scispace - formally typeset
Journal ArticleDOI

Best ways computation intelligent of face cyber attacks

TLDR
There is a need for cybersecurity because it defines the body of processes, technologies, and practices in terms of how they are designed to help protect various programs, devices, networks, and data from the malicious persons who perform unauthorized access and damage these resources.
About
This article is published in Materials Today: Proceedings.The article was published on 2021-03-10. It has received 139 citations till now. The article focuses on the topics: Phishing.

read more

Citations
More filters
Journal ArticleDOI

A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments

Yuchong Li, +1 more
- 01 Nov 2021 - 
TL;DR: The aim of this study is to survey and comprehensively review the standard advances presented in the field of cyber security and to investigate the challenges, weaknesses and strengths of the proposed methods.
Journal ArticleDOI

The optimization efficient energy cooperative communication image transmission over WSN

TL;DR: In this article, the authors proposed energy efficiency and quality-aware multi-hop one-way cooperative image transmission framework based on image pre-processing technique, wavelet-based two-dimensional discrete wavelet transform (2D-DWT) methodology, and decode-and-forward (DF) algorithm at relay nodes.
Journal ArticleDOI

Detection of human genetic variation in VAC14 gene by ARMA-PCR technique and relation with typhoid fever infection in patients with gallbladder diseases in Thi-Qar province/Iraq

TL;DR: Investigation VAC14 gene mutation in GD patients infected with Typhoid fever by gene polymorphism ARMS-PCR technique revealed that GD patientsinfected with typhoid fever that has about five times the risk of a gene VAC 14 mutation than the incidence of the same mutation inGD patients without typhoid Fever and the patient infected with typhoidal fever that contains cdtB gene have ten times the chance of being infected with a mutated gene.
Journal ArticleDOI

A review on security analysis of cyber physical systems using Machine learning

TL;DR: The research in this paper identifies the need for integrated security for CPS and throws light into different security challenges associated with CPS and the countermeasures that existed based on machine learning and deep learning techniques that come under Artificial Intelligence (AI) and data science.
Journal ArticleDOI

Mechanical properties of concrete made with coarse and fine recycled aggregates

TL;DR: In this paper, the results of an experimental test for investigating the mechanical features of concrete made with the coarse recycled aggregate, fine recycled aggregate and both of coarse and fine recycled aggregates were given.
References
More filters
Journal ArticleDOI

A Comprehensive Review of Catastrophic Faults in PV Arrays: Types, Detection, and Mitigation Techniques

TL;DR: This review investigates the effect of faults on the operation of PV arrays and identifies limitations to existing detection and mitigation methods and a survey of state-of-the-art fault Detection and mitigation technologies and commercially available products is presented.
Journal ArticleDOI

Visual sensor intelligent module based image transmission in industrial manufacturing for monitoring and manipulation problems

TL;DR: Experimental results outwards show that the intelligent module provides energy-efficient, secured transmission with low computational time as well as a reduced bit error rate, which is a key requirement considering the intelligent manufacturing of VSNs.
Journal ArticleDOI

Manufacturing intelligent Corvus corone module for a secured two way image transmission under WSN

TL;DR: The Corvus corone module two-way image transmission is proposed that provides energy efficiency along CS model, secured transmission through a matrix of security under CS such as inbuilt method, which was named as compressed secured matrix and faultless reconstruction along that of eminent random matrix counting under CS.
Journal ArticleDOI

Efficient cooperative image transmission in one-way multi-hop sensor network:

TL;DR: A novel method of cooperative image transformation from the transmitter to the receiver for wireless sensor networks and the performance efficiency against the state-of-art methods based on mean square error, peak signal-to-noise ratio, and bit error rate is claimed.
Journal ArticleDOI

Line–Line Fault Analysis and Protection Challenges in Solar Photovoltaic Arrays

TL;DR: This paper focuses on line–line faults in PV arrays that may be caused by short-circuit faults or double ground faults, and examines the challenges to OCPD in a PV array brought by unique faults.
Related Papers (5)
Trending Questions (2)
What are the different ways businesses use business intelligence to deal with computer attacks?

Businesses use technical measures, cyber talents, cybersecurity insurances, community awareness, cyber alliances, encryption, and data backup to deal with computer attacks.

What are the most effective ways to protect government data from cyber attacks?

The most effective ways to protect government data from cyber attacks include implementing cybersecurity measures, investing in cyber talents, and creating cyber alliances.