Results for 'Computer network attacks'

974 found
Order:
  1.  16
    Attack scenario graphs for computer network threat analysis and prediction.Todd Hughes & Oleg Sheyner - 2003 - Complexity 9 (2):15-18.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  2. Natural Computation Techniques Applications-Chaotically Masking Traffic Pattern to Prevent Traffic Pattern Analysis Attacks for Mission Critical Applications in Computer Communication Networks.Ming Li & Huamin Feng - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 4222--448.
    No categories
     
    Export citation  
     
    Bookmark  
  3.  83
    Logical Modes of Attack in Argumentation Networks.Dov M. Gabbay & Artur S. D’Avila Garcez - 2009 - Studia Logica 93 (2):199-230.
    This paper studies methodologically robust options for giving logical contents to nodes in abstract argumentation networks. It defines a variety of notions of attack in terms of the logical contents of the nodes in a network. General properties of logics are refined both in the object level and in the metalevel to suit the needs of the application. The network-based system improves upon some of the attempts in the literature to define attacks in terms of defeasible proofs, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  4.  24
    Modeling of attack detection system based on hybridization of binary classifiers.Beley O. I. & Kolesnyk K. K. - 2020 - Artificial Intelligence Scientific Journal 25 (3):14-25.
    The study considers the development of methods for detecting anomalous network connections based on hybridization of computational intelligence methods. An analysis of approaches to detecting anomalies and abuses in computer networks. In the framework of this analysis, a classification of methods for detecting network attacks is proposed. The main results are reduced to the construction of multi-class models that increase the efficiency of the attack detection system, and can be used to build systems for classifying (...) parameters during the attack. A model of an artificial immune system based on an evolutionary approach, an algorithm for genetic-competitive learning of the Kohonen network and a method of hierarchical hybridization of binary classifiers with the addition to the detection of anomalous network connections have been developed. The architecture of the network distributed attack detection system has been developed. The architecture of the attack detection system is two-tier: the first level provides the primary analysis of individual packets and network connections using signature analysis, the second level processes the processing of aggregate network data streams using adaptive classifiers. A signature analysis was performed to study network performance based on the Aho-Korasik and Boyer-Moore algorithms and their improved analogues were implemented using OpenMP and CUDA technologies. The architecture is presented and the main points of operation of the network attack generator are shown. A system for generating network attacks has been developed. This system consists of two components: an asynchronous transparent proxy server for TCP sessions and a frontend interface for a network attack generator. The results of the experiments confirmed that the functional and non-functional requirements, as well as the requirements for computing intelligent systems, are met for the developed attack detection system. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  21
    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication.Banghua Wu, Shah Nazir & Neelam Mukhtar - 2020 - Complexity 2020:1-12.
    Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  28
    (2 other versions)Computation and Causation.Richard Scheines - 2002 - Metaphilosophy 33 (1‐2):158-180.
    The computer’s effect on our understanding of causation has been enormous. By the mid‐1980s, philosophical and social‐scientific work on the topic had left us with (1) no reasonable reductive account of causation and (2) a class of statistical causal models tied to linear regression. At this time, computer scientists were attacking the problem of equipping robots with models of the external that included probabilistic portrayals of uncertainty. To solve the problem of efficiently storing such knowledge, they introduced Bayes (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. (1 other version)The specifics of displaying social networks and computer technologies in the fantasy universe of Stephen King in the early 70s of the XX century — early 20s of the XXI century in historical retrospect. [REVIEW]К. В Каспарян, М. В Рутковская & И. Н Колесников - 2025 - Philosophical Problems of IT and Cyberspace (PhilITandC) 2:64-86.
    This article is devoted to the analysis of the characteristic features of the process of displaying virtual network platforms and cybernetic technologies in the early 1970s — early 2020s in the fantastic universe (literary and cinematic) created by S. King, one of the leading American science fiction writers of our time. In this study, the authors provide a justification for the relevance and scientific novelty of the problem under study. This paper analyzes the specific features of the impact of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  17
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  16
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  27
    A Computational-Hermeneutic Approach for Conceptual Explicitation.Christoph Benzmüller & David Fuenmayor - 2019 - In Matthieu Fontaine, Cristina Barés-Gómez, Francisco Salguero-Lamillar, Lorenzo Magnani & Ángel Nepomuceno-Fernández (eds.), Model-Based Reasoning in Science and Technology: Inferential Models for Logic, Language, Cognition and Computation. Springer Verlag.
    We present a computer-supported approach for the logical analysis and conceptual explicitation of argumentative discourse. Computational hermeneutics harnesses recent progresses in automated reasoning for higher-order logics and aims at formalizing natural-language argumentative discourse using flexible combinations of expressive non-classical logics. In doing so, it allows us to render explicit the tacit conceptualizations implicit in argumentative discursive practices. Our approach operates on networks of structured arguments and is iterative and two-layered. At one layer we search for logically correct formalizations for (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  11. Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  12. Semantics for Higher Level Attacks in Extended Argumentation Frames Part 1: Overview.Dov M. Gabbay - 2009 - Studia Logica 93 (2-3):357-381.
    In 2005 the author introduced networks which allow attacks on attacks of any level. So if a → b reads a attacks 6, then this attack can itself be attacked by another node c. This attack itself can attack another node d. This situation can be iterated to any level with attacks and nodes attacking other attacks and other nodes. In this paper we provide semantics to such networks. We offer three different approaches to obtaining (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  13.  14
    Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications.Mohammad Kamrul Hasan, Muhammad Shafiq, Shayla Islam, Bishwajeet Pandey, Yousef A. Baker El-Ebiary, Nazmus Shaker Nafi, R. Ciro Rodriguez & Doris Esenarro Vargas - 2021 - Complexity 2021:1-13.
    As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things has been introduced that revolves around smart devicesʼ conception. These smart devices using IoT can communicate with each other through a network to attain particular objectives, i.e., automation and intelligent decision making. IoT has enabled the users to divide their household burden with machines as these complex machines look after the environment variables (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  54
    Equational approach to argumentation networks.D. M. Gabbay - 2012 - Argument and Computation 3 (2-3):87 - 142.
    This paper provides equational semantics for Dung's argumentation networks. The network nodes get numerical values in [0,1], and are supposed to satisfy certain equations. The solutions to these equations correspond to the ?extensions? of the network. This approach is very general and includes the Caminada labelling as a special case, as well as many other so-called network extensions, support systems, higher level attacks, Boolean networks, dependence on time, and much more. The equational approach has its conceptual (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  15.  37
    Novel Node Centrality-Based Efficient Empirical Robustness Assessment for Directed Network.Xiaolong Deng, Hao Ding, Yong Chen, Cai Chen & Tiejun Lv - 2020 - Complexity 2020:1-14.
    In recent years, while extensive researches on various networks properties have been proposed and accomplished, little has been proposed and done on network robustness and node vulnerability assessment under cascades in directed large-scale online community networks. In essential, an online directed social network is a group-centered and information spread-dominated online platform which is very different from the traditional undirected social network. Some further research studies have indicated that the online social network has high robustness to random (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  63
    Togetherness and respect: ethical concerns of privacy in Global Web Societies.Gordana Dodig-Crnkovic & Virginia Horniak - 2006 - AI and Society 20 (3):372-383.
    Today’s computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated internet-based attacks are almost impossible to prevent. At the same time, information and communication technology, ICT offers the technical possibility of embedded privacy protection. Making technology legitimate by design is a part of the intentional design for democracy. This means incorporating options for socially acceptable behaviour in technical systems, and making the basic principles of privacy protection, rights (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17. Modal and temporal argumentation networks.H. Barringer, D. M. Gabbay & J. Woods - 2012 - Argument and Computation 3 (2-3):203 - 227.
    The traditional Dung networks depict arguments as atomic and study the relationships of attack between them. This can be generalised in two ways. One is to consider various forms of attack, support, feedback, etc. Another is to add content to nodes and put there not just atomic arguments but more structure, e.g. proofs in some logic or simply just formulas from a richer language. This paper offers to use temporal and modal language formulas to represent arguments in the nodes of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  18. AISC 17 Talk: The Explanatory Problems of Deep Learning in Artificial Intelligence and Computational Cognitive Science: Two Possible Research Agendas.Antonio Lieto - 2018 - In Proceedings of AISC 2017.
    Endowing artificial systems with explanatory capacities about the reasons guiding their decisions, represents a crucial challenge and research objective in the current fields of Artificial Intelligence (AI) and Computational Cognitive Science [Langley et al., 2017]. Current mainstream AI systems, in fact, despite the enormous progresses reached in specific tasks, mostly fail to provide a transparent account of the reasons determining their behavior (both in cases of a successful or unsuccessful output). This is due to the fact that the classical problem (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  11
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the experimental (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  25
    Crisis Spreading Model of the Shareholding Networks of Listed Companies and Their Main Holders and Their Controllability.Yuanyuan Ma & Lingxuan Li - 2018 - Complexity 2018:1-17.
    Bankruptcy of listed companies or shareholders delisting usually causes the crisis spreading in stock markets. Based on the systematic analysis of the epidemic diseases and rumors spreading on the complex networks, the SIR model is introduced to research the crisis spreading in shareholding networks of listed companies and their main holders on the basis of the data about ownership structure in Chinese Stock Markets. The characteristics of shareholding networks are studied, and the parameters for the SIR model are obtained by (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  63
    How to Think About Cyber Conflicts Involving Non-state Actors.Phillip McReynolds - 2015 - Philosophy and Technology 28 (3):427-448.
    A great deal of attention has been paid in recent years to the legality of the actions of states and state agents in international and non-international cyber conflicts. Less attention has been paid to ethical considerations in these situations, and very little has been written regarding the ethics of the participation of non-state actors in such conflicts. In this article, I analyze different categories of non-state participation in cyber operations and undertake to show under what conditions such actions, though illegal, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  53
    Temporal, numerical and meta-level dynamics in argumentation networks.H. Barringer, D. M. Gabbay & J. Woods - 2012 - Argument and Computation 3 (2-3):143-202.
    This paper studies general numerical networks with support and attack. Our starting point is argumentation networks with the Caminada labelling of three values 1=in, 0=out and ½=undecided. This is generalised to arbitrary values in [01], which enables us to compare with other numerical networks such as predator?prey ecological networks, flow networks, logical modal networks and more. This new point of view allows us to see the place of argumentation networks in the overall landscape of networks and import and export ideas (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  23.  23
    (2 other versions)Synthetic Neuroethology.Pete Mandik - 2002 - Metaphilosophy 33 (1‐2):11-29.
    Computation and philosophy intersect three times in this essay. Computation is considered as an object, as a method, and as a model used in a certain line of philosophical inquiry concerning the relation of mind to matter. As object, the question considered is whether computation and related notions of mental representation constitute the best ways to conceive of how physical systems give rise to mental properties. As method and model, the computational techniques of artificial life and embodied evolutionary connectionism are (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  24.  41
    Rethinking Cyber War.Daniel K. Rosenfield - 2009 - Critical Review: A Journal of Politics and Society 21 (1):77-90.
    ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences. In order to better protect society, policymakers will have to re‐orient their approach toward cyber security so as to emphasize the genuine cybernetic threat, which is network disruption rather than physical destruction.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Learning Computer Networks Using Intelligent Tutoring System.Mones M. Al-Hanjori, Mohammed Z. Shaath & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1).
    Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate, education, health, training, and educational programs. In this paper we describe an intelligent tutoring system that helps student study computer networks. The current ITS provides intelligent presentation of educational content appropriate for students, such as the degree of knowledge, the desired level of detail, assessment, student level, and familiarity with the subject. Our Intelligent tutoring system was developed using ITSB authoring tool for building ITS. A preliminary evaluation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  26.  14
    Towards a computational network theory of social groups.Daniel Redhead, Riana Minocher & Dominik Deffner - 2022 - Behavioral and Brain Sciences 45.
    Network theory is necessary for the realization of cognitive representations and resulting empirical observations of social groups. We propose that the triadic primitives denoting individual roles are multilayer, with positive and negative relations feeding into cost–benefit calculations. Through this, we advance a computational theory that generalizes to different scales and to contexts where conflict is not present.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  22
    Hacktivism: On the Use of Botnets in Cyberattacks.Marco Deseriis - 2017 - Theory, Culture and Society 34 (4):131-152.
    This article offers a reading of internet-based activism or ‘hacktivism’ as a phenomenon that cannot be confined to the instrumental use of information technologies. It focuses on a subset of hacktivism – the distributed-denial-of-service (DDoS) attack for political ends – that aims at making an internet host unavailable to its intended users. Since the early 2000s these attacks have been increasingly conducted by means of botnets – networks of infected computers that send bogus requests to a target website without (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  24
    On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal.Mohammad M. Masud, Mohamed Al Hemairy & Zouheir Trabelsi - 2015 - Journal of Intelligent Systems 24 (2):199-213.
    Biometrics readers are deployed in many public sites and are used for user identification and verification. Nowadays, most biometrics readers can be connected to local area networks, and consequently, they are potential targets for network attacks. This article investigates the robustness of several fingerprint and iris readers against common denial of service attacks. This investigation has been conducted using a set of laboratory experiments and DoS attack generator tools. The experiments show clearly that the tested biometric readers (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29. More broadly, computer networks have made interaction between.Cultures In Collision - 2002 - In James Moor & Terrell Ward Bynum (eds.), Cyberphilosophy: the intersection of philosophy and computing. Malden, MA: Blackwell.
  30.  37
    On the difficulty of really considering a radical novelty.Derek Partridge - 1995 - Minds and Machines 5 (3):391-410.
    The fundamental assumptions in Dijkstra''s influential article on computing science teaching are challenged. Dijkstra''s paper presents the radical novelties of computing, and the consequent problems that we must tackle through a formal, logic-based approach to program derivation. Dijkstra''s main premise is that the algorithmic programming paradigm is the only one, in fact, the only possible one. It is argued that there is at least one other, the network-programming paradigm, which itself is a radical novelty with respect to the implementation (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  35
    Biological models of security for virus propagation in computer networks.Sanjay Goel & Stephen F. S. F. Bush - 2004 - Login, December 29 (6):49--56.
    This aricle discusses the similarity between the propagation of pathogens (viruses and worms) on computer networks and the proliferation of pathogens in cellular organisms (organisms with genetic material contained within a membrane-encased nucleus). It introduces several biological mechanisms which are used in these organisms to protect against such pathogens and presents security models for networked computers inspired by several biological paradigms, including genomics (RNA interference), proteomics (pathway mapping), and physiology (immune system). In addition, the study of epidemiological models for (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  36
    An interdisciplinary approach to address identity theft education.S. Helser - 2011 - Acm Sigcas Computers and Society 41 (2):38-50.
    An earlier version of this paper was presented at the 2011 IEEE International Symposium on Technology and Society at Saint Xavier University in Chicago, Illinois. The focus of this paper is to present observations related to information assurance in rural and urban populations. Based on our experience teaching college students in these environments, we have noted that on entering school, generally, individuals demonstrate limited background knowledge of a variety of computer related technologies. Students begin with a technical disadvantage that (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  33.  17
    The Information Web: Ethical and Social Implications of Computer Networking.Carol C. Gould (ed.) - 1989 - Routledge.
    This book deals with the major ethical and social implications of computer networking and its technological development. In this book, a number of leading thinkers--philosophers, computer scientists and researchers--address some fundamental questions posed by the new technology.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  36
    Protecting critical infrastructure: implementing integration and expanding education: first prize: 2007 Schubmehl-Prein Essay contest.David A. Martinez - 2008 - Acm Sigcas Computers and Society 38 (1):12-17.
    The tenuous network of interconnected data that supports our nation's critical infrastructure has been built up, computer by computer, over only the last few decades. From punch cards to the supercomputers constructed by pioneers in today's fields, computers have been controlling our nation's critical sectors nearly every step of the way. As designers of today's critical systems gravitate slowly towards systems that require less human oversight than ever before, the vulnerability of the networks that control our electricity (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  35. Carol Gould, ed., The Information Web: Ethical and Social Implications of Computer Networking Reviewed by.Kristin Shrader-Frechette - 1990 - Philosophy in Review 10 (3):110-112.
     
    Export citation  
     
    Bookmark  
  36. Some Useful 16-Valued Logics: How a Computer Network Should Think.Yaroslav Shramko & Heinrich Wansing - 2005 - Journal of Philosophical Logic 34 (2):121-153.
    In Belnap's useful 4-valued logic, the set 2 = {T, F} of classical truth values is generalized to the set 4 = ������(2) = {Ø, {T}, {F}, {T, F}}. In the present paper, we argue in favor of extending this process to the set 16 = ᵍ (4) (and beyond). It turns out that this generalization is well-motivated and leads from the bilattice FOUR₂ with an information and a truth-and-falsity ordering to another algebraic structure, namely the trilattice SIXTEEN₃ with an (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   60 citations  
  37.  16
    Evaluating the Impact of Different Feature as a Counter Data Aggregation approaches on the Performance of NIDSs and Their Selected Features.Roberto Magán-Carrión, Daniel Urda, Ignacio Diaz-Cano & Bernabé Dorronsoro - 2024 - Logic Journal of the IGPL 32 (2):263-280.
    There is much effort nowadays to protect communication networks against different cybersecurity attacks (which are more and more sophisticated) that look for systems’ vulnerabilities they could exploit for malicious purposes. Network Intrusion Detection Systems (NIDSs) are popular tools to detect and classify such attacks, most of them based on ML models. However, ML-based NIDSs cannot be trained by feeding them with network traffic data as it is. Thus, a Feature Engineering (FE) process plays a crucial role (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  11
    Emergent computation: Self-organizing, collective, and cooperative phenomena in natural and artificial computing networks.Peter M. Todd - 1993 - Artificial Intelligence 60 (1):171-183.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  67
    Society under threat… but not from AI.Ajit Narayanan - 2013 - AI and Society 28 (1):87-94.
    25 years ago, when AI & Society was launched, the emphasis was, and still is, on dehumanisation and the effects of technology on human life, including reliance on technology. What we forgot to take into account was another very great danger to humans. The pervasiveness of computer technology, without appropriate security safeguards, dehumanises us by allowing criminals to steal not just our money but also our confidential and private data at will. Also, denial-of-service attacks prevent us from accessing (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  35
    Crossing the Rubicon: Understanding Cyber Terrorism in the European Context.Emerald M. Archer - 2014 - The European Legacy 19 (5):606-621.
    The first decade of the twenty-first century introduced a cultural shift where terrorism is concerned by making new technologies such as computers and networks available as both tools and targets for exploitation. The current rise in the number of attempts at launching a cyber attack may represent a new generation of “terrorists” and their discontent with governments, private companies, or with other non-governmental groups. Using cyber technologies has many benefits for the user and the potential of causing more damage by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  27
    Technology and Security Analysis of Cryptocurrency Based on Blockchain.Chao Yu, Wenke Yang, Feiyu Xie & Jianmin He - 2022 - Complexity 2022:1-15.
    Blockchain technology applied to cryptocurrencies is the dominant factor in maintaining the security of cryptocurrencies. This article reviews the technological implementation of cryptocurrency and the security and stability of cryptocurrency and analyzes the security support from blockchain technology and its platforms based on empirical case studies. Our results show that the security support from blockchain technology platforms is significantly insufficient and immature. In addition, we further Zyskind and Nathan and Choi and find that the top ten platforms play critical roles (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42. An Intelligent Tutoring System for Learning Computer Network CCNA.Izzeddin A. Alshawwa, Mohammed Al-Shawwa & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (2):28-36.
    Abstract: Networking is one of the most important areas currently used for data transfer and enterprise management. It also includes the security aspect that enables us to protect our network to prevent hackers from accessing the organization's data. In this paper, we would like to learn what the network is and how it works. And what are the basics of the network since its emergence and know the mechanism of action components. After reading this paper - even (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  22
    Insider attack detection in database with deep metric neural network with Monte Carlo sampling.Gwang-Myong Go, Seok-Jun Bu & Sung-Bae Cho - 2022 - Logic Journal of the IGPL 30 (6):979-992.
    Role-based database management systems are most widely used for information storage and analysis but are known as vulnerable to insider attacks. The core of intrusion detection lies in an adaptive system, where an insider attack can be judged if it is different from the predicted role by performing classification on the user’s queries accessing the database and comparing it with the authorized role. In order to handle the high similarity of user queries for misclassified roles, this paper proposes a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  26
    The Impact of Different System Call Representations on Intrusion Detection.Sarah Wunderlich, Markus Ring, Dieter Landes & Andreas Hotho - 2022 - Logic Journal of the IGPL 30 (2):239-251.
    Over the years, artificial neural networks have been applied successfully in many areas including IT security. Yet, neural networks can only process continuous input data. This is particularly challenging for security-related, non-continuous data like system calls of an operating system. This work focuses on five different options to preprocess sequences of system calls so that they can be processed by neural networks. These input options are based on one-hot encodings and learning word2vec, GloVe or fastText representations of system calls. As (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  51
    Universal computation in fluid neural networks.Ricard V. Solé & Jordi Delgado - 1996 - Complexity 2 (2):49-56.
    Fluid neural networks can be used as a theoretical framework for a wide range of complex systems as social insects. In this article we show that collective logical gates can be built in such a way that complex computation can be possible by means of the interplay between local interactions and the collective creation of a global field. This is exemplified by a NOR gate. Some general implications for ant societies are outlined. ©.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  73
    A neural cognitive model of argumentation with application to legal inference and decision making.Artur S. D'Avila Garcez, Dov M. Gabbay & Luis C. Lamb - 2014 - Journal of Applied Logic 12 (2):109-127.
    Formal models of argumentation have been investigated in several areas, from multi-agent systems and artificial intelligence (AI) to decision making, philosophy and law. In artificial intelligence, logic-based models have been the standard for the representation of argumentative reasoning. More recently, the standard logic-based models have been shown equivalent to standard connectionist models. This has created a new line of research where (i) neural networks can be used as a parallel computational model for argumentation and (ii) neural networks can be used (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  12
    Resilient and adaptive defense of computing networks.Robert Ghanea-Hercock - 2003 - Complexity 9 (2):13-14.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  44
    A Computational Model for the Item‐Based Induction of Construction Networks.Judith Gaspers & Philipp Cimiano - 2014 - Cognitive Science 38 (3):439-488.
    According to usage‐based approaches to language acquisition, linguistic knowledge is represented in the form of constructions—form‐meaning pairings—at multiple levels of abstraction and complexity. The emergence of syntactic knowledge is assumed to be a result of the gradual abstraction of lexically specific and item‐based linguistic knowledge. In this article, we explore how the gradual emergence of a network consisting of constructions at varying degrees of complexity can be modeled computationally. Linguistic knowledge is learned by observing natural language utterances in an (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users. [REVIEW]Vladislav D. Veksler, Norbou Buchler, Blaine E. Hoffman, Daniel N. Cassenti, Char Sample & Shridat Sugrim - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  31
    Economies of disclosure.Jeff Bollinger - 2004 - Acm Sigcas Computers and Society 34 (3):1-1.
    Imagine this scenario: a bank customer walks up to an ATM to withdraw cash from her account. While entering her PIN, she accidentally presses the '3' key at the same time as the 'Clear' key. Instantly $100 comes out of the cash dispenser! Curious, she checks the receipt and seeing that the money did not from her account, she tries the same operation. Again, $100 comes out of the cash dispenser. At this point she has two options, A: she can (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 974