Journal articles on the topic 'Digital attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Digital attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–24. http://dx.doi.org/10.22624/aims/digital/v11n2p2x.
Full textJimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–36. http://dx.doi.org/10.22624/aims/digital/v11n2p2.
Full textDugyala, Raman, N. Hanuman Reddy, Raghuram G, and J. Lakshminarayana. "Decentralized Secure Online Digital Data Registrations." International Journal of Engineering & Technology 7, no. 4.6 (2018): 42. http://dx.doi.org/10.14419/ijet.v7i4.6.20231.
Full textNwaocha, Vivian O., and Ayodele Oloyede. "Averting DDOS Attacks in Web-Based Applications." Advances in Multidisciplinary and scientific Research Journal Publication 11, no. 1 (2023): 51–63. http://dx.doi.org/10.22624/aims/digital/v11n1p4.
Full textStein, Zvi, Adir Hazan, and Adrian Stern. "Invisible CMOS Camera Dazzling for Conducting Adversarial Attacks on Deep Neural Networks." Sensors 25, no. 7 (2025): 2301. https://doi.org/10.3390/s25072301.
Full textKpieleh, Ferdinand. "A Review of Ddos Attack Detection in Iot Networks." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 43–54. http://dx.doi.org/10.22624/aims/digital/v10n4p6.
Full textKansaon, Daniel, Philipe de Freitas Melo, Savvas Zannettou, Anja Feldmann, and Fabrício Benevenuto. "Strategies and Attacks of Digital Militias in WhatsApp Political Groups." Proceedings of the International AAAI Conference on Web and Social Media 18 (May 28, 2024): 813–25. http://dx.doi.org/10.1609/icwsm.v18i1.31354.
Full textBeny Abukhaer Tatara, Bisma Abdurachman, Desta Lesmana Mustofa, and David Yacobus. "The Potential of Cyber Attacks in Indonesia's Digital Economy Transformation." NUANSA: Jurnal Penelitian Ilmu Sosial dan Keagamaan Islam 20, no. 1 (2023): 19–37. http://dx.doi.org/10.19105/nuansa.v20i1.7362.
Full textChen, Zao. "Federated Learning based on Homomorphic Encryption and Digital Signatures." Highlights in Science, Engineering and Technology 39 (April 1, 2023): 595–603. http://dx.doi.org/10.54097/hset.v39i.6596.
Full textThomas, Reji, Vibisha V, Tabassum A, and Thanuja S. "Digital Watermarking." International Research Journal of Computer Science 10, no. 05 (2023): 124–29. http://dx.doi.org/10.26562/irjcs.2023.v1005.04.
Full textRen, Na, Xinyan Pang, Changqing Zhu, Shuitao Guo, and Ying Xiong. "Blind and Robust Watermarking Algorithm for Remote Sensing Images Resistant to Geometric Attacks." Photogrammetric Engineering & Remote Sensing 89, no. 5 (2023): 60–71. http://dx.doi.org/10.14358/pers.22-00114r2.
Full textAkash, V. S., P. Johnson Akshay, P. S. Alakanandha, and Reji C. Joy Dr. "Cybersecurity in the Digital Age: Benefits and Protective Measures." Recent Trends in Cyber Criminology Research 1, no. 1 (2025): 22–31. https://doi.org/10.5281/zenodo.15188459.
Full textYang, Xiao, Zhenzhen Zhang, Yueshuang Jiao, and Zichen Li. "A Robust Video Watermarking Algorithm Based on Two-Dimensional Discrete Fourier Transform." Electronics 12, no. 15 (2023): 3271. http://dx.doi.org/10.3390/electronics12153271.
Full textAhmed, Ahmed, Noor D. AL AL-Shakarchy, and Mais Saad Safoq. "Early DDoS Attack Detection Using Lightweight Deep Neural Network." Fusion: Practice and Applications 19, no. 2 (2025): 392–401. https://doi.org/10.54216/fpa.190228.
Full textRepka, Marek, Michal Varchola, and Miloš Drutarovský. "Improving CPA Attack Against DSA and ECDSA." Journal of Electrical Engineering 66, no. 3 (2015): 159–63. http://dx.doi.org/10.2478/jee-2015-0025.
Full textShinkaretskaya, Galina Georgievna, and Alisa Mikhailovna Berman. "Cyber-attacks – an unlawful use of digital technologies." Международное право, no. 1 (January 2022): 40–50. http://dx.doi.org/10.25136/2644-5514.2022.1.37271.
Full textNik Aein Koupaei, Alireza. "The Evolving Nature of Cyber Attacks and the Need for Proactive Defense Measures." Journal of Research in Engineering and Applied Sciences 8, no. 4 (2023): 634–39. http://dx.doi.org/10.46565/jreas.202384634-639.
Full textLi, Ying Jiang, and Ying Fang Li. "Randon and Ridgelet Transformation Applicaton in Image Digital Watermark." Advanced Materials Research 756-759 (September 2013): 1925–29. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1925.
Full textZhang, Zheng Bao, and Chao Jia. "Digital Image Zero-Watermarking Algorithm Based on Improved Wavelet Moment." Applied Mechanics and Materials 347-350 (August 2013): 3232–36. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3232.
Full textMT, Suryadi, Achmad Eriza Aminanto, and Muhamad Erza Aminanto. "Empowering Digital Resilience: Machine Learning-Based Policing Models for Cyber-Attack Detection in Wi-Fi Networks." Electronics 13, no. 13 (2024): 2583. http://dx.doi.org/10.3390/electronics13132583.
Full textDamayanti, Tri Hesti, and Ira Rosianal Hikmah. "Network Forensic Serangan DoS pada Jaringan Cloud berdasarkan Generic Framework for Network Forensics (GFNF)." Edumatic: Jurnal Pendidikan Informatika 6, no. 2 (2022): 334–43. http://dx.doi.org/10.29408/edumatic.v6i2.6466.
Full textRizal, Randi, Siti Rahayu Selamat, Mohd Zaki Mas’ud, and Nur Widiyasono. "Enhanced Readiness Forensic Framework for the Complexity of Internet of Things (IoT) Investigation Based on Artificial Intelligence." Journal of Advanced Research in Applied Sciences and Engineering Technology 50, no. 1 (2024): 121–35. http://dx.doi.org/10.37934/araset.50.1.121135.
Full textAlzahrani, Ali. "Detecting Digital Watermarking Image Attacks Using a Convolution Neural Network Approach." Security and Communication Networks 2022 (June 6, 2022): 1–12. http://dx.doi.org/10.1155/2022/4408336.
Full textCourtney, M. "Digital doomsday [simultaneous cyber attacks]." Engineering & Technology 14, no. 10 (2019): 26–29. http://dx.doi.org/10.1049/et.2019.1000.
Full textVijayalakshmi K, N. V. S. K., Dr J. Sasikala, and Dr C. Shanmuganathan. "Advancements in Image-Based Attack Detection: A Comparative Analysis of Copy-Paste and Medical Image Attacks Using Deep Learning Techniques." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–7. https://doi.org/10.55041/ijsrem.ncft028.
Full textAhmad, Musheer, and Hamed D. AlSharari. "Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map." International Journal of Rough Sets and Data Analysis 5, no. 4 (2018): 61–73. http://dx.doi.org/10.4018/ijrsda.2018100104.
Full textLeontyev, Alexander S., and Dmitry V. Zhmatov. "Probabilistic characteristics analysis of virus attack effect on digital substations." Russian Technological Journal 13, no. 1 (2025): 28–37. https://doi.org/10.32362/2500316x-2025-13-1-28-37.
Full textPalaniappan, Sellappan, Rajasvaran Logeswaran, Shapla Khanam, and Pulasthi Gunawardhana. "Social Engineering Threat Analysis Using Large-Scale Synthetic Data." Journal of Informatics and Web Engineering 4, no. 1 (2025): 70–80. https://doi.org/10.33093/jiwe.2025.4.1.6.
Full textSamer, Moein1, Aaron Gulliver1 T., Gebali1 Fayez, and Alkandari2 Abdulrahman. "Hardware Attack Mitigation Techniques Analysis." International Journal on Cryptography and Information Security (IJCIS) 7, no. 1 (2017): 1–20. https://doi.org/10.5281/zenodo.1186619.
Full textJoseph, Paul, and Jasmine Norman. "Systematic Memory Forensic Analysis of Ransomware using Digital Forensic Tools." International Journal of Natural Computing Research 9, no. 2 (2020): 61–81. http://dx.doi.org/10.4018/ijncr.2020040105.
Full textLavrova, Darya, Pavel Semyanov, Anna Shtyrkina, and Peter Zegzhda. "Wavelet-analysis of network traffic time-series for detection of attacks on digital production infrastructure." SHS Web of Conferences 44 (2018): 00052. http://dx.doi.org/10.1051/shsconf/20184400052.
Full textZay, Rani Aflisa, and Mesran Mesran. "Analisa Metode MGR Untuk Mendeteksi Keaslian Citra Digital." TIN: Terapan Informatika Nusantara 2, no. 8 (2022): 492–500. http://dx.doi.org/10.47065/tin.v2i8.1029.
Full textMahmoud, Mahmoud, and Ahmed A. Metwaly. "Enhancing Wireless Ad-Hoc Network Security by Mitigating Distributed Denial-of-Service (DDoS) Attacks." International Journal of Wireless and Ad Hoc Communication 8, no. 2 (2024): 46–52. http://dx.doi.org/10.54216/ijwac.080205.
Full textVoloshynovskiy, S., S. Pereira, T. Pun, J. J. Eggers, and J. K. Su. "Attacks on digital watermarks: classification, estimation based attacks, and benchmarks." IEEE Communications Magazine 39, no. 8 (2001): 118–26. http://dx.doi.org/10.1109/35.940053.
Full textKingsley O., Igboji, Ogbaga Ignatius N., and Otubo Chika T. "Enabling Adaptable Cybersecurity Precepts Classifier and Optimization Strategies For Cloud Navigation Safety - A Technical Review." advances in multidisciplinary & scientific research journal publication 13, no. 1 (2025): 99–110. https://doi.org/10.22624/aims/digital/v13n1p7.
Full textQiu, Hanshuo, Xiangzi Zhang, Huaixiao Yue, and Jizhao Liu. "A Novel Eighth-Order Hyperchaotic System and Its Application in Image Encryption." Mathematics 11, no. 19 (2023): 4099. http://dx.doi.org/10.3390/math11194099.
Full textAdani, Dwi Wina, Ida Nurhayati, and R. Elly Mirati. "The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia." SOSHUM : Jurnal Sosial dan Humaniora 14, no. 3 (2024): 207–14. https://doi.org/10.31940/soshum.v14i3.207-214.
Full textChen, Shunxin, Ajian Liu, Junze Zheng, et al. "Mixture-of-Attack-Experts with Class Regularization for Unified Physical-Digital Face Attack Detection." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 2 (2025): 2195–203. https://doi.org/10.1609/aaai.v39i2.32218.
Full textDEJEY and R. S. RAJESH. "AN IMPROVED WAVELET DOMAIN DIGITAL WATERMARKING FOR IMAGE PROTECTION." International Journal of Wavelets, Multiresolution and Information Processing 08, no. 01 (2010): 19–31. http://dx.doi.org/10.1142/s021969131000333x.
Full textYang, Kaichen, Tzungyu Tsai, Honggang Yu, Tsung-Yi Ho, and Yier Jin. "Beyond Digital Domain: Fooling Deep Learning Based Recognition System in Physical World." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (2020): 1088–95. http://dx.doi.org/10.1609/aaai.v34i01.5459.
Full textJaideep Gera, Et al. "An Artificial Intelligence (AI) Framework for Detection of Distributed Reflection Denial of Service Attacks." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 3539–45. http://dx.doi.org/10.17762/ijritcc.v11i9.9574.
Full textAslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz, and Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions." Electronics 12, no. 6 (2023): 1333. http://dx.doi.org/10.3390/electronics12061333.
Full textShen, Qian, and Wenbo Liu. "A Novel Digital Image Encryption Algorithm Based on Orbit Variation of Phase Diagram." International Journal of Bifurcation and Chaos 27, no. 13 (2017): 1750204. http://dx.doi.org/10.1142/s0218127417502042.
Full textJimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 2, no. 1 (2024): 129–71. http://dx.doi.org/10.60087/jaigs.v2i1.102.
Full textJimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.
Full textJimmy, Fnu. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.
Full textAhmed, Sheikh Shehzad. "A Study of Machine Learning Algorithms for DDoS Detection." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 174–78. http://dx.doi.org/10.22214/ijraset.2021.34922.
Full textVinayak, Bhardwaj, and K.B.Ramesh. "Design of Secure Digital Circuits for Cryptographic Applications." Journal of Control System and its Recent Developments 7, no. 3 (2024): 9–16. https://doi.org/10.5281/zenodo.13735662.
Full textZhang, Ximin, Jinyin Chen, Haibin Zheng, and Zhenguang Liu. "PhyCamo: A Robust Physical Camouflage via Contrastive Learning for Multi-View Physical Adversarial Attack." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 10 (2025): 10230–38. https://doi.org/10.1609/aaai.v39i10.33110.
Full textSingh, Rajeev, and T. P. Sharma. "Present Status of Distributed Denial of Service (DDoS) Attacks in Internet World." International Journal of Mathematical, Engineering and Management Sciences 4, no. 4 (2019): 1008–17. http://dx.doi.org/10.33889/ijmems.2019.4.4-080.
Full text