Journal articles on the topic 'Resource consumption attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Resource consumption attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gao, Minyan, Liton Kumar Biswas, Navid Asadi, and Domenic Forte. "Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource." Cryptography 8, no. 2 (2024): 13. http://dx.doi.org/10.3390/cryptography8020013.
Full textMoataz, H. Khalil, Azab Mohamed, Elsayed Ashraf, Sheta Walaa, Gabr Mahmoud, and S. Elmaghraby Adel. "MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS." International Journal of Computer Networks & Communications (IJCNC) 11, no. 6 (2019): 1–22. https://doi.org/10.5281/zenodo.3564217.
Full textPadmaja, K., and K. Padmaja. "Radial Basis Kernel Regressive Feature Extraction and Robert Ensembled Brown Boost Classifier for Attack Detection in Cloud Environment." Webology 18, no. 2 (2021): 41–59. http://dx.doi.org/10.14704/web/v18i2/web18306.
Full textKim, Sungbeen, and Dohoon Kim. "Securing the Cyber Resilience of a Blockchain-Based Railroad Non-Stop Customs Clearance System." Sensors 23, no. 6 (2023): 2914. http://dx.doi.org/10.3390/s23062914.
Full textZhang, Yanshuo, Liqiu Li, Hengyu Bao, Xiaohong Qin, Zhiyuan Zhang, and Xiaoyi Duan. "IAESR: IoT-oriented authenticated encryption based on iShadow round function." PeerJ Computer Science 11 (June 11, 2025): e2947. https://doi.org/10.7717/peerj-cs.2947.
Full textShruthi, R., and Z. Khan Prof.Rasheeda. "Preventing X-DoS attack on Cloud using Reputation-Based Technology." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 68–75. https://doi.org/10.5281/zenodo.581759.
Full textGarcia Ribera, Eric, Brian Martinez Alvarez, Charisma Samuel, Philokypros P. Ioulianou, and Vassilios G. Vassilakis. "An Intrusion Detection System for RPL-Based IoT Networks." Electronics 11, no. 23 (2022): 4041. http://dx.doi.org/10.3390/electronics11234041.
Full textWu, Hongyu, Xiaoning Feng, and Jiale Zhang. "Quantum Implementation of the SAND Algorithm and Its Quantum Resource Estimation for Brute-Force Attack." Entropy 26, no. 3 (2024): 216. http://dx.doi.org/10.3390/e26030216.
Full textKannan, Charulatha, Rajendiran Muthusamy, Vimala Srinivasan, Vivek Chidambaram, and Kiruthika Karunakaran. "Machine learning based detection of DDoS attacks in software defined network." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 3 (2023): 1503. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1503-1511.
Full textShi, Haibin, Guang Cheng, Ying Hu, Fuzhou Wang, and Haoxuan Ding. "RT-SAD: Real-Time Sketch-Based Adaptive DDoS Detection for ISP Network." Security and Communication Networks 2021 (July 27, 2021): 1–10. http://dx.doi.org/10.1155/2021/9409473.
Full textHwang, Min-Shiang, Jung-Wen Lo, and Chia-Hsin Liu. "Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack." Fundamenta Informaticae 61, no. 3-4 (2004): 389–98. https://doi.org/10.3233/fun-2004-613-412.
Full textLe, Duc, Minh Dao, and Quyen Nguyen. "Comparison of machine learning algorithms for DDoS attack detection in SDN." Information and Control Systems, no. 3 (June 15, 2020): 59–70. http://dx.doi.org/10.31799/1684-8853-2020-3-59-70.
Full textKumar Singh Yadav, Ajit, and Rajesh K. Yadav. "A Reliable and Secure AODV Protocol for MANETs." International Journal of Engineering & Technology 7, no. 4.38 (2018): 893. http://dx.doi.org/10.14419/ijet.v7i4.38.27603.
Full textAlani, Mohammed M., and Ernesto Damiani. "XRecon: An Explainbale IoT Reconnaissance Attack Detection System Based on Ensemble Learning." Sensors 23, no. 11 (2023): 5298. http://dx.doi.org/10.3390/s23115298.
Full textAbdelhaq, Maha. "A Study on the Vulnerability of AODV Routing Protocol to Resource Consumption Attack." Indian Journal of Science and Technology 5, no. 11 (2012): 1–5. http://dx.doi.org/10.17485/ijst/2012/v5i11.4.
Full textYaokumah, Winfred, Richard Nunoo Clottey, and Justice Kwame Appati. "Network Intrusion Detection in Internet of Things (IoT)." International Journal of Smart Security Technologies 8, no. 1 (2021): 49–65. http://dx.doi.org/10.4018/ijsst.2021010104.
Full textCao, Laicheng, and Min Zhu. "Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model." Sensors 22, no. 15 (2022): 5674. http://dx.doi.org/10.3390/s22155674.
Full textHajar, Dahhak, Nadia Afifi, and Imane Hilal. "Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience." Cryptography 9, no. 2 (2025): 22. https://doi.org/10.3390/cryptography9020022.
Full textAbdulkareem, Omar A., Raja Kumar Kontham, and Farhad E. Mahmood. "Collaborative Intrusion Detection System to Identify Joint Attacks in Routing Protocol for Low-Power and Lossy Networks Routing Protocol on the Internet of Everything." Mesopotamian Journal of CyberSecurity 4, no. 3 (2024): 251–77. https://doi.org/10.58496/mjcs/2024/026.
Full textNeve, Rahul P., and Rajesh Bansode. "Attack Analysis on Hybrid-SIMON-SPECKey Lightweight Cryptographic Algorithm for IoT Applications." Indian Journal Of Science And Technology 17, no. 10 (2024): 932–40. http://dx.doi.org/10.17485/ijst/v17i10.2811.
Full textOladipupo, Esau Taiwo, and Oluwakemi Christiana Abikoye. "Improved authenticated elliptic curve cryptography scheme for resource starve applications." Computer Science and Information Technologies 3, no. 3 (2022): 169–85. http://dx.doi.org/10.11591/csit.v3i3.p169-185.
Full textEsau Taiwo Oladipupo and Oluwakemi Christiana Abikoye. "Improved authenticated elliptic curve cryptography scheme for resource starve applications." Computer Science and Information Technologies 3, no. 3 (2022): 169–85. http://dx.doi.org/10.11591/csit.v3i3.pp169-185.
Full textEsau, Taiwo Oladipupo, and Christiana Abikoye Oluwakemi. "Improved authenticated elliptic curve cryptography scheme for resource starve applications." Computer Science and Information Technologies 3, no. 3 (2022): 169–85. https://doi.org/10.11591/csit.v3i3.pp169-185.
Full textHan, Seungjae, Keonyong Lee, Seongje Cho, and Moonju Park. "Anomaly Detection Based on Temporal Behavior Monitoring in Programmable Logic Controllers." Electronics 10, no. 10 (2021): 1218. http://dx.doi.org/10.3390/electronics10101218.
Full textAlcala’ Garrido, Hassel Aurora, Mario E. Rivero-Angeles, and Eleazar Aguirre Anaya. "Primary User Emulation in Cognitive Radio-Enabled WSNs for Structural Health Monitoring: Modeling and Attack Detection." Journal of Sensors 2019 (April 28, 2019): 1–14. http://dx.doi.org/10.1155/2019/6950534.
Full textPriya M R, Usha J. "A Study on DDoS Attack Detection Technique Prior to Machine Learning in Wireless Sensor Networks." Tuijin Jishu/Journal of Propulsion Technology 44, no. 5 (2023): 3698–721. http://dx.doi.org/10.52783/tjjpt.v44.i5.3458.
Full textTrikalinou, Anna, and Nikolaos Bourbakis. "An Enhanced Dynamic Information Flow Tracking Method with Reverse Stack Execution." International Journal of Monitoring and Surveillance Technologies Research 3, no. 1 (2015): 40–58. http://dx.doi.org/10.4018/ijmstr.2015010103.
Full textJain, Shaveta, and Kushagra Agrawal. "The Impact of Resource Consumption Attack on Signal-Stability based Adaptive Routing Protocol in Manet." Indian Journal of Science and Technology 10, no. 30 (2017): 1–5. http://dx.doi.org/10.17485/ijst/2017/v10i19/115535.
Full textJain, Shaveta, and Kushagra Agrawal. "The Impact of Resource Consumption Attack on Signal-Stability based Adaptive Routing Protocol in Manet." Indian Journal of Science and Technology 10, no. 30 (2017): 1–5. http://dx.doi.org/10.17485/ijst/2017/v10i30/115535.
Full textCho, Won, and Joonho Kong. "Memory and Cache Contention Denial-of-Service Attack in Mobile Edge Devices." Applied Sciences 11, no. 5 (2021): 2385. http://dx.doi.org/10.3390/app11052385.
Full textYan, Fei, Xiaoping Zhu, Zhou Zhou, and Yang Tang. "Heterogeneous multi-unmanned aerial vehicle task planning: Simultaneous attacks on targets using the Pythagorean hodograph curve." Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering 233, no. 13 (2019): 4735–49. http://dx.doi.org/10.1177/0954410019829368.
Full textNhu, Chien-Nguyen, and Minho Park. "Two-Phase Deep Learning-Based EDoS Detection System." Applied Sciences 11, no. 21 (2021): 10249. http://dx.doi.org/10.3390/app112110249.
Full textWu, Jianping, Jiahe Jin, and Chunming Wu. "Challenges and Countermeasures of Federated Learning Data Poisoning Attack Situation Prediction." Mathematics 12, no. 6 (2024): 901. http://dx.doi.org/10.3390/math12060901.
Full textIndrayati, Liestiana. "INVENTARISASI NEMATODA PARASIT PADA TANAMAN, HEWAN DAN MANUSIA." EnviroScienteae 13, no. 3 (2017): 195. http://dx.doi.org/10.20527/es.v13i3.4306.
Full textHoward, Brett R., Daniel Barrios-O’Neill, Mhairi E. Alexander, et al. "Functional responses of a cosmopolitan invader demonstrate intraspecific variability in consumer-resource dynamics." PeerJ 6 (September 28, 2018): e5634. http://dx.doi.org/10.7717/peerj.5634.
Full textRiaz, SK, and V. Srirammanoj. "Sufficient Authentication for Energy Consumption in Wireless Sensor Networks." TELKOMNIKA Indonesian Journal of Electrical Engineering 16, no. 2 (2015): 316. http://dx.doi.org/10.11591/tijee.v16i2.1619.
Full textDass, Ruby, Manikandan Narayanan, Gayathri Ananthakrishnan, et al. "A Cluster-Based Energy-Efficient Secure Optimal Path-Routing Protocol for Wireless Body-Area Sensor Networks." Sensors 23, no. 14 (2023): 6274. http://dx.doi.org/10.3390/s23146274.
Full textAlshdadi, Abdulrahman A., Abdulwahab Ali Almazroi, Nasir Ayub, Miltiadis D. Lytras, Eesa Alsolami, and Faisal S. Alsubaei. "Big Data-Driven Deep Learning Ensembler for DDoS Attack Detection." Future Internet 16, no. 12 (2024): 458. https://doi.org/10.3390/fi16120458.
Full textAlshammari, Majid, and Khaled Elleithy. "Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks." Sensors 18, no. 10 (2018): 3569. http://dx.doi.org/10.3390/s18103569.
Full textSukavasi, Hema Gopinath, Lokesh Kanagala, and Riaz Shaik. "Sufficient Authentication for Energy Consumption in Wireless Sensor Networks." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 2 (2016): 735. http://dx.doi.org/10.11591/ijece.v6i2.9038.
Full textSukavasi, Hema Gopinath, Lokesh Kanagala, and Riaz Shaik. "Sufficient Authentication for Energy Consumption in Wireless Sensor Networks." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 2 (2016): 735. http://dx.doi.org/10.11591/ijece.v6i2.pp735-742.
Full textDhananjay, Krithika, and Emre Salman. "Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher." Electronics 10, no. 12 (2021): 1438. http://dx.doi.org/10.3390/electronics10121438.
Full textZakiya Manzoor Khan, Et al. "Trust Based Mechanism for Isolation of Malicious Nodes in Internet of Things." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 1689–95. http://dx.doi.org/10.17762/ijritcc.v11i10.8740.
Full textZakiya Manzoor Khan, Et al. "Trust based Mechanism for Isolation of Malicious Nodes in Internet of Things." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 709–14. http://dx.doi.org/10.17762/ijritcc.v11i9.8863.
Full textRahul, P. Neve, and Bansode Rajesh. "Attack Analysis on Hybrid-SIMON-SPECKey Lightweight Cryptographic Algorithm for IoT Applications." Indian Journal of Science and Technology 17, no. 10 (2024): 932–40. https://doi.org/10.17485/IJST/v17i10.2811.
Full textJia, Hefei, Xu Liu, Xiaoqiang Di, et al. "A Secure Virtual Machine Allocation Strategy Against Co-Resident Attacks." Journal of Advanced Computational Intelligence and Intelligent Informatics 23, no. 5 (2019): 898–908. http://dx.doi.org/10.20965/jaciii.2019.p0898.
Full textIlokanuno, Ogochukwu A. "Smart Meter Tampering Detection Using IoT Based Unsupervised Machine Learning." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 5434–45. http://dx.doi.org/10.22214/ijraset.2024.61153.
Full textHoward, BR, DTS Wong, V. Aguiar, et al. "Effects of perceived competition and water temperature on the functional responses of invasive and native crabs." Marine Ecology Progress Series 684 (February 17, 2022): 69–78. http://dx.doi.org/10.3354/meps13974.
Full textZhang, Yuanyuan, Ning Wu, Fang Zhou, Jinbao Zhang, and Muhammad Yahya. "A Countermeasure against DPA on SIMON with an Area-Efficient Structure." Electronics 8, no. 2 (2019): 240. http://dx.doi.org/10.3390/electronics8020240.
Full textGankotiya, Anil Kumar, Vishal Kumar, and Kunwar Singh Vaisla. "Cross-layer DDoS attack detection in wireless mesh networks using deep learning algorithm." Journal of Electrical Engineering 76, no. 1 (2025): 34–47. https://doi.org/10.2478/jee-2025-0004.
Full text