Journal articles on the topic 'Defense/attack strategies'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Defense/attack strategies.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mr., Ajas K. S1, Fares Rahman Mr., Joel Deleep Mr., Joemon Johnson 4. Mr., and Shejina N. M. K. A5 Ms. "PENETRATION TESTING AND DEFENSE STRATEGIES." International Journal of Advances in Engineering & Scientific Research 3, no. 6 (2016): 11–19. https://doi.org/10.5281/zenodo.10774423.
Full textLiu, Jing, Yuchen Zhang, Hao Hu, Jinglei Tan, Qiang Leng, and Chaowen Chang. "Efficient Defense Decision-Making Approach for Multistep Attacks Based on the Attack Graph and Game Theory." Mathematical Problems in Engineering 2020 (August 11, 2020): 1–12. http://dx.doi.org/10.1155/2020/9302619.
Full textGong, Xiaopeng, Wanchun Chen, and Zhongyuan Chen. "Intelligent Game Strategies in Target-Missile-Defender Engagement Using Curriculum-Based Deep Reinforcement Learning." Aerospace 10, no. 2 (2023): 133. http://dx.doi.org/10.3390/aerospace10020133.
Full textHu, Yongjin, Han Zhang, Yuanbo Guo, Tao Li, and Jun Ma. "A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice." Wireless Communications and Mobile Computing 2020 (October 12, 2020): 1–10. http://dx.doi.org/10.1155/2020/8850356.
Full textChen, Jun, Xin Sun, Wen Tian, and Guangjie Liu. "A Bayesian game approach for node-based attribution defense against asymmetric information attacks in IoT networks." PLOS ONE 20, no. 3 (2025): e0316091. https://doi.org/10.1371/journal.pone.0316091.
Full textTan, Hao, Le Wang, Huan Zhang, Junjian Zhang, Muhammad Shafiq, and Zhaoquan Gu. "Adversarial Attack and Defense Strategies of Speaker Recognition Systems: A Survey." Electronics 11, no. 14 (2022): 2183. http://dx.doi.org/10.3390/electronics11142183.
Full textUrbina Escobar, Tomás. "Self-Defense Strategies Against Cyber- Attacks by Non-State Actors." Revista de Relaciones Internacionales, Estrategia y Seguridad 18, no. 2 (2023): 61–72. http://dx.doi.org/10.18359/ries.6639.
Full textGonzález-Landero, Franks, Iván García-Magariño, Raquel Lacuesta, and Jaime Lloret. "ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices." Wireless Communications and Mobile Computing 2018 (June 24, 2018): 1–11. http://dx.doi.org/10.1155/2018/7264269.
Full textZhu, Yuwen, Lei Yu, Houhua He, and Yitong Meng. "A Defense Strategy Selection Method Based on the Cyberspace Wargame Model." Security and Communication Networks 2021 (October 27, 2021): 1–12. http://dx.doi.org/10.1155/2021/4292670.
Full textBi, Chuanxiang, Shang Shi, and Jian Qu. "Enhancing Autonomous Driving: A Novel Approach of Mixed Attack and Physical Defense Strategies." ASEAN Journal of Scientific and Technological Reports 28, no. 1 (2024): e254093. https://doi.org/10.55164/ajstr.v28i1.254093.
Full textAbomakhelb, Abdulruhman, Kamarularifin Abd Jalil, Alya Geogiana Buja, Abdulraqeb Alhammadi, and Abdulmajeed M. Alenezi. "A Comprehensive Review of Adversarial Attacks and Defense Strategies in Deep Neural Networks." Technologies 13, no. 5 (2025): 202. https://doi.org/10.3390/technologies13050202.
Full textYang, Jidong, Qiangyun Chi, Wenqiang Xu, and Huaike Yu. "Research on adversarial attack and defense of large language models." Applied and Computational Engineering 93, no. 1 (2024): 105–13. http://dx.doi.org/10.54254/2755-2721/93/20240922.
Full textAllheeib, Nasser. "Securing Machine Learning Against Data Poisoning Attacks." International Journal of Data Warehousing and Mining 20, no. 1 (2024): 1–21. http://dx.doi.org/10.4018/ijdwm.358335.
Full textAhn, Jongmin, Hee-Yong Kwon, Bohyun Ahn, et al. "Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)." Energies 15, no. 3 (2022): 714. http://dx.doi.org/10.3390/en15030714.
Full textWenyuan Xu, Ke Ma, W. Trappe, and Yanyong Zhang. "Jamming sensor networks: attack and defense strategies." IEEE Network 20, no. 3 (2006): 41–47. http://dx.doi.org/10.1109/mnet.2006.1637931.
Full textLATES, Ionut, and Catalin BOJA. "Automating Attack and Defense Strategies in Cybersecurity." Informatica Economica 29, no. 1/2025 (2025): 5–15. https://doi.org/10.24818/issn14531305/29.1.2025.01.
Full textKim, Jay. "Strategic Defense in Machine Learning: Assessing the Most Optimal Defense Approach to Mitigate Adversarial Cyber Attacks." Journal of Robotics and Automation Research 6, no. 2 (2025): 01–04. https://doi.org/10.33140/jrar.06.02.02.
Full textZhang, Chunming. "Impact of Defending Strategy Decision on DDoS Attack." Complexity 2021 (March 15, 2021): 1–11. http://dx.doi.org/10.1155/2021/6694383.
Full textLiu, Yingze, and Yuanbo Guo. "Towards Real-Time Warning and Defense Strategy AI Planning for Cyber Security Systems Aided by Security Ontology." Electronics 11, no. 24 (2022): 4128. http://dx.doi.org/10.3390/electronics11244128.
Full textMishra, Chinmayee, Pullam Bhatla Laxmi Sindhu, Pruthwiraj Mohanty, and Ayush Kumar Samrat. "DDOS Attacks and Analysis of Different Defense Mechanisms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem40061.
Full textWang, Wenhao, Xingguo Chen, Yuwei Li, and Cheng Zhu. "Catch the Cyber Thief: A Multi-Dimensional Asymmetric Network Attack–Defense Game." Applied Sciences 14, no. 20 (2024): 9234. http://dx.doi.org/10.3390/app14209234.
Full textJin, Bao, Xiaodong Zhao, and Dongmei Yuan. "Attack–Defense Confrontation Analysis and Optimal Defense Strategy Selection Using Hybrid Game Theoretic Methods." Symmetry 16, no. 2 (2024): 156. http://dx.doi.org/10.3390/sym16020156.
Full textNIKLEKAJ, Malvina, and Elfat MEMAJ. "Analyzing and Mitigating Distributed Denial-of-Service (DDoS) Attacks - A Python-Based Simulation Approach." INGENIOUS 5, no. 1 (2025): 20–36. https://doi.org/10.58944/adif5937.
Full textZhang, Yuchen, and Jing Liu. "Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning." Security and Communication Networks 2019 (December 23, 2019): 1–16. http://dx.doi.org/10.1155/2019/3038586.
Full textSmith, Oliver, and Anderson Brown. "Comprehensive Review on Advanced Adversarial Attack and Defense Strategies in Deep Neural Network." International Journal of Research and Innovation in Applied Science VIII, no. IV (2023): 156–66. http://dx.doi.org/10.51584/ijrias.2023.8418.
Full textVichi, Leonardo Perin. "CYBERDETERRENCE AS POLICY FOR DEMOCRACY DEFENSE." IA Policy Brief Series 1, no. 1 (2022): 1–3. https://doi.org/10.5281/zenodo.5829466.
Full textBaryshnikov, N. V. "STRATEGIES OF EQUAL STATUS INTERCULTURAL COMMUNICATION." MGIMO Review of International Relations, no. 6(33) (December 28, 2013): 90–94. http://dx.doi.org/10.24833/2071-8160-2013-6-33-90-94.
Full textKe, Hu, Jian Xu, Yong Wang, Heyao Chen, and Zepeng Shen. "Adversarial Machine Learning in Cybersecurity: Attacks and Defenses." International Journal of Management Science Research 8, no. 2 (2025): 26–33. https://doi.org/10.53469/ijomsr.2025.08(02).04.
Full textLin, Frank Yeong-Sung, Yu-Shun Wang, and Ming-Yang Huang. "Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet." Journal of Applied Mathematics 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/518213.
Full textButts, Jonathan, Mason Rice, and Sujeet Shenoi. "An Adversarial Model for Expressing Attacks on Control Protocols." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 9, no. 3 (2012): 243–55. http://dx.doi.org/10.1177/1548512911449409.
Full textZhang, Yihong, Guojia Li, Yihui Zhang, Yan Cao, Mingyue Cao, and Chengyao Xue. "BASK: Backdoor Attack for Self-Supervised Encoders with Knowledge Distillation Survivability." Electronics 14, no. 13 (2025): 2724. https://doi.org/10.3390/electronics14132724.
Full textWang, Qingya, Yi Wu, Haojun Xuan, and Huishu Wu. "FLARE: A Backdoor Attack to Federated Learning with Refined Evasion." Mathematics 12, no. 23 (2024): 3751. http://dx.doi.org/10.3390/math12233751.
Full textR., Ramkumar, Rahul R., and Gowtham Sri. "Anomaly Based Approach for Defending Denial of Service Attack in Web Traffic." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 04 (2015): 1657–64. https://doi.org/10.5281/zenodo.14776346.
Full textHuang, Youpeng, and Yong Lv. "Research on Network Attack Early Warning and Defense Strategies for Blockchain Networks." Frontiers in Computing and Intelligent Systems 12, no. 1 (2025): 178–83. https://doi.org/10.54097/1c71e118.
Full textJin, Di, Bingdao Feng, Siqi Guo, Xiaobao Wang, Jianguo Wei, and Zhen Wang. "Local-Global Defense against Unsupervised Adversarial Attacks on Graphs." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 7 (2023): 8105–13. http://dx.doi.org/10.1609/aaai.v37i7.25979.
Full textSandeep, Phanireddy. "API Security: Offensive and Defensive Strategies." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 4 (2024): 1–5. https://doi.org/10.5281/zenodo.14883156.
Full textChen, Pei-Yu, and Frank Yeong-Sung Lin. "Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques." Journal of Applied Mathematics 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/207141.
Full textLiang, Xinyu. "Security Challenges and Defense Strategies in Blockchain Systems." Applied and Computational Engineering 135, no. 1 (2025): 105–14. https://doi.org/10.54254/2755-2721/2025.21087.
Full textLiu, Xiaohu, Hengwei Zhang, Yuchen Zhang, Lulu Shao, and Jihong Han. "Active Defense Strategy Selection Method Based on Two-Way Signaling Game." Security and Communication Networks 2019 (November 29, 2019): 1–14. http://dx.doi.org/10.1155/2019/1362964.
Full textGENÇOĞLU, Muharrem Tuncay. "Mathematical Modeling of Cyber Attack and Defense." Bilgisayar Bilimleri ve Teknolojileri Dergisi 3, no. 1 (2022): 10–16. http://dx.doi.org/10.54047/bibted.997908.
Full textTang, Xun, Pengzhi Yin, Zehao Zhou, and Duan Huang. "Adversarial Perturbation Elimination with GAN Based Defense in Continuous-Variable Quantum Key Distribution Systems." Electronics 12, no. 11 (2023): 2437. http://dx.doi.org/10.3390/electronics12112437.
Full textLiu, Yina. "Defense strategies against data poisoning attacks in AI financial risk control models." Advances in Engineering Innovation 16, no. 7 (2025): None. https://doi.org/10.54254/2977-3903/2025.25182.
Full textHuang, Yuchen. "Research on Network Security Threat Detection and Defense Strategies." Applied and Computational Engineering 120, no. 1 (2024): 82–87. https://doi.org/10.54254/2755-2721/2025.18746.
Full textN., Naga Lakshmi. "Implementation of DOS Attack Using NS2." International Journal of Emerging Science and Engineering (IJESE) 12, no. 6 (2024): 1–4. https://doi.org/10.35940/ijese.F9859.12060524.
Full textAshraf, Syeda Nazia, Raheel Siddiqi, and Humera Farooq. "Auto encoder-based defense mechanism against popular adversarial attacks in deep learning." PLOS ONE 19, no. 10 (2024): e0307363. http://dx.doi.org/10.1371/journal.pone.0307363.
Full textWang, Le, Jianyu Deng, Haonan Tan, et al. "AARF: Autonomous Attack Response Framework for Honeypots to Enhance Interaction Based on Multi-Agent Dynamic Game." Mathematics 12, no. 10 (2024): 1508. http://dx.doi.org/10.3390/math12101508.
Full textBassey, Christian, Success Imakuh, and Festus Zindozin. "Cybersecurity in Critical Infrastructure: Defending Against Nation-State Groups." South Asian Research Journal of Engineering and Technology 6, no. 05 (2024): 140–50. http://dx.doi.org/10.36346/sarjet.2024.v06i05.004.
Full textNavya, E., B. Samson Vitty, J. Aruna Kumari, K.V.L.Supraja, D. Prithvi Raj, and P. Venkatesh. "Ecological Warfare: Natural Plant Defense Mechanism against Insect Pests." Journal of Experimental Agriculture International 47, no. 4 (2025): 139–50. https://doi.org/10.9734/jeai/2025/v47i43364.
Full textWalton, Claire, Isaac Kaminer, Qi Gong, Abram H. Clark, and Theodoros Tsatsanifos. "Defense against Adversarial Swarms with Parameter Uncertainty." Sensors 22, no. 13 (2022): 4773. http://dx.doi.org/10.3390/s22134773.
Full textKose, Seima, Yumi Suenaga, and Kazumasa Oida. "Real-time Attack-Scheme Visualization for Complex Exploit Technique Comprehension." International Journal of Machine Learning and Computing 11, no. 2 (2021): 164–69. http://dx.doi.org/10.18178/ijmlc.2021.11.2.1030.
Full text