You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Loss in Cybersecurity.
Summary: The Cybersecurity and Infrastructure Security Agency CISA leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. In response to the Russian Invasion of Ukraine, CISA has been closely monitoring the increased malicious cyber activity and has developed strategies to help mitigate the ris…
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, benign SV packets, and MALICIOUS SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
The main repository for our DE project! This website will be hosted using GitHub pages. Our plan is to make a website which anyone can visit in case or for prevention of cyber attacks.
Simulate mixed traffic on a ring road to analyze interactions between human-driven and ACC-equipped vehicles under various conditions, including disruptions.
This article aims to demystify SQL Injection, explaining what it is, how it operates, its purposes in the cybersecurity landscape, and mentioning tools that can be used to conduct such attacks.
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, MALICIOUS GOOSE packets, and benign SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
InsightMonitor is a comprehensive system monitoring solution designed to provide real-time insights into various aspects of system performance and resource utilization. It works by deploying lightweight agents on monitored systems to continuously collect data on key metrics such as CPU usage, memory utilization, disk activity, and network traffic.
Tarefas com o uso de inteligência artificial para detecção de anomalias e ataques adversariais, fazer testes de modelos, hiperparâmetros e produzir relatórios. Tarefas da cadeira de Detecção de Intrusão do curso de Engenharia da Computação (EC) do CIn da UFPE, cadeira cursada por mim de 2023 a 2024.
A curated list of awesome cyber attacks in iran, we want to review and explain some advanced attack that happened in iran, in order to learned some security tips.