scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "cybersecurity"

1 - 10 of 1,726 results for
 "cybersecurity"
Results per page:

Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 11, Pp 9136-9148 (2023)

Abstract: Computer viruses, malicious, and other hostile attacks can affect a computer network. Intrusion detection is a key component of network security as an active defence technology. Traditional intrusion detection systems struggle with issues like poor acc...

High Performance Time Series Anomaly Detection Using Brain Inspired Cortical Coding Method

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 11, Pp 8345-8361 (2023)

Abstract: Accurate and automated anomaly detection in time series data sets has an increasingly important role in a wide range of applications. Inspired by coding in the cortical networks of the brain, here we introduce a novel approach for high performance real...

A survey of methods for encrypted network traffic fingerprinting

Publication Type: Academic Journal

Source(s): Mathematical Biosciences and Engineering, Vol 20, Iss 2, Pp 2183-2202 (2023)

Abstract: Privacy protection in computer communication is gaining attention because plaintext transmission without encryption can be eavesdropped on and intercepted. Accordingly, the use of encrypted communication protocols is on the rise, along with the number ...

Distributed Anomaly Detection in Smart Grids: A Federated Learning-Based Approach

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 11, Pp 7157-7179 (2023)

Abstract: The smart grid integrates Information and Communication Technologies (ICT) into the traditional power grid to manage the generation, distribution, and consumption of electrical energy. Despite its many advantages, it faces significant challenges, such ...

An Examination of the Relationship between College Students’ Cyberbullying Awareness and Ability to Ensure their Personal Cybersecurity

Publication Type: Academic Journal

Source(s): Journal of Learning and Teaching in Digital Age, Vol 8, Iss 1, Pp 55-70 (2023)

Authors:

Abstract: The purpose of this study is to examine the relationship between college students’ cyberbullying awareness and their ability to ensure their personal cybersecurity. A total of 401 students participated in this study. The Ability to Ensure Personal Cybe...

Fronesis: Digital Forensics-Based Early Detection of Ongoing Cyber-Attacks

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 11, Pp 728-743 (2023)

Abstract: Traditional attack detection approaches utilize predefined databases of known signatures about already-seen tools and malicious activities observed in past cyber-attacks to detect future attacks. More sophisticated approaches apply machine learning to ...

Motivating youth to learn STEM through a gender inclusive digital forensic science program

Publication Type: Academic Journal

Source(s): Smart Learning Environments, Vol 10, Iss 1, Pp 1-24 (2023)

Abstract: Abstract This paper describes the design, implementation and research of the Cyber Sleuth Science Lab (CSSL), an innovative educational program and supporting virtual learning environment, that combines pedagogical theory, gender inclusive instruction ...

Social Networks as a Challenge to Vietnam’s Political Stability

Publication Type: Academic Journal

Source(s): RUDN Journal of Public Administration, Vol 9, Iss 4, Pp 438-455 (2022)

Abstract: The authors of the article identify new types of threats caused by the penetration of social networks into Vietnamese society. The authors assess the limits of the impact of crossborder IT communications on the political stability of the state. The art...

Low-sample classification in NIDS using the EC-GAN method

Publication Type: Academic Journal

Source(s): Journal of Universal Computer Science, Vol 28, Iss 12, Pp 1330-1346 (2022)

Abstract: Numerous advanced methods have been applied throughout the years for the use in Network Intrusion Detection Systems (NIDS). Among these are various Deep Learning models, which have shown great success for attack classification. Nevertheless, false posi...

The European Cybersecurity Competence Centre –One More Step towards Supranationalism

Publication Type: Academic Journal

Source(s): Perspective Politice, Vol XV, Iss 1-2, Pp 57-73 (2022)

Abstract: The evolution of the European Union has been influenced by many social, economic, techno-logical, political or even climate factors since its creation in 1957. The supranational character of the Union has been questioned over the years by many authors ...

sponsored