Methodological identification of anomalies episodes in ECG streams: a systematic map** study
An electrocardiogram is a medical examination tool for measuring different patterns of heart
blood flow circle either in the form of usual or non-invasive patterns. These patterns are …
blood flow circle either in the form of usual or non-invasive patterns. These patterns are …
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
When critical assets or functionalities are included in a piece of software accessible to the
end users, code protections are used to hinder or delay the extraction or manipulation of …
end users, code protections are used to hinder or delay the extraction or manipulation of …
Infrastructure for generating new ids dataset
This article describes the proposal of a system that was designed for effective network
monitoring, analysis of network infiltration, and archiving of network flows for their later …
monitoring, analysis of network infiltration, and archiving of network flows for their later …
SDN based cognitive security system for large-scale Internet of Things using fog computing
S Prabavathy, V Supriya - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is penetrating into every aspect of our personal lives including our
body, our home and our living environment which poses numerous security challenges. The …
body, our home and our living environment which poses numerous security challenges. The …
Design and Development of System for Post-infection Attack Behavioral Analysis
TH Kamati, DS Jat, S Chamotra - Proceedings of Fifth International …, 2020 - Springer
Attacks targeting government and public networks for getting political, and strategic
advantage is a common phenomenon. Most of the time these targeted attacks are state …
advantage is a common phenomenon. Most of the time these targeted attacks are state …
Revisiting Automotive Threat Analysis by Leveraging the Elements of the Threat Landscape
A Åström - Proceedings of the 2024 Cyber Security in CarS …, 2023 - dl.acm.org
The automotive industry faces significant challenges due to rapid advancements in areas
such as increased connectivity, automated driving, and electrification. These advancements …
such as increased connectivity, automated driving, and electrification. These advancements …
[PDF][PDF] Prediction of Ongoing Attacks using System Behavioural Traces
SA Lakshmi, V Pavithra, KN Mallikarjunan - 2020 - academia.edu
If a human thinks that the number of cyber attacks are increasing, then he/she is not wrong.
In fact, it's probably worse than he/she realizes. Cyber attacks are a major threat faced by all …
In fact, it's probably worse than he/she realizes. Cyber attacks are a major threat faced by all …
[CITATION][C] 基于 EBLOF 算法的攻击者 IP 分析系统及应用
范敏, **昌茂, 陈飞宇, 陈超一 - 2022 - 工程科学与技术