Academic literature on the topic 'Byzantines Attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Byzantines Attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Byzantines Attack"
Böhm, Marcin. "Constantine X Doukas (1059–1067) versus Uzes – about the Nomads on Boats on the Danube in 1064." Studia Ceranea 11 (December 30, 2021): 39–49. http://dx.doi.org/10.18778/2084-140x.11.02.
Full textAvzhi, Zhasim. "Relatıons wıth Byzantıne Empıre Durıng The Prophet’s Tıme (Pbuh)." Iasaýı ýnıversıtetіnіń habarshysy 127, no. 1 (2023): 494–506. http://dx.doi.org/10.47526/2023-1/2664-0686.38.
Full textHanrahan-Shirley, Jack. "Tractus Errores Graecorum: Polemics of the Latin Patriarchate of Constantinople against the Greeks." Athens Journal of History 10, no. 2 (2024): 113–32. http://dx.doi.org/10.30958/ajhis.10-2-3.
Full textVeselinović, Ivana. "The role of the despotess Irene Kantakouzene in the political life of the Serbian Despotate." Zbornik radova Filozofskog fakulteta u Pristini 52, no. 2 (2022): 177–90. http://dx.doi.org/10.5937/zrffp52-36443.
Full textHoward-Johnston, James. "Rus and Khazars." Studia Ceranea 13 (December 30, 2023): 381–418. http://dx.doi.org/10.18778/2084-140x.13.45.
Full textС., В. Фіннік. "ЕТНОГЕНЕЗ БУЛГАР І ПЕРЕСЕЛЕННЯ КОЧОВИХ ПЛЕМЕН У СХІДНУ ЄВРОПУ В V СТОЛІТТІ Н.Е." Bulgars, Onogurs, Huns, ethnogenesis, Byzantine politic., № 54 (31 жовтня 2018): 82–89. https://doi.org/10.5281/zenodo.1476243.
Full textYang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (2019): 3436. http://dx.doi.org/10.3390/s19153436.
Full textWang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long, and Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median." Electronics 12, no. 5 (2023): 1190. http://dx.doi.org/10.3390/electronics12051190.
Full textNasir, Muhammad, and Ananda Maiti. "Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things." Machines 12, no. 3 (2024): 205. http://dx.doi.org/10.3390/machines12030205.
Full textLiu, Yuchen, Chen Chen, Lingjuan Lyu, Yaochu Jin, and Gang Chen. "Exploit Gradient Skewness to Circumvent Byzantine Defenses for Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 18 (2025): 19024–32. https://doi.org/10.1609/aaai.v39i18.34094.
Full textDissertations / Theses on the topic "Byzantines Attack"
Sironen, Erkki. "The late Roman and early Byzantine inscriptions of Athens and Attica : an edition with appendices on scripts, sepulchral formulae and occupations /." Helsinki : Hakapaino Oy, 1997. http://bibpurl.oclc.org/web/25751.
Full textAlam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.
Full textKALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.
Full textTzavella, Elissavet. "Urban and rural landscape in early and middle Byzantine Attica (4th-12th c. AD)." Thesis, University of Birmingham, 2013. http://etheses.bham.ac.uk//id/eprint/4321/.
Full textWang, Qianlong. "Blockchain-Empowered Secure Machine Learning and Applications." Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1625183576139299.
Full textHan, Kai. "Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy Systems." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/26917.
Full textChen, Ho-Chun, and 陳和均. "The Study of Byzantine Attack in Large Scale Wireless Sensor Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/n2y87u.
Full text(9154928), Aritra Mitra. "New Approaches to Distributed State Estimation, Inference and Learning with Extensions to Byzantine-Resilience." Thesis, 2020.
Find full textTseng, Yi-Ying, and 曾奕穎. "Countering Byzantine Attacks in a Network with Random Linear Network Coding." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/88fyjp.
Full textCheng, Sheng-Hong, and 鄭勝鴻. "Defense and Detection of Sybil Attack Using Byzantine Agreement Algorithm in Mobile Ad Hoc Network." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/24pgmr.
Full textBooks on the topic "Byzantines Attack"
Book chapters on the topic "Byzantines Attack"
Hancock, James F. "Spice trade in the dark ages of Europe." In Spices, scents and silk: catalysts of world trade. CABI, 2021. http://dx.doi.org/10.1079/9781789249743.0012.
Full textFiat, Amos, Jared Saia, and Maxwell Young. "Making Chord Robust to Byzantine Attacks." In Algorithms – ESA 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11561071_71.
Full textPooja, A. Saraswathi, Rampa Theresa, Satya Govind, and Anuja Aloy Mary. "Detection of Byzantine Attack in Cognitive Radio Network." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5029-4_37.
Full textHe, Xiaofan, and Huaiyu Dai. "Case Study II: HMM-Based Byzantine Attack Detection." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_5.
Full textHe, Xiaofan, and Huaiyu Dai. "Case Study III: CFC-Based Byzantine Attack Detection." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_6.
Full textZhang, Linyuan, Guoru Ding, and Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_301.
Full textZhang, Linyuan, Guoru Ding, and Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion." In Encyclopedia of Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_301-1.
Full textHu, Chenyu, Yuhan Liu, Mingyue Zhang, and Zheng Yang. "Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning." In Communications in Computer and Information Science. Springer Nature Singapore, 2024. https://doi.org/10.1007/978-981-96-0151-6_7.
Full textYan, Yukun, Qingqing Ye, Haibo Hu, Rui Chen, Qilong Han, and Leixia Wang. "Towards Defending Against Byzantine LDP Amplified Gain Attacks." In Database Systems for Advanced Applications. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30637-2_42.
Full textAbrardo, Andrea, Mauro Barni, Kassem Kallas, and Benedetta Tondi. "Security Attacks and Defenses in Distributed Sensor Networks." In Information Fusion in Distributed Sensor Networks with Byzantines. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-32-9001-3_3.
Full textConference papers on the topic "Byzantines Attack"
Yuan, Liwei, Hideaki Ishii, and Yaonan Wang. "Robust Average Consensus under Byzantine Attacks." In 2024 IEEE 63rd Conference on Decision and Control (CDC). IEEE, 2024. https://doi.org/10.1109/cdc56724.2024.10886555.
Full textPavloff, Ulysse, Yackolley Amoussou-Guenou, and Sara Tucci-Piergiovanni. "Byzantine Attacks Exploiting Penalties in Ethereum PoS." In 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2024. http://dx.doi.org/10.1109/dsn58291.2024.00020.
Full textJiang, Jie, Mingde Huang, and Yiming Wu. "Resilient Consensus for Heterogeneous Networks Under Byzantine Attacks." In 2024 18th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE, 2024. https://doi.org/10.1109/icarcv63323.2024.10821673.
Full textAlyahya, Aren, David Tipper, and Amy Babay. "Availability Analysis of Network-Attack-Resilient Byzantine Fault Tolerant Systems." In 2024 43rd International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2024. https://doi.org/10.1109/srds64841.2024.00014.
Full textShen, Gang, Zhiqiang Fu, and Shaohua Liu. "EFLSS: An Efficient Federated Learning Security Scheme in Byzantine Attack Scenarios." In 2024 IEEE Smart World Congress (SWC). IEEE, 2024. https://doi.org/10.1109/swc62898.2024.00148.
Full textDewi, Ayu Oktaviani, Dyonisius Dony Ariananda, and Sigit Basuki Wibowo. "Byzantine Attack Identification using Graph Signal Processing in Cooperative Spectrum Sensing." In 2024 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT). IEEE, 2024. https://doi.org/10.1109/comnetsat63286.2024.10862364.
Full textJin, Chen, Xi Chen, Junyu Pu, and Boyu Fan. "Research on distributed machine learning defence strategies under Byzantine attacks." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00378.
Full textZheng, Huigan, Runhua Wang, Xiao Wang, and Qing Ling. "Can Fairness and Robustness Be Simultaneously Achieved Under Byzantine Attacks?" In ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2025. https://doi.org/10.1109/icassp49660.2025.10890227.
Full textNakano, Koki, Jun Kurihara, and Toshiaki Tanaka. "Private Information Delivery from Coded Storage against Byzantine and Eavesdropping Attacks." In 2024 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2024. https://doi.org/10.23919/isita60732.2024.10858208.
Full textVo, Viet, Mengyao Ma, Guangdong Bai, Ryan Ko, and Surya Neplal. "Practical Poisoning Attacks with Limited Byzantine Clients in Clustered Federated Learning." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00163.
Full text