Journal articles on the topic 'Internet attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Internet attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ourston, Dirk, Sara Matzner, William Stump, and Bryan Hopkins. "Coordinated Internet attacks: responding to attack complexity." Journal of Computer Security 12, no. 2 (2004): 165–90. http://dx.doi.org/10.3233/jcs-2004-12201.
Full textPeterson, A. Padgett. "Internet attack mechanisms." Network Security 1996, no. 5 (1996): 17–19. http://dx.doi.org/10.1016/1353-4858(96)81911-8.
Full textR., Ramkumar, Rahul R., and Gowtham Sri. "Anomaly Based Approach for Defending Denial of Service Attack in Web Traffic." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 04 (2015): 1657–64. https://doi.org/10.5281/zenodo.14776346.
Full textChristopher, Mitchel, Ghaleb Baraq, M. Ghaleb Safwan, Jaroucheh Zakwan, and Ali Saleh Al-rimy Bander. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 2 (2020): 66–72. https://doi.org/10.35940/ijeat.B1962.1210220.
Full textRastenis, Justinas, Simona Ramanauskaitė, Justinas Janulevičius, Antanas Čenys, Asta Slotkienė, and Kęstutis Pakrijauskas. "E-mail-Based Phishing Attack Taxonomy." Applied Sciences 10, no. 7 (2020): 2363. http://dx.doi.org/10.3390/app10072363.
Full textZafri, Fizza. "Ransomware Attacks in History of Cyber World." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 39–43. http://dx.doi.org/10.22214/ijraset.2022.39758.
Full textKarthikeyani, R., and E. Karthikeyan. "A Review on Distributed Denial of Service Attack." Asian Journal of Research in Computer Science 16, no. 4 (2023): 133–44. http://dx.doi.org/10.9734/ajrcos/2023/v16i4378.
Full textWu, Yixin, Cheng Huang, Xing Zhang, and Hongyi Zhou. "GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things." Security and Communication Networks 2020 (December 4, 2020): 1–14. http://dx.doi.org/10.1155/2020/8842539.
Full textSingh, Rajeev, and T. P. Sharma. "Present Status of Distributed Denial of Service (DDoS) Attacks in Internet World." International Journal of Mathematical, Engineering and Management Sciences 4, no. 4 (2019): 1008–17. http://dx.doi.org/10.33889/ijmems.2019.4.4-080.
Full textSinghal, Prateek, Puneet Sharma, and Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator." International Journal of Engineering & Technology 7, no. 2.8 (2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.
Full textTao, Xiao-ling, Lan Shi, Feng Zhao, Shen Lu, and Yang Peng. "A Hybrid Alarm Association Method Based on AP Clustering and Causality." Wireless Communications and Mobile Computing 2021 (March 30, 2021): 1–10. http://dx.doi.org/10.1155/2021/5576504.
Full textPalacharla, Swetha, M. Chandan, K. GnanaSuryaTeja, and G. Varshitha. "Wormhole Attack: a Major Security Concern in Internet of Things (Iot)." International Journal of Engineering & Technology 7, no. 3.27 (2018): 147. http://dx.doi.org/10.14419/ijet.v7i3.27.17748.
Full textEhmer, Jörg, Yvon Savaria, Bertrand Granado, Jean-Pierre David, and Julien Denoulet. "Network Attack Classification with a Shallow Neural Network for Internet and Internet of Things (IoT) Traffic." Electronics 13, no. 16 (2024): 3318. http://dx.doi.org/10.3390/electronics13163318.
Full textMa, Jian Hong, and Li Xia Ji. "Shrew Attack on Internet Congestion Control Protocol in Control Engineering." Advanced Materials Research 648 (January 2013): 277–80. http://dx.doi.org/10.4028/www.scientific.net/amr.648.277.
Full textPatel, Anshuman, and Devesh Jinwala. "A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things." International Journal of Information Security and Privacy 15, no. 4 (2021): 1–17. http://dx.doi.org/10.4018/ijisp.2021100101.
Full textSuryani, Vera, Selo Sulistyo, and Widyawan Widyawan. "Simulation of trust-based attacks in Internet of Things." MATEC Web of Conferences 154 (2018): 03014. http://dx.doi.org/10.1051/matecconf/201815403014.
Full textKamis, Noor Hisham, Warusia Yassin, Mohd Faizal Abdollah, Siti Fatimah Abdul Razak, and Sumendra Yogarayan. "Blackhole attacks in internet of things networks: a review." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 2 (2023): 1080. http://dx.doi.org/10.11591/ijeecs.v30.i2.pp1080-1090.
Full textNoor, Hisham Kamis, Yassin Warusia, Faizal Abdollah Mohd, Fatimah Abdul Razak Siti, and Yogarayan Sumendra. "Blackhole attacks in internet of things networks: a review." Blackhole attacks in internet of things networks: a review 30, no. 2 (2023): 1080–90. https://doi.org/10.11591/ijeecs.v30.i2.pp1080-1090.
Full textSikora, Marek, Radek Fujdiak, Karel Kuchar, Eva Holasova, and Jiri Misurec. "Generator of Slow Denial-of-Service Cyber Attacks." Sensors 21, no. 16 (2021): 5473. http://dx.doi.org/10.3390/s21165473.
Full textMaha, A. A. Mohammad, and M. T. Jawhar Muna. "Compare between PSO and artificial bee colony optimization algorithm in detecting DoS attacks from network traffic." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 20, no. 4 (2022): 780–87. https://doi.org/10.12928/telkomnika.v20i4.23757.
Full textSharma, Vishal, Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, and Ravinder Kumar. "Coagulation Attacks over Networked UAVs: Concept, Challenges, and Research Aspects." International Journal of Engineering & Technology 7, no. 3.13 (2018): 183. http://dx.doi.org/10.14419/ijet.v7i3.13.17329.
Full textEgreira Ali Abuhamra, Eng Abdalgader. "Concept of Network security." International Journal of Advances in Engineering and Management 7, no. 3 (2025): 384–90. https://doi.org/10.35629/5252-0703384390.
Full textD., Glăvan. "DDoS detection and prevention based on artificial intelligence techniques." Scientific Bulletin of Naval Academy XXII, no. 1 (2019): 134–43. http://dx.doi.org/10.21279/1454-864x-19-i1-018.
Full textK.M, Akhil, Rahul C.T, and Athira V.B. "Distributed Denial of Service (DDoS) Attacks and Defence Mechanism." International Journal of Computer Science and Mobile Computing 10, no. 3 (2021): 83–88. http://dx.doi.org/10.47760/ijcsmc.2021.v10i03.010.
Full textAlam, Hasibul, and Emmett Tomai. "Security Attacks and Countermeasures in Smart Homes." International Journal on Cybernetics & Informatics 12, no. 2 (2023): 109–19. http://dx.doi.org/10.5121/ijci.2023.120209.
Full textKhan, Faheem, Abdullah A. Al-Atawi, Abdullah Alomari, et al. "Development of a Model for Spoofing Attacks in Internet of Things." Mathematics 10, no. 19 (2022): 3686. http://dx.doi.org/10.3390/math10193686.
Full textVeeraiah, Duggineni, Rajanikanta Mohanty, Shakti Kundu, et al. "Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques." Computational Intelligence and Neuroscience 2022 (September 5, 2022): 1–9. http://dx.doi.org/10.1155/2022/4003403.
Full textTyas, Zahra Arwananing, Arizona Firdonsyah, and Wulan Ramdhani. "Analisis Keamanan Jaringan dari Serangan DoS pada Sistem Inventaris Sanggar Tari Natya Lakshita menggunakan IDS." INFORMAL: Informatics Journal 7, no. 3 (2022): 258. http://dx.doi.org/10.19184/isj.v7i3.34943.
Full textNeerugatti, Vikram, and A. Rama Mohan Reddy. "Acknowledgement Based Technique for Detection of the Wormhole Attack in RPL Based Internet of Things Networks." Asian Journal of Computer Science and Technology 8, S3 (2019): 100–104. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2075.
Full textAlyami, Sarah, Randah Alharbi, and Farag Azzedin. "Fragmentation Attacks and Countermeasures on 6LoWPAN Internet of Things Networks: Survey and Simulation." Sensors 22, no. 24 (2022): 9825. http://dx.doi.org/10.3390/s22249825.
Full textDougan, Timothy, and Kevin Curran. "Man in the Browser Attacks." International Journal of Ambient Computing and Intelligence 4, no. 1 (2012): 29–39. http://dx.doi.org/10.4018/jaci.2012010103.
Full textHisyam, Masfu, Ali Ridho Barakbah, Iwan Syarif, and Ferry Astika S. "Spatio Temporal with Scalable Automatic Bisecting-Kmeans for Network Security Analysis in Matagaruda Project." EMITTER International Journal of Engineering Technology 7, no. 1 (2019): 83–104. http://dx.doi.org/10.24003/emitter.v7i1.340.
Full textAgghey, Abel Z., Lunodzo J. Mwinuka, Sanket M. Pandhare, Mussa A. Dida, and Jema D. Ndibwile. "Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach." Symmetry 13, no. 11 (2021): 2192. http://dx.doi.org/10.3390/sym13112192.
Full textResearcher. "AN ARCHITECTURE FOR A DISTRIBUTED CLOUD HONEYPOT." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 488–500. https://doi.org/10.5281/zenodo.14183575.
Full textVenkatachalam, Nallarasan, and Kottilingam Kottursamy. "Jamming Attack Mitigation in CR-IoT Using Game Theory." Revue d'Intelligence Artificielle 36, no. 4 (2022): 615–20. http://dx.doi.org/10.18280/ria.360414.
Full textSingh, Har Preet. "Survey of new attack models on Cloud Infrastructure." International Journal Of Engineering And Computer Science 7, no. 03 (2018): 23742–52. http://dx.doi.org/10.18535/ijecs/v7i3.15.
Full textGoth, G. "Securing the internet against attack." IEEE Internet Computing 7, no. 1 (2003): 8–10. http://dx.doi.org/10.1109/mic.2003.1167332.
Full textA. Sathiya Priya and A. Sandhiya. "Machine learning based Cyber Attack detection on Internet Traffic." International Journal of Science and Research Archive 11, no. 2 (2024): 619–24. http://dx.doi.org/10.30574/ijsra.2024.11.2.0459.
Full textEl Kamel, Nadiya, Mohamed Eddabbah, Youssef Lmoumen, and Raja Touahni. "A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning." Security and Communication Networks 2020 (August 7, 2020): 1–9. http://dx.doi.org/10.1155/2020/8865474.
Full textYan, Jingchen, Zhe Du, Jifang Li, Shiduo Yang, Jinghao Li, and Jianbin Li. "A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things." Security and Communication Networks 2022 (February 25, 2022): 1–11. http://dx.doi.org/10.1155/2022/7729456.
Full textBhargavi Goparaju and Bandla Sreenivasa Rao. "Distributed Denial-of-Service (DDoS) Attack Detection using 1D Convolution Neural Network (CNN) and Decision Tree Model." Journal of Advanced Research in Applied Sciences and Engineering Technology 32, no. 2 (2023): 30–41. http://dx.doi.org/10.37934/araset.32.2.3041.
Full textAhanger, Tariq Ahamad. "Defense Scheme to Protect IoT from Cyber Attacks using AI Principles." International Journal of Computers Communications & Control 13, no. 6 (2018): 915–26. http://dx.doi.org/10.15837/ijccc.2018.6.3356.
Full textKumavat, Kavita S., and Joanne Gomes. "Common Mechanism for Detecting Multiple DDoS Attacks." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (2023): 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Full textRamli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.
Full textJ, Manokaran, and Vairavel G. "An Empirical Comparison of Machine Learning Algorithms for Attack Detection in Internet of Things Edge." ECS Transactions 107, no. 1 (2022): 2403–17. http://dx.doi.org/10.1149/10701.2403ecst.
Full textShi, Fan, Pengcheng Zhu, Xiangyu Zhou, Bintao Yuan, and Yong Fang. "Network attack detection and visual payload labeling technology based on Seq2Seq architecture with attention mechanism." International Journal of Distributed Sensor Networks 16, no. 4 (2020): 155014772091701. http://dx.doi.org/10.1177/1550147720917019.
Full textMa, Yao, Yuting Wu, Dan Yu, Lv Ding, and Yongle Chen. "Vulnerability association evaluation of Internet of thing devices based on attack graph." International Journal of Distributed Sensor Networks 18, no. 5 (2022): 155013292210978. http://dx.doi.org/10.1177/15501329221097817.
Full textRiyadh, Rahef Nuiaa, Manickam Selvakumar, and Hakem Alsaeedi Ali. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327–41. https://doi.org/10.11591/ijece.v11i6.pp5327-5341.
Full textMishra, Chinmayee, Pullam Bhatla Laxmi Sindhu, Pruthwiraj Mohanty, and Ayush Kumar Samrat. "DDOS Attacks and Analysis of Different Defense Mechanisms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem40061.
Full textJohnson, Brian David. "Efficiency is Easy to Hack." Mechanical Engineering 139, no. 08 (2017): 38–43. http://dx.doi.org/10.1115/1.2017-aug-2.
Full text