搜索结果

约 144,604 条结果

  1. Machine Learning and Deep Learning Methods for Cybersecurity

    Yang Xin, Lingshuang Kong, Zhi Liu, Yuling Chen - IEEE Access - 2018
    With the development of the Internet, cyber-attacks are changing rapidly and the cyber security situation is not optimistic. This survey report describes key literature surveys on machine learning (ML) and deep learning (DL) methods for network analysis of intrusion detection and provides a brief tutorial description of each ML/DL method. Papers representing each method were indexed, read, and summarized based on the…
    被引用次数:1,136
  2. A survey of emerging threats in cybersecurity

    Julian Jang‐Jaccard, ‪Surya Nepal‬ - Journal of Computer and System Sciences - 2014
    该记录暂无摘要,您可以通过来源链接查看详细信息。
    被引用次数:863
  3. Cybersecurity and Cyberwar

    Peter Singer, Allan H. Friedman - Oxford University Press eBooks - 2014
    Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution’s impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet’s potential for full-…
    被引用次数:457
  4. Cybersecurity data science: an overview from machine learning perspective

    Iqbal H. Sarker, A. S. M. Kayes, Shahriar Badsha, Hamed Alqahtani - Journal Of Big Data - 2020
    该记录暂无摘要,您可以通过来源链接查看详细信息。
    被引用次数:670
  5. Blockchain's roles in strengthening cybersecurity and protecting privacy

    Nir Kshetri - Telecommunications Policy - 2017
    该记录暂无摘要,您可以通过来源链接查看详细信息。
    被引用次数:747
  6. Vulnerability Assessment of Cybersecurity for SCADA Systems

    Chee‐Wooi Ten, Chen‐Ching Liu, Govindarasu Manimaran - IEEE Transactions on Power Systems - 2008
    Vulnerability assessment is a requirement of NERC's cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack on supervisory control and data acquisition (SCADA) systems. Compliance of the requirement to meet the standard has become increasingly challenging as the system becomes more dispersed in wide areas. Interdependencies between computer communication system and the…
    被引用次数:567
  7. Recent Advances on Federated Learning for Cybersecurity and Cybersecurity for Federated Learning for Internet of Things

    Bimal Ghimire, Danda B. Rawat - IEEE Internet of Things Journal - 2022
    Decentralized paradigm in the field of cybersecurity and machine learning (ML) for the emerging Internet of Things (IoT) has gained a lot of attention from the government, academia, and industries in recent years. Federated cybersecurity (FC) is regarded as a revolutionary concept to make the IoT safer and more efficient in the future. This emerging concept has the potential of detecting security threats, taking coun…
    被引用次数:415
  8. From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy

    Maanak Gupta, Charankumar Akiri, Kshitiz Aryal, Eli Parker - IEEE Access - 2023
    Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital transformation in the year 2022. As the different GenAI models like ChatGPT and Google Bard continue to foster their complexity and capability, it’s critical to understand its consequences from a cybersecurity perspective. Several instances recently have demonstrated the use of GenAI tools in both the defensive and off…
    被引用次数:608
  9. Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior

    Ling Li, Wu He, Li Da Xu, Ivan K. Ash - International Journal of Information Management - 2018
    该记录暂无摘要,您可以通过来源链接查看详细信息。
    被引用次数:312
  10. Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics

    Yang Lu, Li Da Xu - IEEE Internet of Things Journal - 2018
    As an emerging technology, the Internet of Things (IoT) revolutionized the global network comprising of people, smart devices, intelligent objects, data, and information. The development of IoT is still in its infancy and many related issues need to be solved. IoT is a unified concept of embedding everything. IoT has a great chance to make the world a higher level of accessibility, integrity, availability, scalabilit…
    被引用次数:545