|
|
|
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p...
ver más
|
|
|
|
|
|
|
Fahim Sufi
In the face of escalating cyber threats that have contributed significantly to global economic losses, this study presents a comprehensive dataset capturing the multifaceted nature of cyber-attacks across 225 countries over a 14-month period from October...
ver más
|
|
|
|
|
|
|
Ikjae Kim, Moosung Park, Hyun-Jin Lee, Jisoo Jang, Soojin Lee and Dongkyoo Shin
With the advancement of IT technology, intelligent devices such as autonomous vehicles, unmanned equipment, and drones are rapidly evolving. Consequently, the proliferation of defense systems based on these technologies is increasing worldwide. In respon...
ver más
|
|
|
|
|
|
|
Adam James Fenton
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary...
ver más
|
|
|
|
|
|
|
Kongpei Wu, Huiqin Qu and Conggui Huang
For the current stage of complex and changing network environments and correlated and synchronized vulnerability attacks, this study first fuses attack graph technology and Bayesian networks and constructs Bayesian attack graphs toportray the correlation...
ver más
|
|
|
|
|
|
|
Igor Kotenko, Igor Saenko, Andrey Privalov and Oleg Lauta
The article proposes an approach to ensuring the functioning of Software-Defined Networks (SDN) in cyber attack conditions based on the analytical modeling of cyber attacks using the method of topological transformation of stochastic networks. Unlike oth...
ver más
|
|
|
|
|
|
|
Gang Wang, Dong Liu, Chunrui Zhang and Teng Hu
This work has potential usages in cyber-attack detection in air-gapped internal networks that lack sufficient labeled data samples to build detection models for network attack activities.
|
|
|
|
|
|
|
Fahim Sufi
Algorithms have evolved from machine code to low-code-no-code (LCNC) in the past 20 years. Observing the growth of LCNC-based algorithm development, the CEO of GitHub mentioned that the future of coding is no coding at all. This paper systematically revi...
ver más
|
|
|
|
|
|
|
Xiaoyu Du, Cheng Cheng, Yujing Wang and Zhijie Han
Network attack traffic detection plays a crucial role in protecting network operations and services. To accurately detect malicious traffic on the internet, this paper designs a hybrid algorithm UMAP-RF for both binary and multiclassification network att...
ver más
|
|
|
|
|
|
|
Mohamed Amine Ben Farah, Elochukwu Ukwandu, Hanan Hindy, David Brosset, Miroslav Bures, Ivan Andonovic and Xavier Bellekens
The paper presents a classification of cyber attacks within the context of the state of the art in the maritime industry. A systematic categorization of vessel components has been conducted, complemented by an analysis of key services delivered within po...
ver más
|
|
|
|