Articles with "attacks detection" as a keyword



Photo by sebbill from unsplash

Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3022962

Abstract: The internet is the home for huge volumes of useful data that is constantly being created making it difficult for users to find information relevant to them. Recommendation System is a special type of information… read more here.

Keywords: attacks detection; understanding shilling; comprehensive survey; detection ... See more keywords
Photo by benceboros from unsplash

DeFakePro: Decentralized Deepfake Attacks Detection Using ENF Authentication

Sign Up to like & get
recommendations!
Published in 2022 at "IT Professional"

DOI: 10.1109/mitp.2022.3172653

Abstract: Advancements in generative models, such as deepfake, allow users to imitate a targeted person and manipulate online interactions. It has been recognized that disinformation may cause disturbance in society and ruin the foundation of trust.… read more here.

Keywords: deepfake attacks; detection using; detection; defakepro decentralized ... See more keywords
Photo from wikipedia

Codesign of FDI Attacks Detection, Isolation, and Mitigation for Complex Microgrid Systems: An HBF-NN-Based Approach.

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE transactions on neural networks and learning systems"

DOI: 10.1109/tnnls.2022.3230056

Abstract: The primary purpose of this article is to design an intelligent false data injection (FDI) attacks detection, isolation, and mitigation scheme for a class of complex microgrid systems with electric vehicles (EVs). First, a networked… read more here.

Keywords: detection; fdi attacks; attacks detection; isolation mitigation ... See more keywords
Photo from wikipedia

Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review

Sign Up to like & get
recommendations!
Published in 2022 at "Future Internet"

DOI: 10.3390/fi14040118

Abstract: Web applications are the best Internet-based solution to provide online web services, but they also bring serious security challenges. Thus, enhancing web applications security against hacking attempts is of paramount importance. Traditional Web Application Firewalls… read more here.

Keywords: web attacks; detection; attacks detection; web applications ... See more keywords