站在巨人的肩膀上
搜索结果
约 144,604 条结果
Machine Learning and Deep Learning Methods for Cybersecurity
Yang Xin, Lingshuang Kong, Zhi Liu, Yuling Chen - IEEE Access - 2018With the development of the Internet, cyber-attacks are changing rapidly and the cyber security situation is not optimistic. This survey report describes key literature surveys on machine learning (ML) and deep learning (DL) methods for network analysis of intrusion detection and provides a brief tutorial description of each ML/DL method. Papers representing each method were indexed, read, and summarized based on the…被引用次数:1,136A survey of emerging threats in cybersecurity
Julian Jang‐Jaccard, Surya Nepal - Journal of Computer and System Sciences - 2014该记录暂无摘要,您可以通过来源链接查看详细信息。被引用次数:863Cybersecurity and Cyberwar
Peter Singer, Allan H. Friedman - Oxford University Press eBooks - 2014Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution’s impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet’s potential for full-…被引用次数:457Cybersecurity data science: an overview from machine learning perspective
Iqbal H. Sarker, A. S. M. Kayes, Shahriar Badsha, Hamed Alqahtani - Journal Of Big Data - 2020该记录暂无摘要,您可以通过来源链接查看详细信息。被引用次数:670Blockchain's roles in strengthening cybersecurity and protecting privacy
Nir Kshetri - Telecommunications Policy - 2017该记录暂无摘要,您可以通过来源链接查看详细信息。被引用次数:747Vulnerability Assessment of Cybersecurity for SCADA Systems
Chee‐Wooi Ten, Chen‐Ching Liu, Govindarasu Manimaran - IEEE Transactions on Power Systems - 2008Vulnerability assessment is a requirement of NERC's cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack on supervisory control and data acquisition (SCADA) systems. Compliance of the requirement to meet the standard has become increasingly challenging as the system becomes more dispersed in wide areas. Interdependencies between computer communication system and the…被引用次数:567Recent Advances on Federated Learning for Cybersecurity and Cybersecurity for Federated Learning for Internet of Things
Bimal Ghimire, Danda B. Rawat - IEEE Internet of Things Journal - 2022Decentralized paradigm in the field of cybersecurity and machine learning (ML) for the emerging Internet of Things (IoT) has gained a lot of attention from the government, academia, and industries in recent years. Federated cybersecurity (FC) is regarded as a revolutionary concept to make the IoT safer and more efficient in the future. This emerging concept has the potential of detecting security threats, taking coun…被引用次数:415From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy
Maanak Gupta, Charankumar Akiri, Kshitiz Aryal, Eli Parker - IEEE Access - 2023Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital transformation in the year 2022. As the different GenAI models like ChatGPT and Google Bard continue to foster their complexity and capability, it’s critical to understand its consequences from a cybersecurity perspective. Several instances recently have demonstrated the use of GenAI tools in both the defensive and off…被引用次数:608Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
Ling Li, Wu He, Li Da Xu, Ivan K. Ash - International Journal of Information Management - 2018该记录暂无摘要,您可以通过来源链接查看详细信息。被引用次数:312Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics
Yang Lu, Li Da Xu - IEEE Internet of Things Journal - 2018As an emerging technology, the Internet of Things (IoT) revolutionized the global network comprising of people, smart devices, intelligent objects, data, and information. The development of IoT is still in its infancy and many related issues need to be solved. IoT is a unified concept of embedding everything. IoT has a great chance to make the world a higher level of accessibility, integrity, availability, scalabilit…被引用次数:545