CYBER

作品数:706被引量:724H指数:10
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:朴俊杰巩汉顺曲宝林徐慧军徐寿平更多>>
相关机构:中国人民解放军总医院武汉大学四川大学国防科学技术大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金中国博士后科学基金国家重点基础研究发展计划国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Cybersecurityx
条 记 录,以下是1-10
视图:
排序:
Time sensitive networking security:issues of precision time protocol and its implementation被引量:1
《Cybersecurity》2023年第4期1-13,共13页Davide Berardi Nils OTippenhauer Andrea Melis Marco Prandini Franco Callegati 
Time Sensitive Networking(TSN)will be an integral component of industrial networking.Time synchronization in TSN is provided by the IEEE-1588,Precision Time Protocol(PTP)protocol.The standard,dating back to 2008,margi...
关键词:Time synchronization Time sensitive networking Precision time protocol Cybersecurity attacks 
An ensemble deep learning based IDS for IoT using Lambda architecture被引量:1
《Cybersecurity》2023年第3期1-17,共17页Rubayyi Alghamdi Martine Bellaiche 
The Internet of Things(IoT)has revolutionized our world today by providing greater levels of accessibility,connectivity and ease to our everyday lives.It enables massive amounts of data to be traversed across multiple...
关键词:IOT IDS Lambda architecture Cyber-attacks Deep learning Ensemble learning 
A flexible approach for cyber threat hunting based on kernel audit records
《Cybersecurity》2022年第3期74-89,共16页Fengyu Yang Yanni Han Ying Ding Qian Tan Zhen Xu 
This work is supported in part by the Industrial Internet Innovation and Development Project“Industrial robot external safety enhancement device”(TC200H030);the Cooperation project between Chongqing Municipal undergraduate universities and institutes affiliated to CAS(HZ2021015).
Hunting the advanced threats hidden in the enterprise networks has always been a complex and difficult task.Due to the variety of attacking means,it is difficult for traditional security systems to detect threats.Most...
关键词:Advanced persistent threat Cyber threat hunting Kernel audit log Knowledge graph 
TriCTI:an actionable cyber threat intelligence discovery system via trigger-enhanced neural network被引量:7
《Cybersecurity》2022年第3期18-33,共16页Jian Lu Junjie Yan Jun Jiang Yitong He Xuren Wang Zhengwei jiang Peian Yang Ning Li 
Our research was supported by the National Key Research and Development Program of China(Nos.2019QY1301,2018YFB0805005,2018YFC0824801).
The cybersecurity report provides unstructured actionable cyber threat intelligence(CTI)with detailed threat attack procedures and indicators of compromise(IOCs),e.g.,malware hash or URL(uniform resource locator)of co...
关键词:Actionable cyber threat intelligence Campaign trigger Indicators of compromise(IOCs) Natural language processing(NLP) 
Cascading effects of cyber-attacks on interconnected critical infrastructure被引量:1
《Cybersecurity》2021年第1期104-122,共19页Venkata Reddy Palleti Sridhar Adepu Vishrut Kumar Mishra Aditya Mathur 
the National Research Foundation(NRF),Prime Minister’s Office,Singapore,under its National Cybersecurity R&D Programme(Award No.NRF2015NCR-NCR003-001)and administered by the National Cybersecurity R&D Directorate.
Modern critical infrastructure,such as a water treatment plant,water distribution system,and power grid,are representative of Cyber Physical Systems(CPSs)in which the physical processes are monitored and controlled in...
关键词:Industrial Control Systems Water treatment Water distribution Interconnected critical infrastructure Cyber-attacks Cascading effects 
Precision time protocol attack strategies and their resistance to existing security extensions
《Cybersecurity》2021年第1期160-176,共17页Waleed Alghamdi Michael Schukat 
the Technical and Vocational Training Corporation, Saudi Arabia.
The IEEE 1588 precision time protocol(PTP)is very important for many industrial sectors and applications that require time synchronization accuracy between computers down to microsecond and even nanosecond levels.Neve...
关键词:APT Cyber-attacks IEEE 1588 PTP Security Time synchronization protocols 
Under false flag:using technical artifacts for cyber attack attribution
《Cybersecurity》2020年第1期103-122,共20页Florian Skopik Timea Pahi 
This work was partly funded by the Austrian security-research programme FORTE and by the Austrian Ministry for Transport,Innovation and Technology(BMvit)through the FFG project CADSP(873425).
The attribution of cyber attacks is often neglected.The consensus still is that little can be done to prosecute the perpetrators–and unfortunately,this might be right in many cases.What is however only of limited int...
关键词:Actor attribution Advanced persistent threats Technical indicators False flag campaigns 
Cyber risk at the edge:current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains被引量:1
《Cybersecurity》2020年第1期155-175,共21页Petar Radanliev David De Roure Kevin Page Jason R.C.Nurse Rafael Mantilla Montalvo Omar Santos La’Treall Maddox Pete Burnap 
This work was funded by the UK EPSRC[grant number:EP/S035362/1,EP/N023013/1,EP/N02334X/1]and by the Cisco Research Centre[grant number 1525381].
Digital technologies have changed the way supply chain operations are structured.In this article,we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber r...
关键词:Industry 4.0 Supply chain design Transformational design roadmap IIoT supply chain model Decision support for information management artificial intelligence and machine learning(AI/ML) dynamic self-adapting system cognition engine predictive cyber risk analytics 
Sifu-a cybersecurity awareness platform with challenge assessment and intelligent coach
《Cybersecurity》2020年第1期333-355,共23页Tiago Espinha Gasiba Ulrike Lechner Maria Pinto-Albuquerque 
Software vulnerabilities,when actively exploited by malicious parties,can lead to catastrophic consequences.Proper handling of software vulnerabilities is essential in the industrial context,particularly when the soft...
关键词:CYBERSECURITY AWARENESS Training Artificial intelligence Serious games Secure coding Static application security testing Capture-the-flag Software development in industry 
ASSERT:attack synthesis and separation with entropy redistribution towards predictive cyber defense被引量:2
《Cybersecurity》2019年第1期253-270,共18页Ahmet Okutan Shanchieh Jay Yang 
This research is supported by NSF Award#1526383.
The sophistication of cyberattacks penetrating into enterprise networks has called for predictive defense beyond intrusion detection,where different attack strategies can be analyzed and used to anticipate next malici...
关键词:Cyber security Dynamic bayesian classifier Clustering KL divergence 
检索报告 对象比较 聚类工具 使用帮助 返回顶部