Статті в журналах з теми "Cyber alerts"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Cyber alerts".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Chen, Haipeng, Andrew Duncklee, Sushil Jajodia, Rui Liu, Sean Mcnamara, and V. S. Subrahmanian. "PCAM: A Data-driven Probabilistic Cyber-alert Management Framework." ACM Transactions on Internet Technology 22, no. 3 (August 31, 2022): 1–24. http://dx.doi.org/10.1145/3511101.
Повний текст джерелаAlbasheer, Hashim, Maheyzah Md Siraj, Azath Mubarakali, Omer Elsier Tayfour, Sayeed Salih, Mosab Hamdan, Suleman Khan, Anazida Zainal, and Sameer Kamarudeen. "Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey." Sensors 22, no. 4 (February 15, 2022): 1494. http://dx.doi.org/10.3390/s22041494.
Повний текст джерелаAlmseidin, Mohammad, Mouhammad Alkasassbeh, Maen Alzubi, and Jamil Al-Sawwa. "Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation." Cryptography 6, no. 2 (May 7, 2022): 24. http://dx.doi.org/10.3390/cryptography6020024.
Повний текст джерелаCheng, Xiang, Jiale Zhang, and Bing Chen. "Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation." Sensors 19, no. 18 (September 19, 2019): 4045. http://dx.doi.org/10.3390/s19184045.
Повний текст джерелаGay, Chris, Barry Horowitz, John Elshaw, Philip Bobko, and Inki Kim. "Operator Suspicion and Decision Responses to Cyber-Attacks on Unmanned Ground Vehicle Systems." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 226–30. http://dx.doi.org/10.1177/1541931213601540.
Повний текст джерелаAngelini, Marco, and Giuseppe Santucci. "Cyber situational awareness: from geographical alerts to high-level management." Journal of Visualization 20, no. 3 (July 12, 2016): 453–59. http://dx.doi.org/10.1007/s12650-016-0377-3.
Повний текст джерелаYang, Gang, Chaojing Tang, and Xingtong Liu. "DualAC2NN: Revisiting and Alleviating Alert Fatigue from the Detection Perspective." Symmetry 14, no. 10 (October 13, 2022): 2138. http://dx.doi.org/10.3390/sym14102138.
Повний текст джерелаPriyawati, Diah, Siti Rokhmah, and Ihsan Cahyo Utomo. "Website Vulnerability Testing and Analysis of Website Application Using OWASP." International Journal of Computer and Information System (IJCIS) 3, no. 3 (August 29, 2022): 142–47. http://dx.doi.org/10.29040/ijcis.v3i3.90.
Повний текст джерелаSahu, Abhijeet, and Katherine Davis. "Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach." Sensors 22, no. 6 (March 9, 2022): 2100. http://dx.doi.org/10.3390/s22062100.
Повний текст джерелаKhosravi, Mehran, and Behrouz Tork Ladani. "Alerts Correlation and Causal Analysis for APT Based Cyber Attack Detection." IEEE Access 8 (2020): 162642–56. http://dx.doi.org/10.1109/access.2020.3021499.
Повний текст джерелаMaia, Eva, Norberto Sousa, Nuno Oliveira, Sinan Wannous, Orlando Sousa, and Isabel Praça. "SMS-I: Intelligent Security for Cyber–Physical Systems." Information 13, no. 9 (August 25, 2022): 403. http://dx.doi.org/10.3390/info13090403.
Повний текст джерелаPark, Hyunjae, and Young-June Choi. "Frequency-Based Representation of Massive Alerts and Combination of Indicators by Heterogeneous Intrusion Detection Systems for Anomaly Detection." Sensors 22, no. 12 (June 10, 2022): 4417. http://dx.doi.org/10.3390/s22124417.
Повний текст джерелаPanwar, Anupam. "Evaluation of Kernel Based Atanassov's Intuitionistic Fuzzy Clustering for Network Forensics and Intrusion Detection." International Journal of Software Innovation 4, no. 1 (January 2016): 1–15. http://dx.doi.org/10.4018/ijsi.2016010101.
Повний текст джерелаLee, Eungyu, Yongsoo Lee, and Teajin Lee. "Automatic False Alarm Detection Based on XAI and Reliability Analysis." Applied Sciences 12, no. 13 (July 4, 2022): 6761. http://dx.doi.org/10.3390/app12136761.
Повний текст джерелаTache Buzățoiu, Elena-Simona, Amalia-Magdalena Dănăilă Calafeteanu, and Monica-Mihaela Drăgan Radu. "The role of the chartered accountant in diminishing the effects of cyber fraud." Journal of Financial Studies 6, no. 11 (November 15, 2021): 141–55. http://dx.doi.org/10.55654/jfs.2021.6.11.11.
Повний текст джерелаIglesias, Aitziber, Goiuria Sagardui, and Cristobal Arellano. "Industrial Cyber-Physical System Evolution Detection and Alert Generation." Applied Sciences 9, no. 8 (April 17, 2019): 1586. http://dx.doi.org/10.3390/app9081586.
Повний текст джерелаAshari, Ilham Firman, Vina Oktarina, Ringgo Galih Sadewo, and Salman Damanhuri. "Analysis of Cross Site Request Forgery (CSRF) Attacks on West Lampung Regency Websites Using OWASP ZAP Tools." Jurnal Sisfokom (Sistem Informasi dan Komputer) 11, no. 2 (August 31, 2022): 276–81. http://dx.doi.org/10.32736/sisfokom.v11i2.1393.
Повний текст джерелаGyőrffy, Krisztina, Ferenc Leitold, and Anthony Arrott. "Individual awareness of cyber-security vulnerability - Citizen and public servant." Central and Eastern European eDem and eGov Days 325 (February 14, 2018): 411–22. http://dx.doi.org/10.24989/ocg.v325.34.
Повний текст джерелаSweet, Christopher, Stephen Moskal, and Shanchieh Jay Yang. "On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks." ACM Transactions on Management Information Systems 11, no. 4 (December 4, 2020): 1–21. http://dx.doi.org/10.1145/3394503.
Повний текст джерелаHulak, Hennadii, Yuliia Zhdanovа, Pavlo Skladannyi, Yevhen Hulak, and Viktor Korniiets. "VULNERABILITIES OF SHORT MESSAGE ENCRYPTION IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS OF CRITICAL INFRASTRUCTURE OBJECTS." Cybersecurity: Education, Science, Technique 1, no. 17 (2022): 145–58. http://dx.doi.org/10.28925/2663-4023.2022.17.145158.
Повний текст джерелаKumar, Ravi, and Parvesh Kumar Chaudhary. "Network Security Enhancement using CTI and Log Analysis." International Journal of Engineering and Computer Science 7, no. 12 (December 18, 2018): 24430–32. http://dx.doi.org/10.18535/ijecs/v7i12.03.
Повний текст джерелаJohnson, Anju P., Hussain Al-Aqrabi, and Richard Hill. "Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems." Sensors 20, no. 3 (February 5, 2020): 844. http://dx.doi.org/10.3390/s20030844.
Повний текст джерелаThivakaran, T. K., and D. Sasikumar. "Enhanced Biometric Based Automated Teller Machine Authenticate Security System Using Low Power Microcontroller." Journal of Computational and Theoretical Nanoscience 16, no. 2 (February 1, 2019): 759–63. http://dx.doi.org/10.1166/jctn.2019.7805.
Повний текст джерелаNalanagula, Swetha, and Arpita Roy. "Cyber Security Operations Centre: A User-Cantered Machine Learning Framework." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 4040–43. http://dx.doi.org/10.22214/ijraset.2022.44546.
Повний текст джерелаOnchis, Darian, Codruta Istin, and Eduard Hogea. "A Neuro-Symbolic Classifier with Optimized Satisfiability for Monitoring Security Alerts in Network Traffic." Applied Sciences 12, no. 22 (November 12, 2022): 11502. http://dx.doi.org/10.3390/app122211502.
Повний текст джерелаKumar, Abhishek, Jyotir Moy Chatterjee, and Vicente García Díaz. "A novel hybrid approach of SVM combined with NLP and probabilistic neural network for email phishing." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 486. http://dx.doi.org/10.11591/ijece.v10i1.pp486-493.
Повний текст джерелаOgogo, Wycliffe Lamech. "Real-Time Monitoring of Network Devices: Its Effectiveness in Enhancing Network Security." East African Journal of Information Technology 3, no. 1 (March 4, 2021): 1–6. http://dx.doi.org/10.37284/eajit.3.1.153.
Повний текст джерелаJaveed, Danish, Muhammad Taimoor Khan, Ijaz Ahmad, Tahir Iqbal, Umar Mohammed Badamasi, Cosmas Obiora Ndubuisi, and Aliyu Umar. "An Efficient Approach of Threat Hunting Using Memory Forensics." International Journal of Computer Networks and Communications Security 8, no. 5 (May 31, 2020): 37–45. http://dx.doi.org/10.47277/ijcncs/8(5)1.
Повний текст джерелаFotiadou, Konstantina, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Dimitrios Skias, Sofia Tsekeridou, and Theodore Zahariadis. "Network Traffic Anomaly Detection via Deep Learning." Information 12, no. 5 (May 19, 2021): 215. http://dx.doi.org/10.3390/info12050215.
Повний текст джерелаMhawi, Doaa N., Ammar Aldallal, and Soukeana Hassan. "Advanced Feature-Selection-Based Hybrid Ensemble Learning Algorithms for Network Intrusion Detection Systems." Symmetry 14, no. 7 (July 17, 2022): 1461. http://dx.doi.org/10.3390/sym14071461.
Повний текст джерелаAliev, Khurshid, and Dario Antonelli. "Proposal of a Monitoring System for Collaborative Robots to Predict Outages and to Assess Reliability Factors Exploiting Machine Learning." Applied Sciences 11, no. 4 (February 10, 2021): 1621. http://dx.doi.org/10.3390/app11041621.
Повний текст джерелаElbasi, Ersin, Ahmet E. Topcu, and Shinu Mathew. "Prediction of COVID-19 Risk in Public Areas Using IoT and Machine Learning." Electronics 10, no. 14 (July 14, 2021): 1677. http://dx.doi.org/10.3390/electronics10141677.
Повний текст джерелаJain*, Pratik, Ravikant Kholwal, and Tavneet Singh Khurana. "Reducing the False Alarm Rate in Intrusion Detection System by Providing Authentication and Improving the Efficiency of Intrusion Detection System by using Filtered Clusterer Algorithm using Weka Tool." International Journal of Engineering and Advanced Technology 10, no. 4 (April 30, 2021): 134–42. http://dx.doi.org/10.35940/ijeat.d2413.0410421.
Повний текст джерелаJain*, Pratik, Ravikant Kholwal, and Muskan Patidar. "To Decrease the Issue of False Alarm Rate by Providing Authentication & Thus Improving the Efficiency of Intrusion Detection System by Comparing the Result of Filtered Clusterer Algorithm & Make-Density Based Clustering Algorithm without Attribute Count." International Journal of Recent Technology and Engineering 10, no. 1 (May 30, 2021): 110–20. http://dx.doi.org/10.35940/ijrte.a5755.0510121.
Повний текст джерелаVieane, Alex, Gregory Funke, Eric Greenlee, Vincent Mancuso, Brett Borghetti, Brent Miller, Lauren Menke, Rebecca Brown, Cyrus K. Foroughi, and Deborah Boehm-Davis. "Task Interruptions Undermine Cyber Defense." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 375–79. http://dx.doi.org/10.1177/1541931213601576.
Повний текст джерелаChang, Victor, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu, and Anna Kobusińska. "A Survey on Intrusion Detection Systems for Fog and Cloud Computing." Future Internet 14, no. 3 (March 13, 2022): 89. http://dx.doi.org/10.3390/fi14030089.
Повний текст джерелаHidayat, Sutan Emir, Ahmad Rafiki, and Maryam Humood Al Khalifa. "The social media adoption of public sector in the Kingdom of Bahrain." Journal of Advances in Management Research 16, no. 1 (February 4, 2019): 23–37. http://dx.doi.org/10.1108/jamr-11-2017-0105.
Повний текст джерелаMaia, Eva, Sinan Wannous, Tiago Dias, Isabel Praça, and Ana Faria. "Holistic Security and Safety for Factories of the Future." Sensors 22, no. 24 (December 16, 2022): 9915. http://dx.doi.org/10.3390/s22249915.
Повний текст джерелаWu, Mingtao, and Young Moon. "Alert Correlation for Cyber-Manufacturing Intrusion Detection." Procedia Manufacturing 34 (2019): 820–31. http://dx.doi.org/10.1016/j.promfg.2019.06.197.
Повний текст джерелаBryce, Alan. "LEADERSHIP: Preventing a cyber attack." Children and Young People Now 2017, no. 13 (September 2, 2017): 57. http://dx.doi.org/10.12968/cypn.2017.13.57.
Повний текст джерелаClarke, Karla, Yair Levy, Laurie Dringus, and Shonda Brown. "How workplace satisfaction affects insider threat detection as a vital variable for the mitigation of malicious cyber insiders." Online Journal of Applied Knowledge Management 7, no. 1 (May 22, 2019): 40–52. http://dx.doi.org/10.36965/ojakm.2019.7(1)40-52.
Повний текст джерелаSonhera, Naume, and David Mhlanga. "REDUCING CYBER INCIDENTS THROUGH GOOD ONLINE BEHAVIORAL NORMS: LESSONS FROM SOUTH AFRICA." EURASIAN JOURNAL OF SOCIAL SCIENCES 10, no. 1 (2022): 37–48. http://dx.doi.org/10.15604/ejss.2022.10.01.004.
Повний текст джерелаBoschee, Pam. "Comments: Complexity of Cyber Crime Skyrockets." Journal of Petroleum Technology 73, no. 06 (June 1, 2021): 8. http://dx.doi.org/10.2118/0621-0008-jpt.
Повний текст джерелаEt.al, Siok Yee Tan. "CYBERGUARD: A Mobile Cyberbullying Detector." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 1805–15. http://dx.doi.org/10.17762/turcomat.v12i3.1008.
Повний текст джерелаSvilicic, Rudan, Jugović, and Zec. "A Study on Cyber Security Threats in a Shipboard Integrated Navigational System." Journal of Marine Science and Engineering 7, no. 10 (October 12, 2019): 364. http://dx.doi.org/10.3390/jmse7100364.
Повний текст джерелаSyed, Romilla. "Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system." Information & Management 57, no. 6 (September 2020): 103334. http://dx.doi.org/10.1016/j.im.2020.103334.
Повний текст джерелаPARASCHIVA, Ion. "WannaCry Ransomware Attack from Romanian Police Perspective." International Journal of Information Security and Cybercrime 8, no. 1 (June 28, 2019): 65–72. http://dx.doi.org/10.19107/ijisc.2019.01.09.
Повний текст джерелаKee, Keh-Kim, Simon Lau Boung Yew, Yun Seng Lim, Yip Ping Ting, and Ramli Rashidi. "Universal cyber physical system, a prototype for predictive maintenance." Bulletin of Electrical Engineering and Informatics 11, no. 1 (February 1, 2022): 42–49. http://dx.doi.org/10.11591/eei.v11i1.3216.
Повний текст джерелаPreuveneers, Davy, and Wouter Joosen. "Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence." Journal of Cybersecurity and Privacy 1, no. 1 (February 26, 2021): 140–63. http://dx.doi.org/10.3390/jcp1010008.
Повний текст джерелаBognár, Eszter Katalin. "Data Mining in Cyber Threat Analysis : Neural Networks for Intrusion Detection." Academic and Applied Research in Military and Public Management Science 15, no. 2 (August 31, 2016): 187–96. http://dx.doi.org/10.32565/aarms.2016.2.7.
Повний текст джерела