Journal articles on the topic 'Malicious attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Malicious attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wang, Jing Lei. "Research on the Detection Method of the Malicious Attacks on Campus Network." Applied Mechanics and Materials 644-650 (September 2014): 3291–94. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3291.
Full textGlancy, Fletcher, David P. Biros, Nan Liang, and Andy Luse. "Classification of malicious insiders and the association of the forms of attacks." Journal of Criminal Psychology 10, no. 3 (2020): 233–47. http://dx.doi.org/10.1108/jcp-03-2020-0012.
Full textJiang, Yufan, Maryam Zarezadeh, Tianxiang Dai, and Stefan Köpsell. "AlphaFL: Secure Aggregation with Malicious2 Security for Federated Learning against Dishonest Majority." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 348–68. https://doi.org/10.56553/popets-2025-0134.
Full textKumari, Ankita, Sandip Dutta, and Soubhik Chakraborty. "A comparative study of different security issues in MANET." International Journal of Experimental Research and Review 31, Spl Volume (2023): 168–86. http://dx.doi.org/10.52756/10.52756/ijerr.2023.v31spl.016.
Full textS., Tamil Selvi, and Visalakshi P. "Connect attack in IoT-WSN detect through cyclic analysis based on forward and backward elimination." PeerJ Computer Science 10 (June 28, 2024): e2130. http://dx.doi.org/10.7717/peerj-cs.2130.
Full textLee, Kyungroul, Jaehyuk Lee, and Kangbin Yim. "Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack." Applied Sciences 13, no. 5 (2023): 2894. http://dx.doi.org/10.3390/app13052894.
Full textPohane, Miss Mayuri Arvind. "Implementation Paper on Detection of Malicious URLs Using Machine Learning Techniques." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 296–98. http://dx.doi.org/10.22214/ijraset.2022.41084.
Full textIsah, Abdulkadir Onivehu, John Kolo Alhassan, Idris Ismaila, and Olawale Surajudeen Adebayo. "Tracking of Malicious Attacks on Data Online: A Systematic Review." Transactions on Networks and Communications 8, no. 4 (2020): 31–44. http://dx.doi.org/10.14738/tnc.84.9463.
Full textBoyanov, Petar. "A TAXONOMY OF THE CYBER ATTACKS." Journal scientific and applied research 3, no. 1 (2013): 114–24. http://dx.doi.org/10.46687/jsar.v3i1.73.
Full textAridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications." International Journal of Handheld Computing Research 8, no. 4 (2017): 40–51. http://dx.doi.org/10.4018/ijhcr.2017100104.
Full textXie, Gang, Xincheng Zhou, and Jinchun Gao. "Adaptive Trust Threshold Model Based on Reinforcement Learning in Cooperative Spectrum Sensing." Sensors 23, no. 10 (2023): 4751. http://dx.doi.org/10.3390/s23104751.
Full textPANG, Ming, and Zhi-Hua ZHOU. "Unorganized malicious attacks detection." SCIENTIA SINICA Informationis 48, no. 2 (2018): 177–86. http://dx.doi.org/10.1360/n112017-00112.
Full textMcClure, Ben. "Thwarting malicious Java attacks." Computers & Security 17, no. 4 (1998): 326. http://dx.doi.org/10.1016/s0167-4048(98)80018-7.
Full textArti Deshpande. "Leveraging Signature Patterns and Machine Learning for Detecting HTTP Header Manipulation Attacks." Journal of Information Systems Engineering and Management 10, no. 9s (2025): 636–50. https://doi.org/10.52783/jisem.v10i9s.1290.
Full textLiu, Xin, Xiaomeng Liu, Ruiling Zhang, Dan Luo, Gang Xu, and Xiubo Chen. "Securely Computing the Manhattan Distance under the Malicious Model and Its Applications." Applied Sciences 12, no. 22 (2022): 11705. http://dx.doi.org/10.3390/app122211705.
Full textPsychogyios, Konstantinos, Terpsichori-Helen Velivassaki, Stavroula Bourou, Artemis Voulkidis, Dimitrios Skias, and Theodore Zahariadis. "GAN-Driven Data Poisoning Attacks and Their Mitigation in Federated Learning Systems." Electronics 12, no. 8 (2023): 1805. http://dx.doi.org/10.3390/electronics12081805.
Full textAksoy, Ahmet, Luis Valle, and Gorkem Kar. "Automated Network Incident Identification through Genetic Algorithm-Driven Feature Selection." Electronics 13, no. 2 (2024): 293. http://dx.doi.org/10.3390/electronics13020293.
Full textChiu, Hon Sun, King-Shan Lui, and Kwan L. Yeung. "DelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks." Journal of Communications Software and Systems 2, no. 2 (2017): 131. http://dx.doi.org/10.24138/jcomss.v2i2.296.
Full textZhang, Hongfeng, Xinyu Wang, Lan Ban, and Molin Sun. "A Novel Detection and Identification Mechanism for Malicious Injection Attacks in Power Systems." Symmetry 15, no. 12 (2023): 2104. http://dx.doi.org/10.3390/sym15122104.
Full textWang, Shuhan. "Survey of Malicious PDF Attacks." Frontiers in Computing and Intelligent Systems 5, no. 2 (2023): 104–7. http://dx.doi.org/10.54097/fcis.v5i2.13109.
Full textXiao, Hongyong, Xutong Mu, and Ke Cheng. "FedRMA: A Robust Federated Learning Resistant to Multiple Poisoning Attacks." Journal of Networking and Network Applications 4, no. 1 (2024): 31–38. http://dx.doi.org/10.33969/j-nana.2024.040104.
Full textWang, Qingya, Yi Wu, Haojun Xuan, and Huishu Wu. "FLARE: A Backdoor Attack to Federated Learning with Refined Evasion." Mathematics 12, no. 23 (2024): 3751. http://dx.doi.org/10.3390/math12233751.
Full textLi, Muhai, and Ming Li. "An Adaptive Approach for Defending against DDoS Attacks." Mathematical Problems in Engineering 2010 (2010): 1–15. http://dx.doi.org/10.1155/2010/570940.
Full textLiang, Jiaqi, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, and Ming Ni. "Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks." Complexity 2021 (February 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/6659879.
Full textMeamari, Ehsan, Khadijeh Afhamisisi, and Hadi Shahriar Shahhoseini. "Game Theory-Based Analysis on Interactions Among Secondary and Malicious Users in Coordinated Jamming Attack in Cognitive Radio Systems." Journal of Circuits, Systems and Computers 25, no. 08 (2016): 1650097. http://dx.doi.org/10.1142/s0218126616500973.
Full textZikratov, I. A., T. V. Zikratova, and E. A. Novikov. "Swarm Robotics System Algorithm for Defense against Coordinated Behavior Strategy Attacks." Proceedings of Telecommunication Universities 10, no. 3 (2024): 75–86. http://dx.doi.org/10.31854/1813-324x-2024-10-3-75-86.
Full textHsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai, and Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning." Sustainability 13, no. 22 (2021): 12514. http://dx.doi.org/10.3390/su132212514.
Full textWang, Xingyu. "Classification of Malicious Document Detection Based on Artificial Intelligence." International Journal of Computer Science and Information Technology 2, no. 2 (2024): 108–13. https://doi.org/10.62051/ijcsit.v2n2.10.
Full textThakur, Mandeep, and Amninder Kaur Gill. "Detection and Isolation Technique for Blackhole Attack in Wireless Sensor Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 25. http://dx.doi.org/10.23956/ijarcsse.v7i8.12.
Full textAlmomani, Ammar, Mohammad Alauthman, Firas Albalas, O. Dorgham, and Atef Obeidat. "An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms." International Journal of Cloud Applications and Computing 8, no. 2 (2018): 96–112. http://dx.doi.org/10.4018/ijcac.2018040105.
Full textTaylor, O. E., P. S. Ezekiel, and V. T. Emmah. "A Mult-Task System for Detecting and Classifying Malware Signatures Using Random Forest Classifier." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 73–84. http://dx.doi.org/10.22624/aims/abmic2021-v2-p6.
Full textLakshmi, Vimitha R. Vidhya. "VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 15, no. 1 (2024): 154–71. http://dx.doi.org/10.58346/jowua.2024.i1.011.
Full textVaddadi, Srinivas A., Sanjaikanth E. Vadakkethil Somanathan Pillai, Santosh Reddy Addula, Rohith Vallabhaneni, and Bhuvanesh Ananthan. "An efficient convolutional neural network for adversarial training against adversarial attack." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1769. http://dx.doi.org/10.11591/ijeecs.v36.i3.pp1769-1777.
Full textSrinivas, A. Vaddadi Sanjaikanth E. Vadakkethil Somanathan Pillai Santosh Reddy Addula Rohith Vallabhaneni Bhuvanesh Ananthan. "An efficient convolutional neural network for adversarial training against adversarial attack." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1769–77. https://doi.org/10.11591/ijeecs.v36.i3.pp1769-1777.
Full textChoi, Sunoh, and Jaehyuk Cho. "Novel Feature Extraction Method for Detecting Malicious MQTT Traffic Using Seq2Seq." Applied Sciences 12, no. 23 (2022): 12306. http://dx.doi.org/10.3390/app122312306.
Full textKim, Dohoon, Donghee Choi, and Jonghyun Jin. "Method for Detecting Core Malware Sites Related to Biomedical Information Systems." Computational and Mathematical Methods in Medicine 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/756842.
Full textAlmuhairi, Thani, Ahmad Almarri, and Khalid Hokal. "An Artificial Intelligence-based Intrusion Detection System." Journal of Cybersecurity and Information Management 07, no. 02 (2021): 95–111. http://dx.doi.org/10.54216/jcim.07.02.04.
Full textEt. al., Leelavathy S,. "A Secure Methodology to Detect and Prevent Ddos and Sql Injection Attacks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 341–46. http://dx.doi.org/10.17762/turcomat.v12i2.722.
Full textAPOSTOL, Mihai, Bogdan PALINIUC, Rareș MORAR, and Florin VIDU. "Malicious Strategy: Watering Hole Attacks." Romanian Cyber Security Journal 4, no. 1 (2022): 29–37. http://dx.doi.org/10.54851/v4i1y202204.
Full textLee, Jaehyun, Youngho Cho, Ryungeon Lee, et al. "A Novel Data Sanitization Method Based on Dynamic Dataset Partition and Inspection Against Data Poisoning Attacks." Electronics 14, no. 2 (2025): 374. https://doi.org/10.3390/electronics14020374.
Full textLiu, Zihao, Tianhao Wang, Mengdi Huai, and Chenglin Miao. "Backdoor Attacks via Machine Unlearning." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 13 (2024): 14115–23. http://dx.doi.org/10.1609/aaai.v38i13.29321.
Full textLi, Lixiang, Jürgen Kurths, Yixian Yang, and Guole Liu. "Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks." Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/189213.
Full textGovindaraj, Mareeswari. "Assorted Attack Detection for IoT." International Journal of Research in Engineering, Science and Management 3, no. 9 (2020): 52–55. http://dx.doi.org/10.47607/ijresm.2020.285.
Full textHuang, Wenli, Liang Chen, and Junli Li. "A Critical Candidate Node-Based Attack Model of Network Controllability." Entropy 26, no. 7 (2024): 580. http://dx.doi.org/10.3390/e26070580.
Full textRaj Panakadan, Rusheel, Chitluri Dhanush, and Dr Carmel Mary Belinda. "An effective solution for DDOS attack." International Journal of Engineering & Technology 7, no. 1.7 (2018): 194. http://dx.doi.org/10.14419/ijet.v7i1.7.10650.
Full textA. Sathiya Priya and A. Sandhiya. "Machine learning based Cyber Attack detection on Internet Traffic." International Journal of Science and Research Archive 11, no. 2 (2024): 619–24. http://dx.doi.org/10.30574/ijsra.2024.11.2.0459.
Full textPravylo, Valerii, and Yevhenii Averkiiev. "ANALYSING MALICIOUS SOFTWARE SUPPORTING DDOS ATTACKS ON IOT NETWORKS." Information and Telecommunication Sciences, no. 1 (June 28, 2024): 50–54. http://dx.doi.org/10.20535/2411-2976.12024.50-54.
Full textPopov, Georgiy Aleksandrovich, Nadezhda Valerievna Daviduk, Kirill Dmitrievich Kuzovlev, Shamil Shavketovich Iksanov, and Albert Salmanovich Safaraliev. "Analysis of the nearest attack moment in critical infrastructure objects with a gradual change in the intensity of attacks over time." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2025, no. 1 (2025): 46–55. https://doi.org/10.24143/2072-9502-2025-1-46-55.
Full textWang, Hai Tao, Hui Chen, Xue Ping Zhang, and Li Yan. "A Novel Cluster Based Survivable Routing Protocol for Wireless Sensor Network." Applied Mechanics and Materials 556-562 (May 2014): 5577–81. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5577.
Full textTrivedi, Munesh C., and Sachin Malhotra. "Identification and Prevention of Joint Gray Hole and Black Hole Attacks." International Journal of Ambient Computing and Intelligence 10, no. 2 (2019): 80–90. http://dx.doi.org/10.4018/ijaci.2019040106.
Full text