(ROC) technique is used with SNN to detect cyber-attacks. The proposed method is evaluated by comparing its performance with two other methods: IDS-DNN and IDS …
И Котенко, СС Хмыров - Вопросы кибербезопасности, 2022 - cyberleninka.ru
Цель работы: анализ моделей и методик, используемых для атрибуции нарушителей кибербезопасности в интересах построения перспективной системы атрибуции при …
The computer network plays an important role in supporting various jobs and other activities in the cyber world. Various kinds of crimes have often occurred on computer networks. It is …
Y Ahmed, K Beyioku, M Yousefi - IET Smart Cities, 2024 - Wiley Online Library
The rapid increase and adoption of Internet of Things (IoT) devices have introduced unprecedented conveniences into modern life. However, this growth has also ushered in a …
Nowadays, the rapid growth of Internet of Things (IoT) devices has changed many parts of our lives by providing seamless connectivity and automation. However, this expansion has …
Perkembangan teknologi yang pesat memunculkan ancaman kejahatan di dunia digital. Oleh karena itu, penting bagi pengguna untuk berhati-hati saat berinteraksi dalam platform …
И КОТЕНКО, ИБ Саенко, РИ Захарченко… - ВОПРОСЫ … - elibrary.ru
Цель работы: анализ моделей и методик, используемых для атрибуции нарушителей кибербезопасности в интересах построения перспективной системы атрибуции при …
Hiện nay Internet of Things (IoT) đang là một xu thế phát triển mạnh trên toàn cầu. Các thiết bị IoT xuất hiện phổ biến và ứng dụng vào hầu hết các lĩnh vực của đời sống, mang lại …