Found: 15
Select item for more details and to access through your institution.
IWTW: A Framework for IoWT Cyber Threat Analysis.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2024, v. 141, n. 2, p. 1575, doi. 10.32604/cmes.2024.053465
- By:
- Publication type:
- Article
Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based on Statistical Intelligence.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2024, v. 141, n. 2, p. 1519, doi. 10.32604/cmes.2024.053437
- By:
- Publication type:
- Article
Data-Driven ICS Network Simulation for Synthetic Data Generation.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 10, p. 1920, doi. 10.3390/electronics13101920
- By:
- Publication type:
- Article
Dr.PathFinder: hybrid fuzzing with deep reinforcement concolic execution toward deeper path-first search.
- Published in:
- Neural Computing & Applications, 2022, v. 34, n. 13, p. 10731, doi. 10.1007/s00521-022-07008-8
- By:
- Publication type:
- Article
Recurrent GANs Password Cracker For IoT Password Security Enhancement †.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 11, p. 3106, doi. 10.3390/s20113106
- By:
- Publication type:
- Article
Proposal and Assessment of a De-Identification Strategy to Enhance Anonymity of the Observational Medical Outcomes Partnership Common Data Model (OMOP-CDM) in a Public Cloud-Computing Environment: Anonymization of Medical Data Using Privacy Models.
- Published in:
- 2020
- By:
- Publication type:
- journal article
Guide to developing case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 15, p. 21642, doi. 10.1007/s11227-024-06273-9
- By:
- Publication type:
- Article
Mutation-Based Multivariate Time-Series Anomaly Generation on Latent Space with an Attention-Based Variational Recurrent Neural Network for Robust Anomaly Detection in an Industrial Control System.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 17, p. 7714, doi. 10.3390/app14177714
- By:
- Publication type:
- Article
GENICS: A Framework for Generating Attack Scenarios for Cybersecurity Exercises on Industrial Control Systems.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 2, p. 768, doi. 10.3390/app14020768
- By:
- Publication type:
- Article
A Secure CDM-Based Data Analysis Platform (SCAP) in Multi-Centered Distributed Setting.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 19, p. 9072, doi. 10.3390/app11199072
- By:
- Publication type:
- Article
Generating Optimized Guessing Candidates toward Better Password Cracking from Multi-Dictionaries Using Relativistic GAN.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 20, p. 7306, doi. 10.3390/app10207306
- By:
- Publication type:
- Article
An Assessment of Corporate Average Fuel Economy Standards for Passenger Cars in South Korea.
- Published in:
- Energies (19961073), 2020, v. 13, n. 17, p. 4533, doi. 10.3390/en13174533
- By:
- Publication type:
- Article
Modeling Air Pollutant Emissions in the Provincial Level Road Transportation Sector in Korea: A Case Study of the Zero-Emission Vehicle Subsidy.
- Published in:
- Energies (19961073), 2020, v. 13, n. 15, p. 3999, doi. 10.3390/en13153999
- By:
- Publication type:
- Article
Development of an Integrated Assessment Model at Provincial Level: GCAM-Korea.
- Published in:
- Energies (19961073), 2020, v. 13, n. 10, p. 2565, doi. 10.3390/en13102565
- By:
- Publication type:
- Article
Design the IoT Botnet Defense Process for Cybersecurity in Smart City.
- Published in:
- Intelligent Automation & Soft Computing, 2023, v. 37, n. 3, p. 2979, doi. 10.32604/iasc.2023.040019
- By:
- Publication type:
- Article