2020
DOI: 10.3103/s0146411620080180
|View full text |Cite
|
Sign up to set email alerts
|

Identification of Cyber Threats in Networks of Industrial Internet of Things Based on Neural Network Methods Using Memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Since 2012, the United States had launched the "Treasure Map Project" and the "mission X" to study real-time and interactive global Internet maps, which provided basic support for research on cyberspace information [3]. In 2014, Kaspersky lab in Russia released its new interactive cyber threats real-time map, which was dedicated to real-time representation of network activities [4]. In 2018, China Internet Security Conference (CISC) showed the smart city system, which integrated basic cyber information and showed it in a centralized way, so as to monitor and respond to cyber security attacks in real time [5].…”
Section: Introductionmentioning
confidence: 99%
“…Since 2012, the United States had launched the "Treasure Map Project" and the "mission X" to study real-time and interactive global Internet maps, which provided basic support for research on cyberspace information [3]. In 2014, Kaspersky lab in Russia released its new interactive cyber threats real-time map, which was dedicated to real-time representation of network activities [4]. In 2018, China Internet Security Conference (CISC) showed the smart city system, which integrated basic cyber information and showed it in a centralized way, so as to monitor and respond to cyber security attacks in real time [5].…”
Section: Introductionmentioning
confidence: 99%