detection. Our improvements manifest at two levels, i.e., the feature and loss level. At the feature level, we propose Mixture-of-Attack-Experts (MoAEs) to capture more
APA, Harvard, Vancouver, ISO, and other styles
39

DEJEY and R. S. RAJESH. "AN IMPROVED WAVELET DOMAIN DIGITAL WATERMARKING FOR IMAGE PROTECTION." International Journal of Wavelets, Multiresolution and Information Processing 08, no. 01 (2010): 19–31. http://dx.doi.org/10.1142/s021969131000333x.

Full text
Abstract:
Watermarking is a potential method for the protection of ownership rights on digital images. A robust, invisible, non-blind watermarking scheme in the wavelet domain is proposed in this paper. The watermark is embedded in the mid frequency band after performing a single level wavelet decomposition using Discrete Wavelet Transform (DWT). The coefficients are grouped randomly prior to watermarking. The watermarked image is tested for various attacks including filtering and geometric attacks. The novelty of the proposed approach is that it provides better resistance to collusion attack also when
APA, Harvard, Vancouver, ISO, and other styles
40

Yang, Kaichen, Tzungyu Tsai, Honggang Yu, Tsung-Yi Ho, and Yier Jin. "Beyond Digital Domain: Fooling Deep Learning Based Recognition System in Physical World." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (2020): 1088–95. http://dx.doi.org/10.1609/aaai.v34i01.5459.

Full text
Abstract:
Adversarial examples that can fool deep neural network (DNN) models in computer vision present a growing threat. The current methods of launching adversarial attacks concentrate on attacking image classifiers by adding noise to digital inputs. The problem of attacking object detection models and adversarial attacks in physical world are rarely touched. Some prior works are proposed to launch physical adversarial attack against object detection models, but limited by certain aspects. In this paper, we propose a novel physical adversarial attack targeting object detection models. Instead of simp
APA, Harvard, Vancouver, ISO, and other styles
41

Jaideep Gera, Et al. "An Artificial Intelligence (AI) Framework for Detection of Distributed Reflection Denial of Service Attacks." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 3539–45. http://dx.doi.org/10.17762/ijritcc.v11i9.9574.

Full text
Abstract:
In the contemporary digital world, cyber space is growing continuously witnessing amalgamation of different technologies associated with telecommunications, networking and sensing to mention few. This has enabled Service Oriented Architecture (SOA) to realize distributed applications that cater to the needs of enterprises in the real world. With the advantages of such environments, there has been increased number of instances of cyber-attacks. Distributed Denial of Service (DDoS) is the large-scale attack targeting critical digital infrastructure to make it useless for certain amount of time.
APA, Harvard, Vancouver, ISO, and other styles
42

Aslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz, and Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions." Electronics 12, no. 6 (2023): 1333. http://dx.doi.org/10.3390/electronics12061333.

Full text
Abstract:
Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace. Recently, cyber criminals have started to use cyber attacks as a service to
APA, Harvard, Vancouver, ISO, and other styles
43

Shen, Qian, and Wenbo Liu. "A Novel Digital Image Encryption Algorithm Based on Orbit Variation of Phase Diagram." International Journal of Bifurcation and Chaos 27, no. 13 (2017): 1750204. http://dx.doi.org/10.1142/s0218127417502042.

Full text
Abstract:
Chaotic systems have been widely used in digital image encryption algorithms because of their characteristics of deterministic randomness, extreme sensitivity to initial values, etc. Although these chaos-based algorithms are good at performance in general, most of them are ineffective when confronting attacks such as the chosen plain image attack. So, this paper proposes a new digital image encryption algorithm based on orbit variation of phase diagram (AOVPD), which modifies the iterative sequence of chaotic system with the pixel values of plain image. Theoretical analysis proves that the pro
APA, Harvard, Vancouver, ISO, and other styles
44

Jimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 2, no. 1 (2024): 129–71. http://dx.doi.org/10.60087/jaigs.v2i1.102.

Full text
Abstract:
The proliferation of internet usage has surged dramatically, prompting individuals and businesses to conduct myriad transactions online rather than in physical spaces. The onset of the COVID-19 pandemic has further propelled this trend. Consequently, traditional forms of crime have migrated to the digital realm alongside the widespread adoption of digital technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and crypto currencies, amplifying security concerns in cyberspace. Notably, cybercriminals have begun offering cyber attacks as a servic
APA, Harvard, Vancouver, ISO, and other styles
45

Jimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.

Full text
Abstract:
The proliferation of internet usage has surged dramatically, prompting individuals and businesses to conduct myriad transactions online rather than in physical spaces. The onset of the COVID-19 pandemic has further propelled this trend. Consequently, traditional forms of crime have migrated to the digital realm alongside the widespread adoption of digital technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and crypto currencies, amplifying security concerns in cyberspace. Notably, cybercriminals have begun offering cyber attacks as a servic
APA, Harvard, Vancouver, ISO, and other styles
46

Jimmy, Fnu. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.

Full text
Abstract:
The proliferation of internet usage has surged dramatically, prompting individuals and businesses to conduct myriad transactions online rather than in physical spaces. The onset of the COVID-19 pandemic has further propelled this trend. Consequently, traditional forms of crime have migrated to the digital realm alongside the widespread adoption of digital technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and crypto currencies, amplifying security concerns in cyberspace. Notably, cybercriminals have begun offering cyber attacks as a servic
APA, Harvard, Vancouver, ISO, and other styles
47

Ahmed, Sheikh Shehzad. "A Study of Machine Learning Algorithms for DDoS Detection." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 174–78. http://dx.doi.org/10.22214/ijraset.2021.34922.

Full text
Abstract:
The Internet is used practically everywhere in today's digital environment. With the increased use of the Internet comes an increase in the number of threats. DDoS attacks are one of the most popular types of cyber-attacks nowadays. With the fast advancement of technology, the harm caused by DDoS attacks has grown increasingly severe. Because DDoS attacks may readily modify the ports/protocols utilized or how they function, the basic features of these attacks must be examined. Machine learning approaches have also been used extensively in intrusion detection research. Still, it is unclear what
APA, Harvard, Vancouver, ISO, and other styles
48

Vinayak, Bhardwaj, and K.B.Ramesh. "Design of Secure Digital Circuits for Cryptographic Applications." Journal of Control System and its Recent Developments 7, no. 3 (2024): 9–16. https://doi.org/10.5281/zenodo.13735662.

Full text
Abstract:
<em>The increasing reliance on digital systems for secure communication and data protection has made cryptographic applications a critical area of research. While software-based security measures are well-established, the hardware implementing cryptographic algorithms remains vulnerable to sophisticated attacks, such as side-channel analysis, hardware trojans, and fault injection attacks. This paper presents a comprehensive approach to designing secure digital circuits specifically tailored for cryptographic applications. The proposed methodology integrates advanced security techniques at ever
APA, Harvard, Vancouver, ISO, and other styles
49

Zhang, Ximin, Jinyin Chen, Haibin Zheng, and Zhenguang Liu. "PhyCamo: A Robust Physical Camouflage via Contrastive Learning for Multi-View Physical Adversarial Attack." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 10 (2025): 10230–38. https://doi.org/10.1609/aaai.v39i10.33110.

Full text
Abstract:
Deep neural networks (DNNs) have achieved remarkable success in widespread applications. Meanwhile, its vulnerability towards carefully crafted adversarial attacks captures special attention. Not only adversarial perturbations in digital space will fool the target DNNs-based detectors making a wrong decision, but also actually printed patches can be camouflaged to defeat detectors in physical space. In particular, multi-view physical adversarial attacks pose a more serious threat to practical scenarios. The existing attacks are still challenged in three aspects, i.e., high-cost data augmentati
APA, Harvard, Vancouver, ISO, and other styles
50

Singh, Rajeev, and T. P. Sharma. "Present Status of Distributed Denial of Service (DDoS) Attacks in Internet World." International Journal of Mathematical, Engineering and Management Sciences 4, no. 4 (2019): 1008–17. http://dx.doi.org/10.33889/ijmems.2019.4.4-080.

Full text
Abstract:
Distributed Denial of Service (DDoS) attack harms the digital availability in Internet. The user’s perspective of getting quick and effective services may be badly hit by the DDoS attackers. There are several reports of DDoS attack incidences that have caused devastating effects on the user and web services in the Internet world. In the present digital world dominated by wireless, mobile and IoT devices, the numbers of users are increasing day by day. Most of the users are novice and therefore their devices either fell prey to DDoS attacks or unknowingly add themselves to the DDoS attack Army.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!