Journal articles on the topic 'Threats and Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Threats and Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sarkunavathi, A., and V. Srinivasan. "A Detailed Study on Advanced Persistent Threats: A Sophisticated Threat." Asian Journal of Computer Science and Technology 7, S1 (2018): 90–95. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1797.
Full textRajeev, Gautham K. "Identifying Vulnerabilities and Reducing Cyber Risks and Attacks Using a Cyber Security Lab Environment." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 1625–34. http://dx.doi.org/10.22214/ijraset.2022.46468.
Full textAkash, V. S., P. Johnson Akshay, P. S. Alakanandha, and Reji C. Joy Dr. "Cybersecurity in the Digital Age: Benefits and Protective Measures." Recent Trends in Cyber Criminology Research 1, no. 1 (2025): 22–31. https://doi.org/10.5281/zenodo.15188459.
Full textWang, Haojun. "Distributed Denial of Service Attack with Large Language Model." Highlights in Science, Engineering and Technology 138 (May 11, 2025): 132–37. https://doi.org/10.54097/586gg060.
Full textWu, Qi, Qiang Li, Dong Guo, and Xiangyu Meng. "Exploring the vulnerability in the inference phase of advanced persistent threats." International Journal of Distributed Sensor Networks 18, no. 3 (2022): 155013292210804. http://dx.doi.org/10.1177/15501329221080417.
Full textViswanathan, Ganesh, and Prabhu J. "A hybrid threat model for system-centric and attack-centric for effective security design in SDLC." Web Intelligence 19, no. 1-2 (2021): 1–11. http://dx.doi.org/10.3233/web-210452.
Full textSylvester, F. Ley. "Mobile Device Users’ Susceptibility to Phishing Attacks." International Journal of Computer Science and Information Technology 14, no. 1 (2022): 1–18. http://dx.doi.org/10.5121/ijcsit.2022.14101.
Full textYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang, and Zhihao Liang. "Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study." Transactions on Computer Science and Intelligent Systems Research 3 (April 10, 2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.
Full textPalaniappan, Sellappan, Rajasvaran Logeswaran, Shapla Khanam, and Pulasthi Gunawardhana. "Social Engineering Threat Analysis Using Large-Scale Synthetic Data." Journal of Informatics and Web Engineering 4, no. 1 (2025): 70–80. https://doi.org/10.33093/jiwe.2025.4.1.6.
Full textLi, Jiawei, Ru Zhang, Jianyi Liu, and Gongshen Liu. "LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering." Security and Communication Networks 2022 (September 27, 2022): 1–16. http://dx.doi.org/10.1155/2022/4577141.
Full textNaik, Anushka. "Threats due To Side Channel Attacks (SCA) in Smartphones." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 07 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem36777.
Full textJanisar, Aftab Alam, Khairul Shafee bin Kalid, Aliza Bt Sarlan, M. Aqeel Iqbal, and Muhammad Amir Khan. "Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets." JOIV : International Journal on Informatics Visualization 8, no. 3-2 (2024): 1827. https://doi.org/10.62527/joiv.8.3-2.3084.
Full textMousa, Rama Soliman, and Rami Shehab. "Applying risk analysis for determining threats and countermeasures in workstation domain." Journal of Cyber Security and Risk Auditing 2025, no. 1 (2025): 12–21. https://doi.org/10.63180/jcsra.thestap.2025.1.2.
Full textLehto, Martti. "APT Cyber-attack Modelling: Building a General Model." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 121–29. http://dx.doi.org/10.34190/iccws.17.1.36.
Full textVivek, Vivek, and Karthik Painganadu Chandrasekaran. "Integrating Novel Mechanisms for Threat Detection in Enhanced Data Classification using Ant Colony Optimization with Recurrent Neural Network." Journal of Cybersecurity and Information Management 14, no. 2 (2024): 132–47. http://dx.doi.org/10.54216/jcim.140209.
Full textRichardson, Caleb, Mark Reith, and Wayne Henry. "Ensuring the Security of Space Systems from Eavesdropping Attacks." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 522–26. http://dx.doi.org/10.34190/iccws.17.1.65.
Full textRizki, Aththaariq, and Fauzia Gustarina Cempaka Timur. "SYNERGY OF MULTI-STAKEHOLDERS IN DEFENDING INDONESIA FROM CYBER THREATS." Journal of Social Political Sciences 2, no. 4 (2021): 342–54. http://dx.doi.org/10.52166/jsps.v2i4.80.
Full textMurkute, Abhinav. "Smart-shield: Dual Phase ML Defense for IOT Botnet Threats." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49808.
Full textYeboah-Ofori, Abel, and Shareeful Islam. "Cyber Security Threat Modeling for Supply Chain Organizational Environments." Future Internet 11, no. 3 (2019): 63. http://dx.doi.org/10.3390/fi11030063.
Full textAvdan, Nazli, and Clayton Webb. "Not in My Back Yard: Public Perceptions and Terrorism." Political Research Quarterly 72, no. 1 (2018): 90–103. http://dx.doi.org/10.1177/1065912918776118.
Full textAdem Şimşek, Adem Şimşek. "DETECTION OF ADVANCED PERSISTENT THREATS USING SIEM RULESETS." PIRETC-Proceeding of The International Research Education & Training Centre 28, no. 07 (2023): 25–31. http://dx.doi.org/10.36962/piretc28072023-25.
Full textBoulifa, Roua, Giorgio Di Natale, and Paolo Maistri. "Countermeasures Against Fault Injection Attacks in Processors: A Review." Information 16, no. 4 (2025): 293. https://doi.org/10.3390/info16040293.
Full textJayaraj, Irrai Anbu, Bharanidharan Shanmugam, Sami Azam, and Ganthan Narayana Samy. "A Systematic Review of Radio Frequency Threats in IoMT." Journal of Sensor and Actuator Networks 11, no. 4 (2022): 62. http://dx.doi.org/10.3390/jsan11040062.
Full textBhardwaj, Akashdeep, Keshav Kaushik, Abdullah Alomari, Amjad Alsirhani, Mohammed Mujib Alshahrani, and Salil Bharany. "BTH: Behavior-Based Structured Threat Hunting Framework to Analyze and Detect Advanced Adversaries." Electronics 11, no. 19 (2022): 2992. http://dx.doi.org/10.3390/electronics11192992.
Full textLallie, Harjinder Singh, Andrew Thompson, Elzbieta Titis, and Paul Stephens. "Analysing Cyber Attacks and Cyber Security Vulnerabilities in the University Sector." Computers 14, no. 2 (2025): 49. https://doi.org/10.3390/computers14020049.
Full textAththaariq Rizki. "UTILIZATION OF THE SEMESTA DEFENSE CONCEPT IN FACING SIBER ATTACKS DURING THE COVID-19 PANDEMIC IN INDONESIA." Edukasi IPS 5, no. 2 (2021): 18–26. http://dx.doi.org/10.21009/eips.005.02.03.
Full textTaylor, Sean Joe, Farhan Ahmad, Hoang Nga Nguyen, and Siraj Ahmed Shaikh. "Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges." Sensors 23, no. 1 (2022): 134. http://dx.doi.org/10.3390/s23010134.
Full textPreuveneers, Davy, and Wouter Joosen. "Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence." Journal of Cybersecurity and Privacy 1, no. 1 (2021): 140–63. http://dx.doi.org/10.3390/jcp1010008.
Full textKhan, Mohammed Mustafa. "Planning and Preparation of Cybersecurity." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–3. http://dx.doi.org/10.55041/ijsrem25870.
Full textAkuffo-Badoo, Erastus B. "Understanding Advanced Persistent Threats." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 15–22. http://dx.doi.org/10.22624/aims/crp-bk3-p3.
Full textWITKOWSKI, Marek, and Anna WOJACZEK. "CYBER ATTACKS AND THREATS." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 184, no. 2 (2017): 184–94. http://dx.doi.org/10.5604/01.3001.0010.4908.
Full textWinnie Owoko. "Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions." World Journal of Advanced Engineering Technology and Sciences 11, no. 2 (2024): 454–75. http://dx.doi.org/10.30574/wjaets.2024.11.2.0127.
Full textShubham, Shrey, Dr Aashima Mehta, and Ms Vimmi Malhotra. "Exploring Security Strategies: Safeguarding Networks From Cyber Attacks With Advanced Cyber Security Techniques." International Journal of Environmental Sciences 11, no. 9s (2025): 1151–59. https://doi.org/10.64252/zfh2tk92.
Full textBarczak, Michał. "Cyber Threats of Machine Learning." Studia Informatica. System and information technology 31, no. 2 (2025): 35–48. https://doi.org/10.34739/si.2024.31.03.
Full textKadhim, Vinas Khalid. "TECHNIQUES TO PROTECT AGAINST CYBER ATTACKS." American Journal of Engineering and Technology 6, no. 7 (2024): 81–93. http://dx.doi.org/10.37547/tajet/volume06issue07-09.
Full textAprilia Tobing, Elsa Kristi, Rara Eka Septya, and Yustian Servanda. "Comparative Analysis of Network Security: Firewall, IDS, and AI-Based Defense Against DDoS Attacks." Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4, no. 3 (2025): 1818–22. https://doi.org/10.59934/jaiea.v4i3.1026.
Full textGUEDES, ELLOÁ B., F. M. DE ASSIS, and BERNARDO LULA. "Quantum attacks on pseudorandom generators." Mathematical Structures in Computer Science 23, no. 3 (2012): 608–34. http://dx.doi.org/10.1017/s0960129512000825.
Full textKumar, R. Dhileep. "ML Based Detection & Classification of High- and Low-Rate DDoS Attacks." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41808.
Full textTkachov, Andrii, Roman Korolov, Irada Rahimova, Iryna Aksonova, and Yelyzaveta Sevriukova. "CYBERSECURITY CHALLENGES AND SOLUTIONS FOR CRITICAL INFRASTRUCTURE PROTECTION." Ukrainian Scientific Journal of Information Security 30, no. 1 (2024): 58–66. http://dx.doi.org/10.18372/2225-5036.30.18604.
Full textFarrel, Farhan Ibnu Farrel, Is Mardianto, S.Si, M.Kom, and Ir. Adrian Sjamsul Qamar, MTI. "IMPLEMENTATION OF SECURITY INFORMATION & EVENT MANAGEMENT (SIEM) WAZUH WITH ACTIVE RESPONSE AND TELEGRAM NOTIFICATION FOR MITIGATING BRUTE FORCE ATTACKS ON THE GT-I2TI USAKTI INFORMATION SYSTEM." Intelmatics 4, no. 1 (2024): 1–7. http://dx.doi.org/10.25105/itm.v4i1.18529.
Full textSufi, Fahim. "A New Time Series Dataset for Cyber-Threat Correlation, Regression and Neural-Network-Based Forecasting." Information 15, no. 4 (2024): 199. http://dx.doi.org/10.3390/info15040199.
Full textA. K. Bagdat and Z. M. Alimzhanova. "INFORMATION SECURITY THREATS FOR INTEGRATION SYSTEMS." Bulletin of Toraighyrov University. Physics & Mathematics series, no. 4.2024 (December 30, 2024): 20–29. https://doi.org/10.48081/dfqb8925.
Full textLysenko, Serhii. "MODERN INFORMATION SECURITY ANALYSIS: INTEGRATION OF BEST PRACTICES AND TECHNOLOGIES INTO ADMINISTRATIVE AND LEGAL MEASURES." International Humanitarian Journal – Sophia Prima: dialogue of eternal recurrence 2, no. 1(3) (2020): 31–38. http://dx.doi.org/10.34170/2707-370x-2020-31-38.
Full textDixit, Ms Keerti. "Attack Taxonomy for Cyber-Physical System." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 194–200. http://dx.doi.org/10.22214/ijraset.2022.39734.
Full textLaila, Bubaker, Yousef Aisha, and Algariani Walid. "A Systematic Mapping Study on Web services Security Threats, Vulnerabilities, and Countermeasures." AlQalam Journal of Medical and Applied Sciences 4, no. 1 (2021): 91–100. https://doi.org/10.5281/zenodo.4460572.
Full textDarshini, S., A. Thrisha, M. Navya Sree, G. Varshitha, and G. Thippanna. "Dark Sides of Cyber Attacks: Protection from the Assorted Cyber Attacks." Journal of Cyber Security, Privacy Issues and Challenges 4, no. 1 (2025): 14–21. https://doi.org/10.46610/jcspic.2025.v04i01.002.
Full textLe, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Full textJaganathan, Venkatesh, Priyesh Cherurveettil, and Premapriya Muthu Sivashanmugam. "Using a Prediction Model to Manage Cyber Security Threats." Scientific World Journal 2015 (2015): 1–5. http://dx.doi.org/10.1155/2015/703713.
Full textK.M, Akhil, Rahul C.T, and Athira V.B. "Distributed Denial of Service (DDoS) Attacks and Defence Mechanism." International Journal of Computer Science and Mobile Computing 10, no. 3 (2021): 83–88. http://dx.doi.org/10.47760/ijcsmc.2021.v10i03.010.
Full textAslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz, and Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions." Electronics 12, no. 6 (2023): 1333. http://dx.doi.org/10.3390/electronics12061333.
Full text