Academic literature on the topic 'Malicious attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malicious attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malicious attacks"
Wang, Jing Lei. "Research on the Detection Method of the Malicious Attacks on Campus Network." Applied Mechanics and Materials 644-650 (September 2014): 3291–94. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3291.
Full textGlancy, Fletcher, David P. Biros, Nan Liang, and Andy Luse. "Classification of malicious insiders and the association of the forms of attacks." Journal of Criminal Psychology 10, no. 3 (2020): 233–47. http://dx.doi.org/10.1108/jcp-03-2020-0012.
Full textJiang, Yufan, Maryam Zarezadeh, Tianxiang Dai, and Stefan Köpsell. "AlphaFL: Secure Aggregation with Malicious2 Security for Federated Learning against Dishonest Majority." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 348–68. https://doi.org/10.56553/popets-2025-0134.
Full textKumari, Ankita, Sandip Dutta, and Soubhik Chakraborty. "A comparative study of different security issues in MANET." International Journal of Experimental Research and Review 31, Spl Volume (2023): 168–86. http://dx.doi.org/10.52756/10.52756/ijerr.2023.v31spl.016.
Full textS., Tamil Selvi, and Visalakshi P. "Connect attack in IoT-WSN detect through cyclic analysis based on forward and backward elimination." PeerJ Computer Science 10 (June 28, 2024): e2130. http://dx.doi.org/10.7717/peerj-cs.2130.
Full textLee, Kyungroul, Jaehyuk Lee, and Kangbin Yim. "Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack." Applied Sciences 13, no. 5 (2023): 2894. http://dx.doi.org/10.3390/app13052894.
Full textPohane, Miss Mayuri Arvind. "Implementation Paper on Detection of Malicious URLs Using Machine Learning Techniques." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 296–98. http://dx.doi.org/10.22214/ijraset.2022.41084.
Full textIsah, Abdulkadir Onivehu, John Kolo Alhassan, Idris Ismaila, and Olawale Surajudeen Adebayo. "Tracking of Malicious Attacks on Data Online: A Systematic Review." Transactions on Networks and Communications 8, no. 4 (2020): 31–44. http://dx.doi.org/10.14738/tnc.84.9463.
Full textBoyanov, Petar. "A TAXONOMY OF THE CYBER ATTACKS." Journal scientific and applied research 3, no. 1 (2013): 114–24. http://dx.doi.org/10.46687/jsar.v3i1.73.
Full textAridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications." International Journal of Handheld Computing Research 8, no. 4 (2017): 40–51. http://dx.doi.org/10.4018/ijhcr.2017100104.
Full textDissertations / Theses on the topic "Malicious attacks"
Opie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.
Full textAbu-Bakar, Kamalrulnizam. "Protecting agents against malicious host attacks." Thesis, Aston University, 2004. http://publications.aston.ac.uk/10612/.
Full textFischer, Benjamin. "Vehicular Group Membership Resilient to Malicious Attacks." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086.
Full textCasile, Roberta <1986>. "GNSS interference management techniques against malicious attacks." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7025/1/Casile_Roberta_tesi.pdf.
Full textCasile, Roberta <1986>. "GNSS interference management techniques against malicious attacks." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7025/.
Full textSivakumaran, Arun. "Malicious user attacks in decentralised cognitive radio networks." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/79657.
Full textMahlburg, Karl. "Structure Attacks in Cryptographic Protocols." Scholarship @ Claremont, 2001. https://scholarship.claremont.edu/hmc_theses/130.
Full textNarasimhan, Mayur Harn Lein. "Protecting a mobile agent from colluded truncation attacks by malicious hosts." Diss., UMK access, 2007.
Find full textJolley, Jason. "Attribution, state responsibility, and the duty to prevent malicious cyber-attacks in international law." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8452/.
Full textLikarish, Peter F. "Early detection of malicious web content with applied machine learning." Diss., University of Iowa, 2011. https://ir.uiowa.edu/etd/4871.
Full textBooks on the topic "Malicious attacks"
M, Johansson Jesper, ed. Windows vista security: Securing vista against malicious attacks. Wiley Technology Pub., 2007.
Find full textSun, Kun, and Shu Wang. Secure Voice Processing Systems against Malicious Voice Attacks. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-44748-8.
Full textChen, Bo, Tongxiang Li, Wen-An Zhang, and Li Yu. Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-9396-9.
Full textJiang, Jiaojiao, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, and Wanlei Zhou. Malicious Attack Propagation and Source Identification. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02179-5.
Full textUnited States. Congress. House. Committee on Science. Subcommittee on Technology. The love bug virus: Protecting lovesick computers from malicious attack : hearing before the Subcommittee on Technology of the Committee on Science, House of Representatives, One Hundred Sixth Congress, second session, May 10, 2000. U.S. G.P.O., 2000.
Find full textGrimes, Roger A., and Jesper M. Johansson. Windows Vista Security: Securing Vista Against Malicious Attacks. Wiley, 2007.
Find full textGrimes, Roger A., and Jesper M. Johansson. Windows Vista Security: Securing Vista Against Malicious Attacks. Wiley & Sons, Incorporated, John, 2008.
Find full textMauro, Aaron. The Language of Cyber Attacks. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781350354715.
Full textKleymenov, Alexey, and Amr Thabet. Mastering Malware Analysis: A Malware Analyst's Practical Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks. Packt Publishing, Limited, 2022.
Find full textBook chapters on the topic "Malicious attacks"
Yu, Shui. "Malicious Networks for DDoS Attacks." In Distributed Denial of Service Attack and Defense. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9491-1_2.
Full textRong, Qingnan, Jun Zhang, Xiaoqian Sun, and Sebastian Wandelt. "Network Strengthening Against Malicious Attacks." In Complex Networks and Their Applications VIII. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36687-2_63.
Full textJiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "User Influence in the Propagation of Malicious Attacks." In Malicious Attack Propagation and Source Identification. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_3.
Full textLi, Yuping, Jiyong Jang, Xin Hu, and Xinming Ou. "Android Malware Clustering Through Malicious Payload Mining." In Research in Attacks, Intrusions, and Defenses. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66332-6_9.
Full textLekies, Sebastian, Nick Nikiforakis, Walter Tighzert, Frank Piessens, and Martin Johns. "DEMACRO: Defense against Malicious Cross-Domain Requests." In Research in Attacks, Intrusions, and Defenses. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33338-5_13.
Full textAlnabulsi, Hussein, and Rafiqul Islam. "Web Sanitization from Malicious Code Injection Attacks." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98776-7_27.
Full textZhu, Yajie, Tai Xin, and Indrakshi Ray. "Recovering from Malicious Attacks in Workflow Systems." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11546924_2.
Full textChen, Weitong, Xiaofen Tu, Xin Liu, Jianwei Kong, Xiubo Chen, and Xiaomeng Liu. "Blockchain-Based Voting Scheme Against Malicious Attacks." In Proceedings of the UNIfied Conference of DAMAS, IncoME and TEPEN Conferences (UNIfied 2023). Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-49421-5_80.
Full textRay, Indrajit, and Nayot Poolsapassit. "Using Attack Trees to Identify Malicious Attacks from Authorized Insiders." In Computer Security – ESORICS 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11555827_14.
Full textSun, Kun, and Shu Wang. "Acoustic Compensation System Against Adversarial Voice Recognition." In Secure Voice Processing Systems against Malicious Voice Attacks. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-44748-8_4.
Full textConference papers on the topic "Malicious attacks"
Abozaid, Fatemah, and Ali Baydoun. "Resilience of Aviation Cyber-Physical Systems to Malicious Attacks." In 2024 International Conference on Computer and Applications (ICCA). IEEE, 2024. https://doi.org/10.1109/icca62237.2024.10927823.
Full textWu, Qirui, Yirun Zhang, Zhaohui Yang, and Mohammad Shikh-Bahaei. "Knowledge Distillation-Based Robust UAV Swarm Communication Under Malicious Attacks." In 2024 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 2024. http://dx.doi.org/10.1109/iccworkshops59551.2024.10615342.
Full textFalou, Ammar El. "A Study on Malicious Attacks for RIS-Aided Wireless Systems." In 2025 5th IEEE Middle East and North Africa Communications Conference (MENACOMM). IEEE, 2025. https://doi.org/10.1109/menacomm62946.2025.10911031.
Full textMahbooba, Basim, Mohan Timilsina, and Martin Serrano. "Trusting Machine Learning Algorithms in Predicting Malicious Nodes Attacks." In 9th International Conference on Artificial Intelligence and Applications (AIAP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120408.
Full textWan, Wei, Shengshan Hu, jianrong Lu, Leo Yu Zhang, Hai Jin, and Yuanyuan He. "Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/106.
Full textAbdelgawad, Mohamed, and Marianne A. Azer. "Securing Hardware from Malicious Attacks." In 2021 16th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2021. http://dx.doi.org/10.1109/icces54031.2021.9686147.
Full textArulsuju, D. "Hunting malicious attacks in social networks." In 2011 Third International Conference on Advanced Computing (ICoAC). IEEE, 2011. http://dx.doi.org/10.1109/icoac.2011.6165172.
Full textRayatidamavandi, Maede, Frank Conlon, and Mahshid Rahnamay-Naeini. "Reducing Network Vulnerability to Malicious Attacks." In 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2018. http://dx.doi.org/10.1109/iccnc.2018.8390313.
Full textAu, Man Ho, Yi Mu, Jing Chen, Duncan S. Wong, Joseph K. Liu, and Guomin Yang. "Malicious KGC attacks in certificateless cryptography." In Asia CCS07: Asia CCS'07 ACM Symposium on Information, Computer and Communications Security. ACM, 2007. http://dx.doi.org/10.1145/1229285.1266997.
Full textTejaswi, Chakravarma Sai, Yemireddy Chaitanya, A. Jesudoss, and Prayla Shyry. "Malicious Attacks Detection Using Machine Learning." In 2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 2022. http://dx.doi.org/10.1109/icirca54612.2022.9985551.
Full textReports on the topic "Malicious attacks"
Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Full textChristie, Lorna. Physical threats to infrastructure. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/hs23.
Full textFekri, Faramarz, E. Ayday, and R. Subramanian. Design Principles for Secure Wireless Sensor Networks: Key Management Schemes and Malicious Attacks. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada533169.
Full textDesmedt, Yvo. Critical Analysis of the Use of Redundancy to Achieve Survivability in the Presence of Malicious Attacks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada403635.
Full textFedchenko, Vitaly. Nuclear Security During Armed Conflict: Lessons From Ukraine. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/zzsp5617.
Full textTayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Full textBelcher, Scott, Terri Belcher, James Grimes, Lusa Holmstrom, and Andy Souders. Does the Transit Industry Understand the Risks of Cybersecurity and are the Risks Being Appropriately Prioritized? Mineta Transportation Institute, 2025. https://doi.org/10.31979/mti.2025.2405.
Full textAcosta, Jaime C. From Malicious Eyes: A Method for Concise Representation of Ad-Hoc Networks and Efficient Attack Survivability Analysis. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada564943.
Full textThreat assessment of malicious code and external attacks. National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4939.
Full text