Artículos de revistas sobre el tema "Attack Path"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Attack Path".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi, and A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing." E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Texto completoLi, Erxia, Chaoqun Kang, Deyu Huang, et al. "Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees." Information 10, no. 8 (2019): 251. http://dx.doi.org/10.3390/info10080251.
Texto completoHuang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 3 (2023): 1–30. http://dx.doi.org/10.1145/3626789.
Texto completoHuang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." ACM SIGMETRICS Performance Evaluation Review 52, no. 1 (2024): 51–52. http://dx.doi.org/10.1145/3673660.3655075.
Texto completoLi, Xinzhan, Yang Zhou, Xin Li, Lijuan Xu, and Dawei Zhao. "Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm." Mathematics 10, no. 21 (2022): 3938. http://dx.doi.org/10.3390/math10213938.
Texto completoLevner, Eugene, and Dmitry Tsadikovich. "Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes." Algorithms 17, no. 11 (2024): 504. http://dx.doi.org/10.3390/a17110504.
Texto completoBhavani, Y., V. Janaki, and R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback." Oriental journal of computer science and technology 10, no. 2 (2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.
Texto completoGuo, Wei, Zhi Zhang, Liyuan Chang, Yue Song, and Liuguo Yin. "A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid." Drones 8, no. 9 (2024): 437. http://dx.doi.org/10.3390/drones8090437.
Texto completoBhavani, Yerram, Vinjamuri Janaki, and Rangu Sridevi. "IP Traceback using Flow Based Classification." Recent Advances in Computer Science and Communications 13, no. 3 (2020): 482–90. http://dx.doi.org/10.2174/2213275912666190328200635.
Texto completoHu, Jian, Zhenhong Zhang, Feilu Hang, and Linjiang Xie. "Design of 0-day Vulnerability Monitoring and Defense Architecture based on Artificial Intelligence Technology." Scalable Computing: Practice and Experience 25, no. 5 (2024): 3491–99. http://dx.doi.org/10.12694/scpe.v25i5.3035.
Texto completoAl-Araji, Zaid J., Sharifah Sakinah Syed Ahmad, and Raihana Syahirah Abdullah. "Attack Prediction to Enhance Attack Path Discovery Using Improved Attack Graph." Karbala International Journal of Modern Science 8, no. 3 (2022): 313–29. http://dx.doi.org/10.33640/2405-609x.3235.
Texto completoAbujassar, Radwan, Mohamed Sayed, and Husam Yaseen. "A new algorithm to enhance security against cyber threats for internet of things application." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4452. http://dx.doi.org/10.11591/ijece.v13i4.pp4452-4466.
Texto completoRadwan, S. Abujassar, Sayed Mohamed, and Yaseen Husam. "A new algorithm to enhance security against cyber threats for internet of things application." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4452–66. https://doi.org/10.11591/ijece.v13i4.pp4452-4466.
Texto completoWu, Runze, Jinxin Gong, Weiyue Tong, and Bing Fan. "Network Attack Path Selection and Evaluation Based on Q-Learning." Applied Sciences 11, no. 1 (2020): 285. http://dx.doi.org/10.3390/app11010285.
Texto completoV, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.
Texto completoAlArnaout, Zakwan, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly, and Ahmed Shdefat. "RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks." Sensors 23, no. 1 (2022): 102. http://dx.doi.org/10.3390/s23010102.
Texto completoInternational, Journal on AdHoc Networking Systems (IJANS). "Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc Networks." International Journal on AdHoc Networking Systems (IJANS) 2, no. 4 (2024): 77–87. https://doi.org/10.5121/ijans.2012.2408.
Texto completoUpendra, Kumar Purohit, Barahdiya Umesh, and Jakhenia Manoj. "DETECTION MECHANISM OF WORMHOLE ATTACK USING ON DEMAND ROUTING SCHEME IN WIRELESS ENVIRONMENT." International Journal of Engineering Research and Modern Education 2, no. 1 (2017): 48–52. https://doi.org/10.5281/zenodo.400746.
Texto completoAn, Hyok, Yoonjong Na, Heejo Lee, and Adrian Perrig. "Resilience Evaluation of Multi-Path Routing against Network Attacks and Failures." Electronics 10, no. 11 (2021): 1240. http://dx.doi.org/10.3390/electronics10111240.
Texto completoRen, Yuchen, Zhengyu Zhao, Chenhao Lin, et al. "Improving Integrated Gradient-based Transferable Adversarial Examples by Refining the Integration Path." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 7 (2025): 6731–39. https://doi.org/10.1609/aaai.v39i7.32722.
Texto completoKoo, Kijong, Daesung Moon, Jun-Ho Huh, Se-Hoon Jung, and Hansung Lee. "Attack Graph Generation with Machine Learning for Network Security." Electronics 11, no. 9 (2022): 1332. http://dx.doi.org/10.3390/electronics11091332.
Texto completoQiu, Shenjian, Zhipeng Shao, Jian Wang, Shiyou Xu, and Jiaxuan Fei. "Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge." Applied Sciences 14, no. 14 (2024): 6189. http://dx.doi.org/10.3390/app14146189.
Texto completoPanda, Niranjan, and Binod Kumar Pattanayak. "Defense Against Co-Operative Black-hole Attack and Gray-hole Attack in MANET." International Journal of Engineering & Technology 7, no. 3.4 (2018): 84. http://dx.doi.org/10.14419/ijet.v7i3.4.16752.
Texto completoDr, V.C Kotak*1 &. Nivedeeta Banerjee2. "CRYPTOGRAPHIC APPROACH TO ELIMINATE BLACK HOLE ATTACK IN MANET." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 8 (2017): 344–47. https://doi.org/10.5281/zenodo.845302.
Texto completoHsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai, and Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning." Sustainability 13, no. 22 (2021): 12514. http://dx.doi.org/10.3390/su132212514.
Texto completoKasturi, Santanam, Xiaolong Li, Peng Li, and John Pickard. "Predicting Attack Paths from Application Security Vulnerabilities Using a Multi-Layer Perceptron." American Journal of Software Engineering and Applications 12, no. 1 (2024): 23–35. http://dx.doi.org/10.11648/j.ajsea.20241201.14.
Texto completoZhang, Shuqin, Peiyu Shi, Tianhui Du, Xinyu Su, and Yunfei Han. "Threat Attribution and Reasoning for Industrial Control System Asset." International Journal of Ambient Computing and Intelligence 15, no. 1 (2023): 1–27. http://dx.doi.org/10.4018/ijaci.333853.
Texto completoWan, Gerry, Aaron Johnson, Ryan Wails, Sameer Wagh, and Prateek Mittal. "Guard Placement Attacks on Path Selection Algorithms for Tor." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (2019): 272–91. http://dx.doi.org/10.2478/popets-2019-0069.
Texto completoLiao, Yan. "Enhancing Industrial Control Network Security Through Vulnerability Detection and Attack Graph Analysis." Scalable Computing: Practice and Experience 25, no. 1 (2024): 65–74. http://dx.doi.org/10.12694/scpe.v25i1.2254.
Texto completoHe, Jiaji, Haocheng Ma, Kaiyue Song, and Yiqiang Zhao. "An Enhanced Logic Encryption Method with a Fully Correlated Key Interdependency Block." Electronics 8, no. 12 (2019): 1392. http://dx.doi.org/10.3390/electronics8121392.
Texto completoChaves, Cesar, Siavoosh Azad, Thomas Hollstein, and Johanna Sepúlveda. "DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures." Journal of Low Power Electronics and Applications 9, no. 1 (2019): 7. http://dx.doi.org/10.3390/jlpea9010007.
Texto completoYi, Junkai, and Xiaoyan Liu. "Deep Reinforcement Learning for Intelligent Penetration Testing Path Design." Applied Sciences 13, no. 16 (2023): 9467. http://dx.doi.org/10.3390/app13169467.
Texto completoShen, Limin, Hui Li, Hongyi Wang, and Yihuan Wang. "Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications." Mobile Information Systems 2020 (June 5, 2020): 1–16. http://dx.doi.org/10.1155/2020/3407437.
Texto completoKhlobystova, A. O., M. V. Abramov, A. L. Tulupyev, and A. A. Zolotin. "Search for the shortest trajectory of a social engeneering attack between a pair of users in a graph with transition probabilities." Information and Control Systems, no. 6 (December 18, 2018): 74–81. http://dx.doi.org/10.31799/1684-8853-2018-6-74-81.
Texto completoZhang, Xiaojian, Qi Wang, Xiangqun Wang, and Run Zhang. "Attack path analysis of power monitoring system based on attack graph." IOP Conference Series: Earth and Environmental Science 645 (January 26, 2021): 012064. http://dx.doi.org/10.1088/1755-1315/645/1/012064.
Texto completoZhang, Yan, Yong Wang, Yihua Hu, et al. "Security Performance Analysis of LEO Satellite Constellation Networks under DDoS Attack." Sensors 22, no. 19 (2022): 7286. http://dx.doi.org/10.3390/s22197286.
Texto completoYang, Jinwei, and Yu Yang. "Optimal Security Protection Selection Strategy Based on Markov Model Attack Graph." Journal of Physics: Conference Series 2132, no. 1 (2021): 012020. http://dx.doi.org/10.1088/1742-6596/2132/1/012020.
Texto completoLi, Yanna. "The Cyber Attack in the Use of Force." Lecture Notes in Education Psychology and Public Media 69, no. 1 (2024): 122–30. http://dx.doi.org/10.54254/2753-7048/69/20240165.
Texto completoBraimah, Joseph Odunayo, Tendai Makoni, and Fabio Mathias Correa. "Predicting the Path of Insurgency: Data-Driven Strategies to Counter Boko Haram in Nigeria." F1000Research 13 (September 2, 2024): 989. http://dx.doi.org/10.12688/f1000research.153978.1.
Texto completoChandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.
Texto completoYang, Rong, Fang Ming Huang, and Hua Jun Gong. "Best Attack Position Model for BVR Multi-Target Air Combat." Advanced Materials Research 1016 (August 2014): 511–15. http://dx.doi.org/10.4028/www.scientific.net/amr.1016.511.
Texto completoChen, Yun, Kun Lv, and Changzhen Hu. "A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments." Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/2058429.
Texto completoLi, Xiaohong, Ran Liu, Zhiyong Feng, and Ke He. "Threat modeling-oriented attack path evaluating algorithm." Transactions of Tianjin University 15, no. 3 (2009): 162–67. http://dx.doi.org/10.1007/s12209-009-0029-y.
Texto completoVitali, Maycon. "Web Cache Deception Attack." H2HC Magazine, no. 16 (October 22, 2022): 34–40. http://dx.doi.org/10.47986/16/2.
Texto completoWang, Weizhe, Pierrick Méaux, and Deng Tang. "Shortcut2Secrets: A Table-based Differential Fault Attack Framework." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 2 (2025): 385–419. https://doi.org/10.46586/tches.v2025.i2.385-419.
Texto completoAl-janabi, Rana Jumaa Surayh. "Messenger Attack(Problems and Solutions)." Journal of Kufa for Mathematics and Computer 1, no. 2 (2010): 12–22. http://dx.doi.org/10.31642/jokmc/2018/010202.
Texto completoGuo, Mingyu, Jialiang Li, Aneta Neumann, Frank Neumann, and Hung Nguyen. "Practical Fixed-Parameter Algorithms for Defending Active Directory Style Attack Graphs." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 9 (2022): 9360–67. http://dx.doi.org/10.1609/aaai.v36i9.21167.
Texto completoHarmeet Singh, Er, and Dr Vijay Dhir. "A Novel Hybrid and Secure Clustering Black hole Attacks Mitigation Technique in Wireless LAN." International Journal of Engineering & Technology 7, no. 4.7 (2018): 389. http://dx.doi.org/10.14419/ijet.v7i4.7.23035.
Texto completoLin, Hsiao-Chung, Ping Wang, Wen-Hui Lin, and Yu-Hsiang Huang. "A Multiple-Swarm Particle Swarm Optimisation Scheme for Tracing Packets Back to the Attack Sources of Botnet." Applied Sciences 11, no. 3 (2021): 1139. http://dx.doi.org/10.3390/app11031139.
Texto completoElavarasan, R., K. Chitra, and Amsalu Gosu Adigo. "Enhanced Lion Optimization with Efficient Path Routing Equalization Technique against DoS Attack in Wireless Sensor Network." Wireless Communications and Mobile Computing 2022 (June 14, 2022): 1–9. http://dx.doi.org/10.1155/2022/3321870.
Texto completo