DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 628
11.
  • Log2vec Log2vec
    Liu, Fucheng; Wen, Yu; Zhang, Dongxue ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 11/2019
    Conference Proceeding

    Conventional attacks of insider employees and emerging APT are both major threats for the organizational information system. Existing detections mainly concentrate on users' behavior and usually ...
Celotno besedilo
Dostopno za: UL
12.
  • Poland's strategic potentia... Poland's strategic potential and capabilities to respond to CBRN threats
    Szklarski, Łukasz Journal of Modern Science, 06/2024, Letnik: 56, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Objectives The article includes a systemic analysis of Poland's potential and response capabilities to chemical, biological, radiological and nuclear (CBRN) threats. As a result of the conducted ...
Celotno besedilo
Dostopno za: UL
13.
  • Machine learning techniques... Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
    Alwahedi, Fatima; Aldhaheri, Alyazia; Ferrag, Mohamed Amine ... Internet of Things and Cyber-Physical Systems, 2024, Letnik: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Despite providing unparalleled connectivity and convenience, the exponential growth of the Internet of Things (IoT) ecosystem has triggered significant cybersecurity concerns. These concerns stem ...
Celotno besedilo
Dostopno za: UL
14.
  • Unraveled — A semi-syntheti... Unraveled — A semi-synthetic dataset for Advanced Persistent Threats
    Myneni, Sowmya; Jha, Kritshekhar; Sabur, Abdulhakim ... Computer networks (Amsterdam, Netherlands : 1999), 20/May , Letnik: 227
    Journal Article
    Recenzirano
    Odprti dostop

    Unraveled is a novel cybersecurity dataset capturing Advanced Persistent Threat (APT) attacks not available in the public domain. Existing cybersecurity datasets lack coherent information about ...
Celotno besedilo
Dostopno za: UL
15.
Celotno besedilo
Dostopno za: UL
16.
  • mmCTD: Concealed Threat Det... mmCTD: Concealed Threat Detection for Cruise Ships Via Mmwave Radar
    Pei, Dashuai; Gong, Danei; Liu, Kezhong ... IEEE transactions on vehicular technology, 2024
    Journal Article
    Recenzirano

    The safeguarding of critical zones aboard a marine vehicle, such as the engine room, wheelhouse, and pump room, assumes crucial significance while navigating through the open sea. Despite the ...
Celotno besedilo
Dostopno za: UL
17.
  • FlowSpotter: Intelligent Io... FlowSpotter: Intelligent IoT Threat Detection via Imaging Network Flows
    Tan, Shuaishuai; He, Daojing; Chan, Sammy ... IEEE network, 2024-July, Letnik: 38, Številka: 4
    Journal Article
    Recenzirano

    With the prevalence of Internet of Things (IoT) technologies, the huge growth of IoT devices has also brought attention of cyber attackers. IoT botnets are rapidly spreading and evolving worldwide, ...
Celotno besedilo
Dostopno za: UL
18.
  • E-Watcher: insider threat m... E-Watcher: insider threat monitoring and detection for enhanced security
    Wei, Zhiyuan; Rauf, Usman; Mohsen, Fadi Annales des télécommunications, 04/2024
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract Insider threats refer to harmful actions carried out by authorized users within an organization, posing the most damaging risks. The increasing number of these threats has revealed the ...
Celotno besedilo
Dostopno za: UL
19.
  • Incremental convolutional t... Incremental convolutional transformer for baggage threat detection
    Hassan, Taimur; Hassan, Bilal; Owais, Muhammad ... Pattern recognition, September 2024, 2024-09-00, Letnik: 153
    Journal Article
    Recenzirano

    Detecting cluttered and overlapping contraband items from baggage scans is one of the most challenging tasks, even for human experts. Recently, considerable literature has grown up around the theme ...
Celotno besedilo
Dostopno za: UL
20.
  • A new approach to modelling... A new approach to modelling the effects of cognitive processing and threat detection on phishing susceptibility
    Musuva, Paula M.W.; Getao, Katherine W.; Chepken, Christopher K. Computers in human behavior, 20/May , Letnik: 94
    Journal Article
    Recenzirano

    Phishing threats are real and are ever increasing in their reach and devastating effects. This study delves into the role of cognitive processing in detecting and curtailing phishing attacks. The ...
Celotno besedilo
Dostopno za: UL
1 2 3 4 5
zadetkov: 628

Nalaganje filtrov