Journal articles on the topic 'Masquerade Attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Masquerade Attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Maestre Vidal, Jorge, and Marco Antonio Sotelo Monge. "Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features." Sensors 20, no. 7 (2020): 2084. http://dx.doi.org/10.3390/s20072084.
Full text., Sonika, Sandeep Kumar Arora, and Mahedi Masud. "Review on Security Based Vehicular Ad-Hoc Network." International Journal of Engineering & Technology 7, no. 3.8 (2018): 125. http://dx.doi.org/10.14419/ijet.v7i3.8.16846.
Full textHatture, Sanjeeva Kumar M., and Shweta Policepatil. "Masquerade Attack Analysis for Secured Face Biometric System." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 2 (2021): 225–32. http://dx.doi.org/10.35940/ijrte.b6309.0710221.
Full textShweta, Policepatil, and Kumar M. Hatture Sanjeeva. "Masquerade Attack Analysis for Secured Face Biometric System." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 2 (2021): 225–32. https://doi.org/10.35940/ijrte.B6309.0710221.
Full textLi, Biao. "Research on Computer Network Security and Prevention Strategy." Applied Mechanics and Materials 608-609 (October 2014): 526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.526.
Full textAyeni, Olaniyi, O. Owolafe, and O. P. Ogunjobi. "A Security System for Detecting Denial of Service (DDoS) and Masquerade Attacks on Social Networks." Journal of Information Security and Cybercrimes Research 5, no. 1 (2022): 80–86. http://dx.doi.org/10.26735/gmey8791.
Full textBabkin, Sergey, and Anna Epishkina. "One-Time Passwords: Resistance to Masquerade Attack." Procedia Computer Science 145 (2018): 199–203. http://dx.doi.org/10.1016/j.procs.2018.11.040.
Full textTapiador, Juan E., and John A. Clark. "Masquerade mimicry attack detection: A randomised approach." Computers & Security 30, no. 5 (2011): 297–310. http://dx.doi.org/10.1016/j.cose.2011.05.004.
Full textAlmanza-Ortega, Nelva Nely, Joaquin Perez-Ortega, Monterrubio Sergio Mauricio Martínez, and Juan A. Recio-Garcia. "Clustering-Based Cyber Situational Awareness: A Practical Approach for Masquerade Attack Detection." Journal of Artificial Intelligence and Computing Applications 2, no. 1 (2024): 35–39. https://doi.org/10.5281/zenodo.14933955.
Full textWei, Guo-heng, Yan-lin Qin, and Wei Fu. "An Improved Security Authentication Protocol for Lightweight RFID Based on ECC." Journal of Sensors 2022 (February 8, 2022): 1–6. http://dx.doi.org/10.1155/2022/7516010.
Full textChang, Wenson. "On the Performance of the DNPS-Based Relay Networks under Masquerading Attack." Wireless Communications and Mobile Computing 2018 (July 17, 2018): 1–13. http://dx.doi.org/10.1155/2018/4602146.
Full textSivanandhan, Anusha, Bibitha Baby, and Dhanya G S. "Masquerade Attack Identification Via DDSGA-Based Anomaly Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44275.
Full textHao, Zhuo, Sheng Zhong, and Nenghai Yu. "A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing." International Journal of Computers Communications & Control 6, no. 2 (2011): 227. http://dx.doi.org/10.15837/ijccc.2011.2.2170.
Full textMIZANUR RAHMAN, SK MD, and KHALIL EL-KHATIB. "SECURE ANONYMOUS COMMUNICATION FOR WIRELESS SENSOR NETWORKS BASED ON PAIRING OVER ELLIPTIC CURVES." Journal of Interconnection Networks 10, no. 04 (2009): 459–79. http://dx.doi.org/10.1142/s0219265909002662.
Full textMenon, MeenaGopinath, Priyanka Sudhakar, and Nidhi Dubey. "Idiopathic posterior scleritis: A masquerade of acute angle-closure attack." TNOA Journal of Ophthalmic Science and Research 60, no. 1 (2022): 52. http://dx.doi.org/10.4103/tjosr.tjosr_60_21.
Full textElmasry, Wisam, Akhan Akbulut, and Abdul Halim Zaim. "Comparative evaluation of different classification techniques for masquerade attack detection." International Journal of Information and Computer Security 13, no. 2 (2020): 187. http://dx.doi.org/10.1504/ijics.2020.108848.
Full textZaim, Abdul Halim, Akhan Akbulut, and Wisam Elmasry. "Comparative Evaluation of Different Classification Techniques for Masquerade Attack Detection." International Journal of Information and Computer Security 11, no. 4/5 (2019): 1. http://dx.doi.org/10.1504/ijics.2019.10020664.
Full textJo, Hyo Jin, Jin Hyun Kim, Hyon-Young Choi, Wonsuk Choi, Dong Hoon Lee, and Insup Lee. "MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks." IEEE Transactions on Vehicular Technology 69, no. 2 (2020): 2204–18. http://dx.doi.org/10.1109/tvt.2019.2961765.
Full textAlmanza-Ortega, Nelva Nely, Joaquin Perez-Ortega, Monterrubio Sergio Mauricio Martínez, and Juan A. Recio-Garcia. "An Explainable Clustering-Based Approach for Cyber Situational Awareness on Masquerade Attacks Detection." Journal of Artificial Intelligence and Computing Applications 2, no. 2 (2024): 48–59. https://doi.org/10.5281/zenodo.15098302.
Full textCarryl, Clyde, Bassem Alhalabi, Taghi M. Khoshgoftaar, and Lofton Bullard. "Verifying the Security Characteristics of a Secure Physical Access Control Protocol." International Journal of Reliability, Quality and Safety Engineering 23, no. 02 (2016): 1650006. http://dx.doi.org/10.1142/s0218539316500066.
Full textShaik, Hedayath Basha, Arun C, Ganesh Sekar Jai, Nimitha N, and Kiran Tatineni Sai. "An Intelligent Secure Image Transmission System Using Elliptic Curve Cryptography." International Journal of Microsystems and IoT 1, no. 3 (2023): 156–62. https://doi.org/10.5281/zenodo.8359476.
Full textFeng, Yi C., Meng-Hui Lim, and Pong C. Yuen. "Masquerade attack on transform-based binary-template protection based on perceptron learning." Pattern Recognition 47, no. 9 (2014): 3019–33. http://dx.doi.org/10.1016/j.patcog.2014.03.003.
Full textChoi, Younsung, Junghyun Nam, Donghoon Lee, Jiye Kim, Jaewook Jung, and Dongho Won. "Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics." Scientific World Journal 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/281305.
Full textZhang, Jiayuan, Rongxin Guo, Yifan Shi, and Wanting Tang. "An anti-impersonation attack electronic health record sharing scheme based on proxy re-encryption and blockchain." Mathematical Biosciences and Engineering 21, no. 6 (2024): 6167–89. http://dx.doi.org/10.3934/mbe.2024271.
Full textDušek, Otakar, Marek Fichtl, Lucie Rezková, et al. "Acute Elevation of Intraocular Pressure in Patient with Hyperlipidemic Myeloma." Czech and Slovak Ophthalmology 76, no. 4 (2020): 172–80. http://dx.doi.org/10.31348/2020/27.
Full textCui, Jianming, Xiaojun Zhang, Ning Cao, Dexue Zhang, Jianrui Ding, and Guofu Li. "An improved authentication protocol–based dynamic identity for multi-server environments." International Journal of Distributed Sensor Networks 14, no. 5 (2018): 155014771877765. http://dx.doi.org/10.1177/1550147718777654.
Full textKalaiselvi, R., and P. Meenakshi Sundaram. "Unified framework for sybil attack detection in mobile ad hoc networks using machine learning approach." Scientific Temper 16, no. 02 (2025): 3774–82. https://doi.org/10.58414/scientifictemper.2025.16.2.09.
Full textPatel, Maitri, and Rajan Patel. "Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem." Emerging Science Journal 5, no. 1 (2021): 77–84. http://dx.doi.org/10.28991/esj-2021-01259.
Full textZhang, Nan, Jian Hua Zhang, and Jun Yang. "RFID Mutual Authentication Protocol Based on Chaos Key." Advanced Materials Research 846-847 (November 2013): 1519–23. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1519.
Full textJadoaa, Sawsan H., Rasha H. Ali, Wisal Hashim Abdulsalam, and Emad M. Alsaedi. "The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment." Mesopotamian Journal of CyberSecurity 5, no. 1 (2025): 240–55. https://doi.org/10.58496/mjcs/2025/016.
Full textBonavia, Luke John, Justin Jackson, and Richard Jurevics. "Posterior reversible encephalopathy syndrome in acute pancreatitis: a rare stroke mimic." BMJ Case Reports 13, no. 9 (2020): e232228. http://dx.doi.org/10.1136/bcr-2019-232228.
Full textLakhani, Leena. "PROTECTIVE COLORATION IN ANIMALS." International Journal of Research -GRANTHAALAYAH 2, no. 3SE (2014): 1–5. http://dx.doi.org/10.29121/granthaalayah.v2.i3se.2014.3515.
Full textLeena, Lakhani. "PROTECTIVE COLORATION IN ANIMALS." International Journal of Research - GRANTHAALAYAH Composition of Colours, December,2014 (2017): 1–5. https://doi.org/10.5281/zenodo.887485.
Full textReed, Andy, Laurence Dooley, and Soraya Kouadri Mostefaoui. "The Guardian Node Slow DoS Detection Model for Real-Time Application in IoT Networks." Sensors 24, no. 17 (2024): 5581. http://dx.doi.org/10.3390/s24175581.
Full textAlahmed, Shahad, Qutaiba Alasad, Jiann-Shiun Yuan, and Mohammed Alawad. "Impacting Robustness in Deep Learning-Based NIDS through Poisoning Attacks." Algorithms 17, no. 4 (2024): 155. http://dx.doi.org/10.3390/a17040155.
Full textHuang, Xinyu, Yunzhe Tian, Yifei He, et al. "Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence." Security and Communication Networks 2020 (December 9, 2020): 1–15. http://dx.doi.org/10.1155/2020/8889122.
Full textLee, JoonYoung, SungJin Yu, MyeongHyun Kim, YoungHo Park, SangWoo Lee, and BoHeung Chung. "Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing." Applied Sciences 10, no. 18 (2020): 6268. http://dx.doi.org/10.3390/app10186268.
Full textAlgarni, Fahad, and Saeed Ullah Jan. "A lightweight and secure protocol for teleworking environment." PLOS ONE 19, no. 3 (2024): e0298276. http://dx.doi.org/10.1371/journal.pone.0298276.
Full textDodoo, Herbert Cyril. "Deep Learning (DL) Oriented Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 321–28. http://dx.doi.org/10.22624/aims/crp-bk3-p51.
Full textLi, Shuiwang, Qijun Zhao, and Xiangdong Fei. "An Improved AM–FM-Based Approach for Reconstructing Fingerprints from Minutiae." International Journal of Image and Graphics 15, no. 01 (2015): 1550007. http://dx.doi.org/10.1142/s0219467815500072.
Full textSun, Da-Zhi, Yi-Na Gao, and Yangguang Tian. "On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices." Sensors 23, no. 14 (2023): 6559. http://dx.doi.org/10.3390/s23146559.
Full textProdeus, Maksym, Andrii Nicheporuk, and Antonina Kashtalian. "Honeypot-Based Information Monitoring, Detection, Response and Protection System." Central Ukrainian Scientific Bulletin. Technical Sciences 1, no. 11(42) (2025): 56–67. https://doi.org/10.32515/2664-262x.2025.11(42).1.56-67.
Full textAnnadurai, Soorya, and Bhargav J. Bhatkalkar. "Secure Multiparty Device Pairing Using Random Peephole Generations." Journal of Computational and Theoretical Nanoscience 17, no. 1 (2020): 216–21. http://dx.doi.org/10.1166/jctn.2020.8653.
Full textLEE, CHENG-CHI, CHUN-TA LI, and SHUN-DER CHEN. "TWO ATTACKS ON A TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS." Parallel Processing Letters 21, no. 01 (2011): 21–26. http://dx.doi.org/10.1142/s0129626411000047.
Full textDas, Sima, Nishi Gupta, and Neeraj Chawla. "Canaliculitis masquerading as Dacryocystitis: Rhinologist's Dilemma." An International Journal Clinical Rhinology 10, no. 2 (2017): 91–92. http://dx.doi.org/10.5005/jp-journals-10013-1315.
Full textRazo-Zapata, Iván S., Carlos Mex-Perera, and Raúl Monroy. "Masquerade attacks based on user's profile." Journal of Systems and Software 85, no. 11 (2012): 2640–51. http://dx.doi.org/10.1016/j.jss.2012.06.014.
Full textAshraf, Zeeshan, Adnan Sohail, and Muddesar Iqbal. "Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks." Cryptography 8, no. 4 (2024): 49. http://dx.doi.org/10.3390/cryptography8040049.
Full textNasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi." Basrah Researches Sciences 48, no. 2 (2022): 123–35. http://dx.doi.org/10.56714/bjrs.48.2.12.
Full textAl-janabi, Rana Jumaa Surayh. "Messenger Attack(Problems and Solutions)." Journal of Kufa for Mathematics and Computer 1, no. 2 (2010): 12–22. http://dx.doi.org/10.31642/jokmc/2018/010202.
Full textBarseghyan, Ghazaros, Yuyu Yuan, and Manawa Anakpa. "Model for Detection of Masquerade Attacks Based on Variable-Length Sequences." IEEE Access 8 (2020): 210140–57. http://dx.doi.org/10.1109/access.2020.3039166.
Full text