Author:
Nygard Kendall E.,Rastogi Aakanksha,Ahsan Mostofa,Satyal Rashmi
Publisher
Springer International Publishing
Reference48 articles.
1. Wolff, J. (2020, December 16). What we do and don’t know about the massive federal government hack. Slate Archive.
2. Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., & Autrel, F. (2007). Advanced reaction using risk assessment in intrusion detection systems. In Proceedings of the International Workshop on Critical Information Infrastructures Security.
3. National Vulnerability Database. Retrieved December 20, 2020, from https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
4. Chowdhury, A., Karmakar, G., Kamruzzaman, J., Jolfaei, A., & Das, R. (2020). Attacks on self-driving cars and their countermeasures: A survey. IEEE Access, 8, 207308–207342.
5. Zaidi, T., & Faisal, S. (2018). An overview: Various attacks in VANET. In Proceedings of the 4th International Conference on Computing Communication and Automation (ICCCA).
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Understanding APT detection using Machine learning algorithms: Is superior accuracy a thing?;2024 IEEE International Conference on Electro Information Technology (eIT);2024-05-30
2. Research Ideas on Network Security Experiment and Appraisal of Avionics System;2023 8th International Conference on Data Science in Cyberspace (DSC);2023-08-18
3. Intrusion Detection for IoT Network Security with Deep Neural Network;2022 IEEE International Conference on Electro Information Technology (eIT);2022-05-19
4. Malware: A Software for Cybercrime;2022 IEEE International Conference on Electro Information Technology (eIT);2022-05-19
5. COVID-19 Sentiment Analysis applying BERT;2022 IEEE International Conference on Electro Information Technology (eIT);2022-05-19