Academic literature on the topic 'Byzantines Attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Byzantines Attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Byzantines Attack"

1

Böhm, Marcin. "Constantine X Doukas (1059–1067) versus Uzes – about the Nomads on Boats on the Danube in 1064." Studia Ceranea 11 (December 30, 2021): 39–49. http://dx.doi.org/10.18778/2084-140x.11.02.

Full text
Abstract:
The reign of the Doukas dynasty in 1059–1078 was a time when new threats to the Byzantine Empire emerge in Europe and Asia. One of them was the increased activity of Turkmen who were penetrating the lands belonging to the Byzantines. A manifestation of these threats was visible during the rule of Constantine X Doukas (1059–1067) in 1064. We have there an invasion of the tribe of Uzes, who crossed the Danube. They ventured so far, as the vicinity of Thessalonica and the province of Hellas, plundering everything in their path. Their actions surprised the defense of the Byzantines. This attack on
APA, Harvard, Vancouver, ISO, and other styles
2

Avzhi, Zhasim. "Relatıons wıth Byzantıne Empıre Durıng The Prophet’s Tıme (Pbuh)." Iasaýı ýnıversıtetіnіń habarshysy 127, no. 1 (2023): 494–506. http://dx.doi.org/10.47526/2023-1/2664-0686.38.

Full text
Abstract:
The period of Muhammad [pbuh] is the most important time period of whole 15-century Islamic history. It is because his sayings and habits had become a source of influence for later periods. As being the head of state of Islam based in Madina, his relations with the two super power states of the world at that time, Sasanids and Byzantines are substantial examples. The north side of the Arabian peninsula, at the time Muhammad [pbuh] was preaching Islam to the people of Macca, were hosting a power struggle between Sasanids and Byzantines. In this time, the polytheist heathen people of Macca were
APA, Harvard, Vancouver, ISO, and other styles
3

Hanrahan-Shirley, Jack. "Tractus Errores Graecorum: Polemics of the Latin Patriarchate of Constantinople against the Greeks." Athens Journal of History 10, no. 2 (2024): 113–32. http://dx.doi.org/10.30958/ajhis.10-2-3.

Full text
Abstract:
This paper examines the Latin text entitled Tractus Errores Graecorum: De Processione Spiritus Sancti. De Animabus Defunctorum. De Azymis Et Fermentato, De Obedientia Romanae Ecclesiae, most probably written and published in 1252 in Constantinople, attributed to the deacon Pantaleone. Attention will be specifically given to the argumentation utilized by Pantaleone to attack the theological and liturgical positions advocated for and defended by his Byzantine opponents. This paper is the first examination of the text by modern English-language scholarship. The analysis of the Tractus Errores Gra
APA, Harvard, Vancouver, ISO, and other styles
4

Veselinović, Ivana. "The role of the despotess Irene Kantakouzene in the political life of the Serbian Despotate." Zbornik radova Filozofskog fakulteta u Pristini 52, no. 2 (2022): 177–90. http://dx.doi.org/10.5937/zrffp52-36443.

Full text
Abstract:
Despotess Irene was considered the second person of the Serbian despotate in Serbian historiography. Owing to Serbian and Byzantine sources that mention her actions, this paper attempts to answer the question of her joint rule with despot Đurađ Branković in Serbian state, as an independent political factor. The first example of this is Efsigmen Charter from 1429, which the despot issued together with his wife. In addition, the miniature on Irene's charter shows her with a sceptre in her hand, a royal sign, although her and Đurađ's son had already been nominated for the heir to the throne, as i
APA, Harvard, Vancouver, ISO, and other styles
5

Howard-Johnston, James. "Rus and Khazars." Studia Ceranea 13 (December 30, 2023): 381–418. http://dx.doi.org/10.18778/2084-140x.13.45.

Full text
Abstract:
The southern thrust of the Rus in the ninth–tenth centuries is to be explained not only by Viking hunger for wealth and glory, but also by the large, rapidly growing market for furs in the Caliphate. In order to reach that market, the Rus had to cross the Khazars’ sphere of influence in the steppes and wooded steppes of the Volga and Don regions. The khaganate was a great power, which presided over many client peoples. It was perhaps awareness of the potential threat posed by the Rus which prompted the Khazars to improve their northern defences in the 830s. There is clear evidence that they th
APA, Harvard, Vancouver, ISO, and other styles
6

С., В. Фіннік. "ЕТНОГЕНЕЗ БУЛГАР І ПЕРЕСЕЛЕННЯ КОЧОВИХ ПЛЕМЕН У СХІДНУ ЄВРОПУ В V СТОЛІТТІ Н.Е." Bulgars, Onogurs, Huns, ethnogenesis, Byzantine politic., № 54 (31 жовтня 2018): 82–89. https://doi.org/10.5281/zenodo.1476243.

Full text
Abstract:
<em>The article discusses the early stage of the ethnogenesis of Bulgars in Eastern Europe. The author connects them main Hun&rsquo;s ethno-political association (Akaziri, Hilandurs, Hunugurs etc.) that emerged in Eastern Europe after the death of the leader of the Huns of Attila. Part of coming to the West is the conglomerate of tribes came from the region of the Sayan-Altai, part of the areas of North-West China (the Tarim river) and the Eastern Kazakhstan. Part of the Bulgars had a lot of former Iranian population of the steppes and even Toharian population of the oases of Xinjiang (Tarim r
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (2019): 3436. http://dx.doi.org/10.3390/s19153436.

Full text
Abstract:
Herein, the problem of target tracking in wireless sensor networks (WSNs) is investigated in the presence of Byzantine attacks. More specifically, we analyze the impact of Byzantine attacks on the performance of a tracking system. First, under the condition of jointly estimating the target state and the attack parameters, the posterior Cramer–Rao lower bound (PCRLB) is calculated. Then, from the perspective of attackers, we define the optimal Byzantine attack and theoretically find a way to achieve such an attack with minimal cost. When the attacked nodes are correctly identified by the fusion
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long, and Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median." Electronics 12, no. 5 (2023): 1190. http://dx.doi.org/10.3390/electronics12051190.

Full text
Abstract:
Federated learning techniques accomplish federated modeling and share global models without sharing data. Federated learning offers a good answer to complex data and privacy security issues. Although there are many ways to target federated learning, Byzantine attacks are the ones we concentrate on. Byzantine attacks primarily impede learning by tampering with the local model parameters provided by a client to the master node throughout the federation learning process, leading to a final global model that diverges from the optimal solution. To address this problem, we combine aggregation rules
APA, Harvard, Vancouver, ISO, and other styles
9

Nasir, Muhammad, and Ananda Maiti. "Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things." Machines 12, no. 3 (2024): 205. http://dx.doi.org/10.3390/machines12030205.

Full text
Abstract:
In this paper, an adaptive and resilient consensus control mechanism for multi-robot systems under Byzantine attack, based on sliding mode control, is proposed. The primary aim of the article is to develop a finite-time consensus control strategy even in the presence of a Byzantine attack. In the start, a finite-time consensus control mechanism is proposed to identify the essential conditions required for ensuring consensus accuracy in multi-robot systems, even when faced with Byzantine attacks using Lyapunov theory. Subsequently, a sliding mode control is combined with an adaptive technique f
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Yuchen, Chen Chen, Lingjuan Lyu, Yaochu Jin, and Gang Chen. "Exploit Gradient Skewness to Circumvent Byzantine Defenses for Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 18 (2025): 19024–32. https://doi.org/10.1609/aaai.v39i18.34094.

Full text
Abstract:
Federated Learning (FL) is notorious for its vulnerability to Byzantine attacks. Most current Byzantine defenses share a common inductive bias: among all the gradients, the densely distributed ones are more likely to be honest. However, such a bias is a poison to Byzantine robustness due to a newly discovered phenomenon in this paper -- gradient skew. We discover that a group of densely distributed honest gradients skew away from the optimal gradient (the average of honest gradients) due to heterogeneous data. This gradient skew phenomenon allows Byzantine gradients to hide within the densely
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Byzantines Attack"

1

Sironen, Erkki. "The late Roman and early Byzantine inscriptions of Athens and Attica : an edition with appendices on scripts, sepulchral formulae and occupations /." Helsinki : Hakapaino Oy, 1997. http://bibpurl.oclc.org/web/25751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.

Full text
Abstract:
The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these recent progresses have also introduced new security vulnerabilities. Since the wireless shared medium is completely exposed to outsiders, it is susceptible to attacks that could target any of the OSI layers in the network stack. For example, jamming of the physical layer, disruption of the medium access control (MAC) layer coordination packets, attacks against the routing infrastructure, targeted attacks o
APA, Harvard, Vancouver, ISO, and other styles
3

KALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.

Full text
Abstract:
Every day we share our personal information through digital systems which are constantly exposed to threats. For this reason, security-oriented disciplines of signal processing have received increasing attention in the last decades: multimedia forensics, digital watermarking, biometrics, network monitoring, steganography and steganalysis are just a few examples. Even though each of these fields has its own peculiarities, they all have to deal with a common problem: the presence of one or more adversaries aiming at making the system fail. Adversarial Signal Processing lays the basis of a genera
APA, Harvard, Vancouver, ISO, and other styles
4

Tzavella, Elissavet. "Urban and rural landscape in early and middle Byzantine Attica (4th-12th c. AD)." Thesis, University of Birmingham, 2013. http://etheses.bham.ac.uk//id/eprint/4321/.

Full text
Abstract:
The present study synthesiszes archaeological and historical evidence concerning Attica (Greece), the hinterland of Athens, in the Early and Middle Byzantine periods (4th-12th c.). Although the Byzantine monuments of Attica have been thoroughly studied, no coherent picture of how these relate to broader patterns of occupation and land usage has thus far been presented. In the main, the period under discussion is generally interpreted in three ways: Regarding Late Antiquity, research has often focused on the transition from paganism to Christianity, and to the characterisation of Attica as a ‘s
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Qianlong. "Blockchain-Empowered Secure Machine Learning and Applications." Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1625183576139299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Han, Kai. "Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy Systems." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/26917.

Full text
Abstract:
In this dissertation, we consider scheduling distributed soft real-time tasks in unreliable (e.g., those with arbitrary node and network failures) and untrustworthy systems (e.g., those with Byzantine node behaviors). We present a distributed real-time scheduling algorithm called Gamma. Gamma considers a distributed (i.e., multi-node) task model where tasks are subject to Time/Utility Function (or TUF) end-to-end time constraints, and the scheduling optimality criterion of maximizing the total accrued utility. The algorithm makes three novel contributions. First, Gamma uses gossip for reliably
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Ho-Chun, and 陳和均. "The Study of Byzantine Attack in Large Scale Wireless Sensor Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/n2y87u.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電信工程學研究所<br>106<br>In this thesis, we study the problem of Byzantine attacks in large scale wireless sensor networks (WSNs). WSN is a critical technology in the future Internet of Things era, supporting various applications such as smart home, environmental monitoring, Internet of vehicles, etc. A WSN generally consists of some sensors and a fusion center (FC). Each sensor makes an observation about a phenomenon of interest, and transmits local message to the FC, who then makes a final decision based on those messages. Due to the exposed nature of the sensors and the characteri
APA, Harvard, Vancouver, ISO, and other styles
8

(9154928), Aritra Mitra. "New Approaches to Distributed State Estimation, Inference and Learning with Extensions to Byzantine-Resilience." Thesis, 2020.

Find full text
Abstract:
<div>In this thesis, we focus on the problem of estimating an unknown quantity of interest, when the information required to do so is dispersed over a network of agents. In particular, each agent in the network receives sequential observations generated by the unknown quantity, and the collective goal of the network is to eventually learn this quantity by means of appropriately crafted information diffusion rules. The abstraction described above can be used to model a variety of problems ranging from environmental monitoring of a dynamical process using autonomous robot teams, to statistical
APA, Harvard, Vancouver, ISO, and other styles
9

Tseng, Yi-Ying, and 曾奕穎. "Countering Byzantine Attacks in a Network with Random Linear Network Coding." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/88fyjp.

Full text
Abstract:
碩士<br>國立東華大學<br>電機工程學系<br>100<br>Network coding is an elegant technique where, instead of simply relaying the packets of information they receive, the nodes of a network are allowed to combine \emph{several} packets together for transmission and this technique can be used to achieve the maximum possible information flow in a network. Recent implementations of network coding for wired and wireless environments have demonstrated its practical benefits, especially in multicast communication. Because communication in wireless environment is essentially multicast, network coding has highly attracte
APA, Harvard, Vancouver, ISO, and other styles
10

Cheng, Sheng-Hong, and 鄭勝鴻. "Defense and Detection of Sybil Attack Using Byzantine Agreement Algorithm in Mobile Ad Hoc Network." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/24pgmr.

Full text
Abstract:
碩士<br>淡江大學<br>資訊工程學系碩士班<br>106<br>The topology of mobile ad hoc networks (MANET) is dynamic, can be quickly configured, and lacks features such as wireless APs and adapters. Due to these benefits, a MANET system is able to be applied to specific situations, such as search and rescue operations, military use or emergency operations. Based on the routing protocol, node connections provide information to each other and can jointly establish a complete transmission path independently. But security is a major issue in MANET systems. Because MANET system are open and perform on a non-centralized inf
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Byzantines Attack"

1

Los dorismos del Corpus Bucolicorum. A.M. Hakkert, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Byzantines Attack"

1

Hancock, James F. "Spice trade in the dark ages of Europe." In Spices, scents and silk: catalysts of world trade. CABI, 2021. http://dx.doi.org/10.1079/9781789249743.0012.

Full text
Abstract:
Abstract This chapter narrates the state of world trade during the fall of the Western Roman Empire under waves of Germanic tribe movements during the 'Völkerwanderung' or Migration Period. It contains nine subchapters that are about the collapse of the Western Roman Empire, spice use in Europe during the dark ages, the level of western trade in the early medieval age, Mediterranean trade in the early medieval period, early medieval trade in Europe, the Radhanites: medieval tycoons, the rise of the Gotlanders, Rus' trade with the Muslims and Byzantines through Khazaria, and lastly, Rus' attack
APA, Harvard, Vancouver, ISO, and other styles
2

Fiat, Amos, Jared Saia, and Maxwell Young. "Making Chord Robust to Byzantine Attacks." In Algorithms – ESA 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11561071_71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pooja, A. Saraswathi, Rampa Theresa, Satya Govind, and Anuja Aloy Mary. "Detection of Byzantine Attack in Cognitive Radio Network." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5029-4_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

He, Xiaofan, and Huaiyu Dai. "Case Study II: HMM-Based Byzantine Attack Detection." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

He, Xiaofan, and Huaiyu Dai. "Case Study III: CFC-Based Byzantine Attack Detection." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Linyuan, Guoru Ding, and Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Linyuan, Guoru Ding, and Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion." In Encyclopedia of Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_301-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hu, Chenyu, Yuhan Liu, Mingyue Zhang, and Zheng Yang. "Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning." In Communications in Computer and Information Science. Springer Nature Singapore, 2024. https://doi.org/10.1007/978-981-96-0151-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yan, Yukun, Qingqing Ye, Haibo Hu, Rui Chen, Qilong Han, and Leixia Wang. "Towards Defending Against Byzantine LDP Amplified Gain Attacks." In Database Systems for Advanced Applications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30637-2_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abrardo, Andrea, Mauro Barni, Kassem Kallas, and Benedetta Tondi. "Security Attacks and Defenses in Distributed Sensor Networks." In Information Fusion in Distributed Sensor Networks with Byzantines. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-32-9001-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Byzantines Attack"

1

Yuan, Liwei, Hideaki Ishii, and Yaonan Wang. "Robust Average Consensus under Byzantine Attacks." In 2024 IEEE 63rd Conference on Decision and Control (CDC). IEEE, 2024. https://doi.org/10.1109/cdc56724.2024.10886555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pavloff, Ulysse, Yackolley Amoussou-Guenou, and Sara Tucci-Piergiovanni. "Byzantine Attacks Exploiting Penalties in Ethereum PoS." In 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2024. http://dx.doi.org/10.1109/dsn58291.2024.00020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jiang, Jie, Mingde Huang, and Yiming Wu. "Resilient Consensus for Heterogeneous Networks Under Byzantine Attacks." In 2024 18th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 2024. https://doi.org/10.1109/icarcv63323.2024.10821673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alyahya, Aren, David Tipper, and Amy Babay. "Availability Analysis of Network-Attack-Resilient Byzantine Fault Tolerant Systems." In 2024 43rd International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2024. https://doi.org/10.1109/srds64841.2024.00014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shen, Gang, Zhiqiang Fu, and Shaohua Liu. "EFLSS: An Efficient Federated Learning Security Scheme in Byzantine Attack Scenarios." In 2024 IEEE Smart World Congress (SWC). IEEE, 2024. https://doi.org/10.1109/swc62898.2024.00148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dewi, Ayu Oktaviani, Dyonisius Dony Ariananda, and Sigit Basuki Wibowo. "Byzantine Attack Identification using Graph Signal Processing in Cooperative Spectrum Sensing." In 2024 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT). IEEE, 2024. https://doi.org/10.1109/comnetsat63286.2024.10862364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jin, Chen, Xi Chen, Junyu Pu, and Boyu Fan. "Research on distributed machine learning defence strategies under Byzantine attacks." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zheng, Huigan, Runhua Wang, Xiao Wang, and Qing Ling. "Can Fairness and Robustness Be Simultaneously Achieved Under Byzantine Attacks?" In ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2025. https://doi.org/10.1109/icassp49660.2025.10890227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nakano, Koki, Jun Kurihara, and Toshiaki Tanaka. "Private Information Delivery from Coded Storage against Byzantine and Eavesdropping Attacks." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vo, Viet, Mengyao Ma, Guangdong Bai, Ryan Ko, and Surya Neplal. "Practical Poisoning Attacks with Limited Byzantine Clients in Clustered Federated Learning." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!