• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Wang Z, Ghaleb FA, Zainal A, Siraj MM, Lu X. An efficient intrusion detection model based on convolutional spiking neural network. Sci Rep 2024;14:7054. [PMID: 38528084 DOI: 10.1038/s41598-024-57691-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/25/2024] [Accepted: 03/20/2024] [Indexed: 03/27/2024]  Open
2
Naqvi SSA, Li Y, Uzair M. DDoS attack detection in smart grid network using reconstructive machine learning models. PeerJ Comput Sci 2024;10:e1784. [PMID: 38259891 PMCID: PMC10803083 DOI: 10.7717/peerj-cs.1784] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/22/2023] [Accepted: 12/07/2023] [Indexed: 01/24/2024]
3
Meiseles A, Motro Y, Rokach L, Moran-Gilad J. Vulnerability of pangolin SARS-CoV-2 lineage assignment to adversarial attack. Artif Intell Med 2023;146:102722. [PMID: 38042605 DOI: 10.1016/j.artmed.2023.102722] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/23/2022] [Revised: 11/14/2023] [Accepted: 11/14/2023] [Indexed: 12/04/2023]
4
Kamerer JL, McDermott DS. Cyber hygiene concepts for nursing education. Nurse Educ Today 2023;130:105940. [PMID: 37595324 DOI: 10.1016/j.nedt.2023.105940] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/21/2023] [Revised: 07/24/2023] [Accepted: 08/10/2023] [Indexed: 08/20/2023]
5
Chen M, Yan M. How to protect smart and autonomous vehicles from stealth viruses and worms. ISA Trans 2023;141:52-58. [PMID: 37217376 DOI: 10.1016/j.isatra.2023.04.019] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/31/2022] [Revised: 04/06/2023] [Accepted: 04/14/2023] [Indexed: 05/24/2023]
6
Ahmed RN, Javed A, Bedewi W. Is COVID-19 Being Used to Spread Malware. SN Comput Sci 2023;4:398. [PMID: 37220558 PMCID: PMC10189705 DOI: 10.1007/s42979-023-01838-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/14/2022] [Accepted: 01/27/2023] [Indexed: 05/25/2023]
7
Marazqah Btoush EAL, Zhou X, Gururajan R, Chan KC, Genrich R, Sankaran P. A systematic review of literature on credit card cyber fraud detection using machine and deep learning. PeerJ Comput Sci 2023;9:e1278. [PMID: 37346569 PMCID: PMC10280638 DOI: 10.7717/peerj-cs.1278] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/28/2022] [Accepted: 02/15/2023] [Indexed: 06/23/2023]
8
Xu T, Singh K, Rajivan P. Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks. Appl Ergon 2023;108:103908. [PMID: 36403509 DOI: 10.1016/j.apergo.2022.103908] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/09/2022] [Revised: 06/10/2022] [Accepted: 09/20/2022] [Indexed: 06/16/2023]
9
Yadav A, Kumar A, Singh V. Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security. Artif Intell Rev 2023;56:1-32. [PMID: 37362900 PMCID: PMC10014398 DOI: 10.1007/s10462-023-10454-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/17/2023]
10
Mishra S, Soni D. DSmishSMS-A System to Detect Smishing SMS. Neural Comput Appl 2023;35:4975-92. [PMID: 34341626 DOI: 10.1007/s00521-021-06305-y] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/04/2021] [Accepted: 07/01/2021] [Indexed: 12/03/2022]
11
Dart M, Ahmed M. CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language ontology. Digit Health 2023;9:20552076231191095. [PMID: 37533776 PMCID: PMC10392183 DOI: 10.1177/20552076231191095] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/17/2023] [Accepted: 07/13/2023] [Indexed: 08/04/2023]  Open
12
Hurrah NN, Khan E, Khan U. CADEN: cellular automata and DNA based secure framework for privacy preserving in IoT based healthcare. J Ambient Intell Humaniz Comput 2022;14:2631-2643. [PMID: 36590234 PMCID: PMC9791968 DOI: 10.1007/s12652-022-04510-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/21/2022] [Accepted: 12/13/2022] [Indexed: 06/17/2023]
13
Sendelj R, Ognjanovic I. Cybersecurity Challenges in Healthcare. Stud Health Technol Inform 2022;300:190-202. [PMID: 36300412 DOI: 10.3233/shti220951] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 06/16/2023]
14
Catal C, Ozcan A, Donmez E, Kasif A. Analysis of cyber security knowledge gaps based on cyber security body of knowledge. Educ Inf Technol (Dordr) 2022;28:1809-1831. [PMID: 35967829 PMCID: PMC9362361 DOI: 10.1007/s10639-022-11261-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/09/2021] [Accepted: 07/22/2022] [Indexed: 06/15/2023]
15
Allodi L, Massacci F, Williams J. The Work-Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures. Risk Anal 2022;42:1623-1642. [PMID: 33960506 PMCID: PMC9543271 DOI: 10.1111/risa.13732] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
16
Mishra S, Soni D. Implementation of 'Smishing Detector': An Efficient Model for Smishing Detection Using Neural Network. SN Comput Sci 2022;3:189. [PMID: 35308803 PMCID: PMC8923090 DOI: 10.1007/s42979-022-01078-0] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/15/2021] [Accepted: 02/19/2022] [Indexed: 06/14/2023]
17
Valeros V, Garcia S. Hornet 40: Network dataset of geographically placed honeypots. Data Brief 2022;40:107795. [PMID: 35036492 PMCID: PMC8749222 DOI: 10.1016/j.dib.2022.107795] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/05/2021] [Revised: 01/03/2022] [Accepted: 01/04/2022] [Indexed: 11/16/2022]  Open
18
Mughaid A, AlZu’bi S, Hnaif A, Taamneh S, Alnajjar A, Elsoud EA. An intelligent cyber security phishing detection system using deep learning techniques. Cluster Comput 2022;25:3819-3828. [PMID: 35602317 PMCID: PMC9107003 DOI: 10.1007/s10586-022-03604-4] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/17/2021] [Revised: 04/20/2022] [Accepted: 04/22/2022] [Indexed: 05/13/2023]
19
Rosati P, Lynn T. A dataset for accounting, finance and economics research on US data breaches. Data Brief 2021;35:106924. [PMID: 33748365 PMCID: PMC7966974 DOI: 10.1016/j.dib.2021.106924] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/03/2020] [Revised: 02/24/2021] [Accepted: 02/26/2021] [Indexed: 12/01/2022]  Open
20
Ko I, Chambers D, Barrett E. Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain. INT J MACH LEARN CYB 2021;:1-23. [PMID: 33786073 DOI: 10.1007/s13042-021-01306-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/20/2020] [Accepted: 03/10/2021] [Indexed: 10/29/2022]
21
Venturi A, Apruzzese G, Andreolini M, Colajanni M, Marchetti M. DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems. Data Brief 2021;34:106631. [PMID: 33365367 PMCID: PMC7749366 DOI: 10.1016/j.dib.2020.106631] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/21/2020] [Revised: 12/02/2020] [Accepted: 12/03/2020] [Indexed: 11/28/2022]  Open
22
Husák M, Žádník M, Bartoš V, Sokol P. Dataset of intrusion detection alerts from a sharing platform. Data Brief 2020;33:106530. [PMID: 33299907 DOI: 10.1016/j.dib.2020.106530] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/13/2020] [Revised: 11/03/2020] [Accepted: 11/09/2020] [Indexed: 11/24/2022]  Open
23
Wurmb T, Kippnich M, Schwarzmann G, Mehlhase J, Valotis A, Firnkes T, Braungardt J, Ertl G. [Complete information technology blackout in hospitals : Development of a concept for maintaining patient care]. Unfallchirurg 2020;123:443-452. [PMID: 32270220 DOI: 10.1007/s00113-020-00797-4] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
24
Bhuyan SS, Kabir UY, Escareno JM, Ector K, Palakodeti S, Wyant D, Kumar S, Levy M, Kedia S, Dasgupta D, Dobalian A. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations. J Med Syst 2020;44:98. [PMID: 32239357 DOI: 10.1007/s10916-019-1507-y] [Citation(s) in RCA: 33] [Impact Index Per Article: 8.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/31/2018] [Accepted: 11/14/2019] [Indexed: 11/25/2022]
25
Venter IM, Blignaut RJ, Renaud K, Venter MA. Cyber security education is as essential as "the three R's". Heliyon 2019;5:e02855. [PMID: 31872107 PMCID: PMC6909085 DOI: 10.1016/j.heliyon.2019.e02855] [Citation(s) in RCA: 20] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/24/2019] [Revised: 08/11/2019] [Accepted: 11/13/2019] [Indexed: 11/30/2022]  Open
26
Tschakert KF, Ngamsuriyaroj S. Effectiveness of and user preferences for security awareness training methodologies. Heliyon 2019;5:e02010. [PMID: 31338464 PMCID: PMC6606995 DOI: 10.1016/j.heliyon.2019.e02010] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/19/2019] [Revised: 05/24/2019] [Accepted: 06/11/2019] [Indexed: 10/26/2022]  Open
27
Vidhyapriya R, Lovelyn Rose S. Personal Authentication Mechanism Based on Finger Knuckle Print. J Med Syst 2019;43:232. [PMID: 31203468 DOI: 10.1007/s10916-019-1332-3] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/19/2019] [Accepted: 05/08/2019] [Indexed: 10/26/2022]
28
Bustard JD. Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security. Sci Eng Ethics 2018;24:683-698. [PMID: 28401507 PMCID: PMC5876413 DOI: 10.1007/s11948-017-9904-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/29/2016] [Accepted: 03/19/2017] [Indexed: 06/07/2023]
29
Zhao W, Yang MQ. Dependability enhancing mechanisms for integrated clinical environments. J Supercomput 2017;73:4207-4220. [PMID: 29081597 PMCID: PMC5657604 DOI: 10.1007/s11227-017-2003-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Indexed: 06/07/2023]
30
Pieters W, Hadžiosmanović D, Dechesne F. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Sci Eng Ethics 2016;22:831-850. [PMID: 25896029 PMCID: PMC4912578 DOI: 10.1007/s11948-015-9648-y] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/22/2014] [Accepted: 03/31/2015] [Indexed: 06/01/2023]
31
Frommholz I, Al-Khateeb HM, Potthast M, Ghasem Z, Shukla M, Short E. On Textual Analysis and Machine Learning for Cyberstalking Detection. Datenbank Spektrum 2016;16:127-135. [PMID: 29368749 PMCID: PMC5750836 DOI: 10.1007/s13222-016-0221-x] [Citation(s) in RCA: 22] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/01/2016] [Accepted: 04/21/2016] [Indexed: 11/28/2022]
32
Ashok A, Hahn A, Govindarasu M. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment. J Adv Res 2014;5:481-9. [PMID: 25685516 DOI: 10.1016/j.jare.2013.12.005] [Citation(s) in RCA: 75] [Impact Index Per Article: 6.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/21/2013] [Revised: 11/28/2013] [Accepted: 12/10/2013] [Indexed: 11/20/2022]  Open
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA