Scanner-Hunter: An Effective ICS Scanning Group Identification System

C Sheng, Y Yao, L Zhao, P Zeng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
As the precursor of cyber-attacks, the campaigns of scanning groups are able to reflect the
attack target and attack trend to a great extent, which provide highly valuable threat …

SSHAA: A Python Package Index for visualizing features of SSH attacks with text mining in classification

Y Nakamura, T Fukuda, X Yang… - … Security Journal: A …, 2024 - Taylor & Francis
With the proliferation of the Internet, the number of cyber-attacks has increased worldwide.
To prevent cyber-attacks, network administrators need to use analytical tools to disclose six …

Security Techniques in Cyber Physical System for Pharmaceutical Care Services

S Devliyal, HR Goyal, S Sharma - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The use of information technology by the pharmaceutical sector is currently being expanded
in order to support the advancement and evolution of workable development strategies in …

Towards in-situ Psychological Profiling of Cybercriminals Using Dynamically Generated Deception Environments

J Quibell - arXiv preprint arXiv:2405.11497, 2024 - arxiv.org
Cybercrime is estimated to cost the global economy almost\$10 trillion annually and with
businesses and governments reporting an ever-increasing number of successful cyber …

[PDF][PDF] AI for Security Topic Guide Issue..

M Rhode - cybok.org
Cyber security, like other industries, has seen an explosion in the use of arti cial intelligence
(AI) and machine learning (ML) technologies in recent years to help automate tasks …