Journal articles on the topic 'Attack rate'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Attack rate.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wu, Zhijun, Yue Yin, Guang Li, and Meng Yue. "Coherent Detection of Synchronous Low-Rate DoS Attacks." Security and Communication Networks 2021 (March 22, 2021): 1–14. http://dx.doi.org/10.1155/2021/6694264.
Full textXia, Kui Liang. "Modeling and Simulation of Low Rate of Denial of Service Attacks." Applied Mechanics and Materials 484-485 (January 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.1063.
Full textAladaileh, Mohammad Adnan, Mohammed Anbar, Ahmed J. Hintaw, Iznan H. Hasbullah, Abdullah Ahmed Bahashwan, Taief Alaa Al-Amiedy, and Dyala R. Ibrahim. "Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis." Applied Sciences 13, no. 2 (January 5, 2023): 775. http://dx.doi.org/10.3390/app13020775.
Full textAsh, Caroline. "Attack rate in Manaus." Science 371, no. 6526 (January 14, 2021): 248.16–250. http://dx.doi.org/10.1126/science.371.6526.248-p.
Full textMiao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (July 2021): 1–36. http://dx.doi.org/10.1145/3465171.
Full textKruszewski, Piotr, Carlos Bordini, Alf O. Brubakk, and Ottar Sjaastad. "Cluster Headache: Alterations in Heart Rate, Blood Pressure and Orthostatic Responses During Spontaneous Attacks." Cephalalgia 12, no. 3 (June 1992): 172–77. http://dx.doi.org/10.1046/j.1468-2982.1992.1203172.x.
Full textZhou, Lu, Mingchao Liao, Cao Yuan, and Haoyu Zhang. "Low-Rate DDoS Attack Detection Using Expectation of Packet Size." Security and Communication Networks 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3691629.
Full textLysenko, Sergii, Kira Bobrovnikova, Serhii Matiukh, Ivan Hurman, and Oleg Savenko. "Detection of the botnets’ low-rate DDoS attacks based on self-similarity." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (August 1, 2020): 3651. http://dx.doi.org/10.11591/ijece.v10i4.pp3651-3659.
Full textLei, Gang, Lejun Ji, Ruiwen Ji, Yuanlong Cao, Xun Shao, and Xin Huang. "Extracting Low-Rate DDoS Attack Characteristics: The Case of Multipath TCP-Based Communication Networks." Wireless Communications and Mobile Computing 2021 (July 7, 2021): 1–10. http://dx.doi.org/10.1155/2021/2264187.
Full textAmstey, Marvin S. "Attack rate for neonatal herpesvirus." American Journal of Obstetrics and Gynecology 155, no. 1 (July 1986): 229–30. http://dx.doi.org/10.1016/0002-9378(86)90127-4.
Full textJiang, Yi, and Dengpan Ye. "Black-Box Adversarial Attacks against Audio Forensics Models." Security and Communication Networks 2022 (January 17, 2022): 1–8. http://dx.doi.org/10.1155/2022/6410478.
Full textSingh, Rupinder, Jatinder Singh, and Ravinder Singh. "Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3548607.
Full textFu, Zhongwang, and Xiaohui Cui. "ELAA: An Ensemble-Learning-Based Adversarial Attack Targeting Image-Classification Model." Entropy 25, no. 2 (January 22, 2023): 215. http://dx.doi.org/10.3390/e25020215.
Full textYan, Yao, and Rui Xu. "DDoS Attacks for Ad Hoc Network Based on Attack Cluster." Advanced Materials Research 546-547 (July 2012): 1371–76. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1371.
Full textAlashhab, Abdussalam Ahmed, Mohd Soperi Mohd Zahid, Mohamed A. Azim, Muhammad Yunis Daha, Babangida Isyaku, and Shimhaz Ali. "A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks." Symmetry 14, no. 8 (July 29, 2022): 1563. http://dx.doi.org/10.3390/sym14081563.
Full textVedula, Vasudha, Palden Lama, Rajendra V. Boppana, and Luis A. Trejo. "On the Detection of Low-Rate Denial of Service Attacks at Transport and Application Layers." Electronics 10, no. 17 (August 30, 2021): 2105. http://dx.doi.org/10.3390/electronics10172105.
Full textKarthik, M., and M. Krishnan. "Securing an Internet of Things from Distributed Denial of Service and Mirai Botnet Attacks Using a Novel Hybrid Detection and Mitigation Mechanism." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 113–23. http://dx.doi.org/10.22266/ijies2021.0228.12.
Full textYin, Heng, Hengwei Zhang, Jindong Wang, and Ruiyu Dou. "Boosting Adversarial Attacks on Neural Networks with Better Optimizer." Security and Communication Networks 2021 (June 7, 2021): 1–9. http://dx.doi.org/10.1155/2021/9983309.
Full textMiller, Sarah, Laurence Watkins, and Manjit Matharu. "Long-term follow up of intractable chronic short lasting unilateral neuralgiform headache disorders treated with occipital nerve stimulation." Cephalalgia 38, no. 5 (July 14, 2017): 933–42. http://dx.doi.org/10.1177/0333102417721716.
Full textChen, Zhaohe, Ming Tang, and Jinghai Li. "Inversion Attacks against CNN Models Based on Timing Attack." Security and Communication Networks 2022 (February 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/6285909.
Full textPerego, Francesca, Beatrice De Maria, Maria Bova, Angelica Petraroli, Azzurra Marcelli Cesoni, Valeria De Grazia, Lorenza Chiara Zingale, Alberto Porta, Giuseppe Spadaro, and Laura Adelaide Dalla Vecchia. "Analysis of Heart-Rate Variability during Angioedema Attacks in Patients with Hereditary C1-Inhibitor Deficiency." International Journal of Environmental Research and Public Health 18, no. 6 (March 12, 2021): 2900. http://dx.doi.org/10.3390/ijerph18062900.
Full textNazih, Waleed, Yasser Hifny, Wail S. Elkilani, Habib Dhahri, and Tamer Abdelkader. "Countering DDoS Attacks in SIP Based VoIP Networks Using Recurrent Neural Networks." Sensors 20, no. 20 (October 17, 2020): 5875. http://dx.doi.org/10.3390/s20205875.
Full textLeisser, Christoph, and Oliver Findl. "Rate of strokes 1 year after retinal artery occlusion with analysis of risk groups." European Journal of Ophthalmology 30, no. 2 (February 19, 2019): 360–62. http://dx.doi.org/10.1177/1120672119830925.
Full textDu, Xiaohu, Jie Yu, Zibo Yi, Shasha Li, Jun Ma, Yusong Tan, and Qinbo Wu. "A Hybrid Adversarial Attack for Different Application Scenarios." Applied Sciences 10, no. 10 (May 21, 2020): 3559. http://dx.doi.org/10.3390/app10103559.
Full textOzdayi, Mustafa Safa, Murat Kantarcioglu, and Yulia R. Gel. "Defending against Backdoors in Federated Learning with Robust Learning Rate." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 10 (May 18, 2021): 9268–76. http://dx.doi.org/10.1609/aaai.v35i10.17118.
Full textWang, Chao, Yunxiao Sun, Wenting Wang, Hongri Liu, and Bailing Wang. "Hybrid Intrusion Detection System Based on Combination of Random Forest and Autoencoder." Symmetry 15, no. 3 (February 21, 2023): 568. http://dx.doi.org/10.3390/sym15030568.
Full textZhang, Jian, Qidi Liang, Rui Jiang, and Xi Li. "A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors." Applied Sciences 9, no. 21 (October 31, 2019): 4633. http://dx.doi.org/10.3390/app9214633.
Full textChen, Xiaoming, Lei Chen, and Yalong Yan. "Detecting a Photon-Number Splitting Attack in Decoy-State Measurement-Device-Independent Quantum Key Distribution via Statistical Hypothesis Testing." Entropy 24, no. 9 (September 2, 2022): 1232. http://dx.doi.org/10.3390/e24091232.
Full textLi, Dong-Dong, Yan-Lin Tang, Yu-Kang Zhao, Lei Zhou, Yong Zhao, and Shi-Biao Tang. "Security of Optical Beam Splitter in Quantum Key Distribution." Photonics 9, no. 8 (July 28, 2022): 527. http://dx.doi.org/10.3390/photonics9080527.
Full textYou, Haotian, Yufang Lu, and Haihua Tang. "Plant Disease Classification and Adversarial Attack Using SimAM-EfficientNet and GP-MI-FGSM." Sustainability 15, no. 2 (January 9, 2023): 1233. http://dx.doi.org/10.3390/su15021233.
Full textMichel, P., B. Dubroca, JF Dartigues, A. El Hasnaoui, and Henry. "Frequency of Severe Attacks in Migraine Sufferers of the Gazel Cohort." Cephalalgia 17, no. 8 (December 1997): 863–66. http://dx.doi.org/10.1046/j.1468-2982.1997.1708863.x.
Full textDayananda, Prakyath, Mallikarjunaswamy Srikantaswamy, Sharmila Nagaraju, Rekha Velluri, and Doddananjedevaru Mahesh Kumar. "Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter." International Journal of Power Electronics and Drive Systems (IJPEDS) 13, no. 4 (December 1, 2022): 2086. http://dx.doi.org/10.11591/ijpeds.v13.i4.pp2086-2097.
Full textClement Sunder, A. John, and A. Shanmugam. "Black Hole Attack Detection in Healthcare Wireless Sensor Networks Using Independent Component Analysis Machine Learning Technique." Current Signal Transduction Therapy 15, no. 1 (July 31, 2020): 56–64. http://dx.doi.org/10.2174/1574362413666180705123733.
Full textRepka, Marek, Michal Varchola, and Miloš Drutarovský. "Improving CPA Attack Against DSA and ECDSA." Journal of Electrical Engineering 66, no. 3 (May 1, 2015): 159–63. http://dx.doi.org/10.2478/jee-2015-0025.
Full textSiallagan, Ricardo, Widya Lestari, and Dini Hariyati Adam. "The Attack Rate of Pocket Caterpillar (Metisa plana) And How To Control It on Oil Palm (Elaeis Guineensis Jacq) Plantation At PT Umada Pernantian “A”, North of Labuhanbatu Regency." JURNAL PEMBELAJARAN DAN BIOLOGI NUKLEUS 8, no. 2 (July 25, 2022): 493–503. http://dx.doi.org/10.36987/jpbn.v8i2.2686.
Full textAineyoona, Patrick. "A MACHINE LEARNING ALGORITHM WITH SELF-UPDATE PARAMETER CALIBRATION TO IMPROVE INTRUSION DETECTION OF DDOS IN COMMUNICATION NETWORKS." International Journal of Engineering Applied Sciences and Technology 6, no. 6 (October 1, 2021): 72–79. http://dx.doi.org/10.33564/ijeast.2021.v06i06.008.
Full textPatel, Niranjan Singh, and Tryambak Hiwarkar. "Comparative Analysis of Several Anomaly Detection Algorithm with its Impact Towards the Security and its Performance." International Journal of Computer Science and Mobile Computing 11, no. 6 (June 30, 2022): 78–86. http://dx.doi.org/10.47760/ijcsmc.2022.v11i06.006.
Full textKareem, Morenikeji Kabirat, Olaniyi Dada Aborisade, Saidat Adebukola Onashoga, Tole Sutikno, and Olaniyi Mathew Olayiwola. "Efficient model for detecting application layer distributed denial of service attacks." Bulletin of Electrical Engineering and Informatics 12, no. 1 (February 1, 2023): 441–50. http://dx.doi.org/10.11591/eei.v12i1.3871.
Full textDesai, Vinod, and Dinesha Hagare Annappaiah. "Reputation-based Security model for detecting biased attacks in BigData." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 3 (March 1, 2023): 1567. http://dx.doi.org/10.11591/ijeecs.v29.i3.pp1567-1576.
Full textP. Narode, Miss Priyanka, and Prof I. R. Shaikh. "Review on EM-CURE Algorithm for Detection DDOS Attack." International Journal Of Engineering And Computer Science 7, no. 01 (January 10, 2018): 23386–489. http://dx.doi.org/10.18535/ijecs/v7i1.04.
Full textAladaileh, Mohammad A., Mohammed Anbar, Iznan H. Hasbullah, and Yousef K. Sanjalawe. "Information Theory-based Approaches to Detect DDoS Attacks on Software-defined Networking Controller a Review." International Journal of Education and Information Technologies 15 (April 22, 2021): 83–94. http://dx.doi.org/10.46300/9109.2021.15.9.
Full textDjanie, Tutu, and Dzisi. "A Proposed DoS Detection Scheme for Mitigating DoS Attack Using Data Mining Techniques." Computers 8, no. 4 (November 26, 2019): 85. http://dx.doi.org/10.3390/computers8040085.
Full textSun, De Gang, Kun Yang, Xiang Jing, Bin Lv, and Yan Wang. "Abnormal Network Traffic Detection Based on Conditional Event Algebra." Applied Mechanics and Materials 644-650 (September 2014): 1093–99. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1093.
Full textBilen, Abdulkadir, and Ahmet Bedri Özer. "Cyber-attack method and perpetrator prediction using machine learning algorithms." PeerJ Computer Science 7 (April 9, 2021): e475. http://dx.doi.org/10.7717/peerj-cs.475.
Full textKaidar, E. K., A. K. Turgambayeva, B. S. Zhussupov, B. S. Serik, and M. K. Zhanaliyeva. "Secondary attack rate of the COVID-19." International journal of health sciences 6, no. 3 (September 29, 2022): 1468–82. http://dx.doi.org/10.53730/ijhs.v6n3.13082.
Full textKUSUHARA, K. "Attack rate of exanthem subitum in Japan." Lancet 340, no. 8817 (August 1992): 482. http://dx.doi.org/10.1016/0140-6736(92)91800-n.
Full textHeithaus, Michael R. "SHARK ATTACKS ON BOTTLENOSE DOLPHINS (TURSIOPS ADUNCUS) IN SHARK BAY, WESTERN AUSTRALIA: ATTACK RATE, BITE SCAR FREQUENCIES, AND ATTACK SEASONALITY." Marine Mammal Science 17, no. 3 (July 2001): 526–39. http://dx.doi.org/10.1111/j.1748-7692.2001.tb01002.x.
Full textWang, Jing Lei. "Research on the Detection Method of the Malicious Attacks on Campus Network." Applied Mechanics and Materials 644-650 (September 2014): 3291–94. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3291.
Full textYe, Jianbin, Xiaoyuan Liu, Zheng You, Guowei Li, and Bo Liu. "DriNet: Dynamic Backdoor Attack against Automatic Speech Recognization Models." Applied Sciences 12, no. 12 (June 7, 2022): 5786. http://dx.doi.org/10.3390/app12125786.
Full textAl Maamari, Amal S., and Nadir K.Salih. "Comparison between Black Hole and Flooding Attack in Mobile Ad-hoc Network and their Simulation Study." International Journal of Research Publication and Reviews 03, no. 12 (2022): 241–48. http://dx.doi.org/10.55248/gengpi.2022.31202.
Full text