Journal articles on the topic 'Byzantines Attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Byzantines Attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Böhm, Marcin. "Constantine X Doukas (1059–1067) versus Uzes – about the Nomads on Boats on the Danube in 1064." Studia Ceranea 11 (December 30, 2021): 39–49. http://dx.doi.org/10.18778/2084-140x.11.02.
Full textAvzhi, Zhasim. "Relatıons wıth Byzantıne Empıre Durıng The Prophet’s Tıme (Pbuh)." Iasaýı ýnıversıtetіnіń habarshysy 127, no. 1 (2023): 494–506. http://dx.doi.org/10.47526/2023-1/2664-0686.38.
Full textHanrahan-Shirley, Jack. "Tractus Errores Graecorum: Polemics of the Latin Patriarchate of Constantinople against the Greeks." Athens Journal of History 10, no. 2 (2024): 113–32. http://dx.doi.org/10.30958/ajhis.10-2-3.
Full textVeselinović, Ivana. "The role of the despotess Irene Kantakouzene in the political life of the Serbian Despotate." Zbornik radova Filozofskog fakulteta u Pristini 52, no. 2 (2022): 177–90. http://dx.doi.org/10.5937/zrffp52-36443.
Full textHoward-Johnston, James. "Rus and Khazars." Studia Ceranea 13 (December 30, 2023): 381–418. http://dx.doi.org/10.18778/2084-140x.13.45.
Full textС., В. Фіннік. "ЕТНОГЕНЕЗ БУЛГАР І ПЕРЕСЕЛЕННЯ КОЧОВИХ ПЛЕМЕН У СХІДНУ ЄВРОПУ В V СТОЛІТТІ Н.Е." Bulgars, Onogurs, Huns, ethnogenesis, Byzantine politic., № 54 (31 жовтня 2018): 82–89. https://doi.org/10.5281/zenodo.1476243.
Full textYang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (2019): 3436. http://dx.doi.org/10.3390/s19153436.
Full textWang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long, and Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median." Electronics 12, no. 5 (2023): 1190. http://dx.doi.org/10.3390/electronics12051190.
Full textNasir, Muhammad, and Ananda Maiti. "Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things." Machines 12, no. 3 (2024): 205. http://dx.doi.org/10.3390/machines12030205.
Full textLiu, Yuchen, Chen Chen, Lingjuan Lyu, Yaochu Jin, and Gang Chen. "Exploit Gradient Skewness to Circumvent Byzantine Defenses for Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 18 (2025): 19024–32. https://doi.org/10.1609/aaai.v39i18.34094.
Full textCzyż, Maciej. "Byzantine Reconquista (10th–11th Centuries) and the Attacks on Christians in the Lands of Islam (Egypt, Syria and Iraq)." Studia Ceranea 14 (December 30, 2024): 369–87. https://doi.org/10.18778/2084-140x.14.23.
Full textMedhi, Jishu K., Rui Liu, Qianlong Wang, and Xuhui Chen. "Robust Multiagent Reinforcement Learning for UAV Systems: Countering Byzantine Attacks." Information 14, no. 11 (2023): 623. http://dx.doi.org/10.3390/info14110623.
Full textSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Full textWang, Jingyao, Xingming Deng, Jinghua Guo, and Zeqin Zeng. "Resilient Consensus Control for Multi-Agent Systems: A Comparative Survey." Sensors 23, no. 6 (2023): 2904. http://dx.doi.org/10.3390/s23062904.
Full textZhang, Zhongjian, Mengmei Zhang, Xiao Wang, et al. "Rethinking Byzantine Robustness in Federated Recommendation from Sparse Aggregation Perspective." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 12 (2025): 13331–38. https://doi.org/10.1609/aaai.v39i12.33455.
Full textWang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–41. https://doi.org/10.1145/3700422.
Full textWang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." ACM SIGMETRICS Performance Evaluation Review 53, no. 1 (2025): 25–27. https://doi.org/10.1145/3744970.3727296.
Full textAmir, Y., B. Coan, J. Kirsch, and J. Lane. "Prime: Byzantine Replication under Attack." IEEE Transactions on Dependable and Secure Computing 8, no. 4 (2011): 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.
Full textWang, Huijian, Xiao Liu, and Jining Chen. "RVR Blockchain Consensus: A Verifiable, Weighted-Random, Byzantine-Tolerant Framework for Smart Grid Energy Trading." Computers 14, no. 6 (2025): 232. https://doi.org/10.3390/computers14060232.
Full textABORISADE, D. O., A. S. SODIYA, A. A. ODUMOSU, O. Y. ALOWOSILE, and A. A. ADEDEJI. "A SURVIVABLE DISTRIBUTED DATABASE AGAINST BYZANTINE FAILURE." Journal of Natural Sciences Engineering and Technology 15, no. 2 (2017): 61–72. http://dx.doi.org/10.51406/jnset.v15i2.1684.
Full textMakani, Ruchi, and Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.
Full textWan, Fangyi, Ting Ma, Yi Hua, Bin Liao, and Xinlin Qing. "Secure distributed estimation under Byzantine attack and manipulation attack." Engineering Applications of Artificial Intelligence 116 (November 2022): 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.
Full textPlatt, Moritz, and Peter McBurney. "Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance." Algorithms 16, no. 1 (2023): 34. http://dx.doi.org/10.3390/a16010034.
Full textKaya, Tülin. "Understanding the Use of Byzantine Routes in Central Anatolia (ca. 7TH–9TH Centuries)." Studia Ceranea 9 (December 30, 2019): 259–78. http://dx.doi.org/10.18778/2084-140x.09.14.
Full textMuhamet Qerimi. "Durres During The First Norman Attack 1081-1085." Journal of Namibian Studies : History Politics Culture 36 (October 3, 2023): 721–35. http://dx.doi.org/10.59670/jns.v36i.4997.
Full textWu, Jun, Tianle Liu, and Rui Zhao. "Beta Distribution Function for Cooperative Spectrum Sensing against Byzantine Attack in Cognitive Wireless Sensor Networks." Electronics 13, no. 17 (2024): 3386. http://dx.doi.org/10.3390/electronics13173386.
Full textCheng, Chien-Fu, Jerry Chun-Wei Lin, Gautam Srivastava, and Chu-Chiao Hsu. "Reaching Consensus with Byzantine Faulty Controllers in Software-Defined Networks." Wireless Communications and Mobile Computing 2021 (April 12, 2021): 1–9. http://dx.doi.org/10.1155/2021/6662175.
Full textFilatov, Alexey. "The power of the arab caliphs in the byzantine literature of the 9th and 10th centuries." Metamorphoses of history, no. 26 (2022): 0. http://dx.doi.org/10.37490/s230861810023611-2.
Full textWhealey, Alice. "Muslim Motives for Conquering the Byzantine Empire 634–720: The Evidence from Eastern Christian Sources." Russian History 40, no. 1 (2013): 9–26. http://dx.doi.org/10.1163/18763316-04001002.
Full textPashkin, Nikolai G. "Aims of the Byzantine Attack on Gallipoli in 1410." Античная древность и средние века 48 (2020): 156–71. http://dx.doi.org/10.15826/adsv.2020.48.010.
Full textLi, Liping, Wei Xu, Tianyi Chen, Georgios B. Giannakis, and Qing Ling. "RSA: Byzantine-Robust Stochastic Aggregation Methods for Distributed Learning from Heterogeneous Datasets." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1544–51. http://dx.doi.org/10.1609/aaai.v33i01.33011544.
Full textKim, Woocheol, and Hyuk Lim. "FedCC: Federated Learning with Consensus Confirmation for Byzantine Attack Resistance (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 11 (2022): 12981–82. http://dx.doi.org/10.1609/aaai.v36i11.21627.
Full textZhai, Kun, Qiang Ren, Junli Wang, and Chungang Yan. "Byzantine-robust federated learning via credibility assessment on non-IID data." Mathematical Biosciences and Engineering 19, no. 2 (2021): 1659–76. http://dx.doi.org/10.3934/mbe.2022078.
Full textYao, Wenbin, Bangli Pan, Yingying Hou, Xiaoyong Li, and Yamei Xia. "An Adaptive Model Filtering Algorithm Based on Grubbs Test in Federated Learning." Entropy 25, no. 5 (2023): 715. http://dx.doi.org/10.3390/e25050715.
Full textGuru, Abhishek, Bhabendu Kumar Mohanta, Hitesh Mohapatra, Fadi Al-Turjman, Chadi Altrjman, and Arvind Yadav. "A Survey on Consensus Protocols and Attacks on Blockchain Technology." Applied Sciences 13, no. 4 (2023): 2604. http://dx.doi.org/10.3390/app13042604.
Full textGupta, Chitvan, Laxman Singh, and Rajdev Tiwari. "Wormhole attack detection techniques in ad-hoc network: A systematic review." Open Computer Science 12, no. 1 (2022): 260–88. http://dx.doi.org/10.1515/comp-2022-0245.
Full textCao, Ruohan, Tan F. Wong, Tiejun Lv, Hui Gao, and Shaoshi Yang. "Detecting Byzantine Attacks Without Clean Reference." IEEE Transactions on Information Forensics and Security 11, no. 12 (2016): 2717–31. http://dx.doi.org/10.1109/tifs.2016.2596140.
Full textPrabhakar, Anjana, and Tricha Anjali. "Gray Hole Attack as a Byzantine Attack in a Wireless Multi-Hop Network." Journal of Applied Security Research 15, no. 1 (2019): 116–45. http://dx.doi.org/10.1080/19361610.2019.1669988.
Full textAgrawal, Neha, Krishna Kumar, and Neelam Joshi. "Implemented and Evaluated the Byzantine Attack with the Aid of Rushing Attack in Manet." International Journal of Computer Applications 130, no. 6 (2015): 6–11. http://dx.doi.org/10.5120/ijca2015906621.
Full textB.Dhakde, Apeksha, and Sonali U. Nimbhorkar Sonali.U.Nimbhorkar. "Distributed Detection Methods for Byzantine Attack in Tree Topology." International Journal of Computer Applications 90, no. 18 (2014): 1–4. http://dx.doi.org/10.5120/15817-4238.
Full textAgrawal, Neha, Krishna Kumar, and Neelam Joshi. "Performance Evaluation of Byzantine Rushing Attack in ADHOC Network." International Journal of Computer Applications 123, no. 6 (2015): 1–4. http://dx.doi.org/10.5120/ijca2015905339.
Full textWu, Jun, Pei Li, Yang Chen, et al. "Analysis of Byzantine Attack Strategy for Cooperative Spectrum Sensing." IEEE Communications Letters 24, no. 8 (2020): 1631–35. http://dx.doi.org/10.1109/lcomm.2020.2990869.
Full textMenelaou, Iakovos. "Byzantine Satire: The Background in the Timarion." Hiperboreea 4, no. 2 (2017): 53–66. http://dx.doi.org/10.5325/hiperboreea.4.2.0053.
Full textNazário Coelho, Vitor, Rodolfo Pereira Araújo, Haroldo Gambini Santos, Wang Yong Qiang, and Igor Machado Coelho. "A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus." Future Internet 12, no. 11 (2020): 185. http://dx.doi.org/10.3390/fi12110185.
Full textHarris, Simon. "The Byzantine prokeimena." Plainsong and Medieval Music 3, no. 2 (1994): 133–47. http://dx.doi.org/10.1017/s096113710000070x.
Full textZhou, Antong, Ning Jiang, and Tong Tang. "Asynchronous Robust Aggregation Method with Privacy Protection for IoV Federated Learning." World Electric Vehicle Journal 15, no. 1 (2024): 18. http://dx.doi.org/10.3390/wevj15010018.
Full textKrishnamohan, Theviyanthan. "IMPROVING BYZANTINE FAULT TOLERANCE IN SWARM ROBOTICS COLLECTIVE DECISION-MAKING SCENARIO VIA A NEW BLOCKCHAIN CONSENSUS ALGORITHM." ICTACT Journal on Soft Computing 13, no. 4 (2023): 3027–33. http://dx.doi.org/10.21917/ijsc.2023.0426.
Full textWu, Jun, Yue Yu, Hancheng Zhu, Tiecheng Song, and Jing Hu. "Cost-Benefit Tradeoff of Byzantine Attack in Cooperative Spectrum Sensing." IEEE Systems Journal 14, no. 2 (2020): 2532–43. http://dx.doi.org/10.1109/jsyst.2019.2952395.
Full textSarmah, Rupam, Amar Taggu, and Ningrinla Marchang. "Detecting Byzantine attack in cognitive radio networks using machine learning." Wireless Networks 26, no. 8 (2020): 5939–50. http://dx.doi.org/10.1007/s11276-020-02398-w.
Full textZhang, Linyuan, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, and Jinlong Wang. "Byzantine Attack and Defense in Cognitive Radio Networks: A Survey." IEEE Communications Surveys & Tutorials 17, no. 3 (2015): 1342–63. http://dx.doi.org/10.1109/comst.2015.2422735.
Full text