Literatura académica sobre el tema "Byzantines Attack"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Byzantines Attack".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Byzantines Attack"
Böhm, Marcin. "Constantine X Doukas (1059–1067) versus Uzes – about the Nomads on Boats on the Danube in 1064". Studia Ceranea 11 (30 de diciembre de 2021): 39–49. http://dx.doi.org/10.18778/2084-140x.11.02.
Texto completoVeselinović, Ivana. "The role of the despotess Irene Kantakouzene in the political life of the Serbian Despotate". Zbornik radova Filozofskog fakulteta u Pristini 52, n.º 2 (2022): 177–90. http://dx.doi.org/10.5937/zrffp52-36443.
Texto completoYang, Xiong, Wang y Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks". Sensors 19, n.º 15 (5 de agosto de 2019): 3436. http://dx.doi.org/10.3390/s19153436.
Texto completoWang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long y Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median". Electronics 12, n.º 5 (1 de marzo de 2023): 1190. http://dx.doi.org/10.3390/electronics12051190.
Texto completoSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama y Khaled Mahmoud Badran. "CSMCSM". International Journal of Information Security and Privacy 15, n.º 1 (enero de 2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Texto completoWang, Jingyao, Xingming Deng, Jinghua Guo y Zeqin Zeng. "Resilient Consensus Control for Multi-Agent Systems: A Comparative Survey". Sensors 23, n.º 6 (7 de marzo de 2023): 2904. http://dx.doi.org/10.3390/s23062904.
Texto completoAmir, Y., B. Coan, J. Kirsch y J. Lane. "Prime: Byzantine Replication under Attack". IEEE Transactions on Dependable and Secure Computing 8, n.º 4 (julio de 2011): 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.
Texto completoWan, Fangyi, Ting Ma, Yi Hua, Bin Liao y Xinlin Qing. "Secure distributed estimation under Byzantine attack and manipulation attack". Engineering Applications of Artificial Intelligence 116 (noviembre de 2022): 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.
Texto completoABORISADE, D. O., A. S. SODIYA, A. A. ODUMOSU, O. Y. ALOWOSILE y A. A. ADEDEJI. "A SURVIVABLE DISTRIBUTED DATABASE AGAINST BYZANTINE FAILURE". Journal of Natural Sciences Engineering and Technology 15, n.º 2 (22 de noviembre de 2017): 61–72. http://dx.doi.org/10.51406/jnset.v15i2.1684.
Texto completoMakani, Ruchi y Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks". International Journal of Sensors, Wireless Communications and Control 10, n.º 1 (7 de febrero de 2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.
Texto completoTesis sobre el tema "Byzantines Attack"
Sironen, Erkki. "The late Roman and early Byzantine inscriptions of Athens and Attica : an edition with appendices on scripts, sepulchral formulae and occupations /". Helsinki : Hakapaino Oy, 1997. http://bibpurl.oclc.org/web/25751.
Texto completoAlam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks". Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.
Texto completoKALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks". Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.
Texto completoTzavella, Elissavet. "Urban and rural landscape in early and middle Byzantine Attica (4th-12th c. AD)". Thesis, University of Birmingham, 2013. http://etheses.bham.ac.uk//id/eprint/4321/.
Texto completoWang, Qianlong. "Blockchain-Empowered Secure Machine Learning and Applications". Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1625183576139299.
Texto completoHan, Kai. "Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy Systems". Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/26917.
Texto completoPh. D.
Chen, Ho-Chun y 陳和均. "The Study of Byzantine Attack in Large Scale Wireless Sensor Networks". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/n2y87u.
Texto completo國立臺灣大學
電信工程學研究所
106
In this thesis, we study the problem of Byzantine attacks in large scale wireless sensor networks (WSNs). WSN is a critical technology in the future Internet of Things era, supporting various applications such as smart home, environmental monitoring, Internet of vehicles, etc. A WSN generally consists of some sensors and a fusion center (FC). Each sensor makes an observation about a phenomenon of interest, and transmits local message to the FC, who then makes a final decision based on those messages. Due to the exposed nature of the sensors and the characteristics of wireless channel, WSN is prone to be attacked and faulty. One of the attacks against WSN is called the Byzantine attack, which the attacker compromises some sensors and sends falsified messages to the FC. Unlike channel errors caused by noise or interference, Byzantine attack is targeted and may be more harmful to the system. It''s thus an important and challenging goal to design a robust system that is immune to the attack, and this is the purpose of our research. The effect of Byzantine attack has been studied a lot in recent years, however, many works formulate it as a simple hypothesis testing problem by assuming each sensor being independently compromised with probability alpha_t, where alpha_t is the fraction of Byzantine sensors. We call this model the i.i.d. mixture model since the local messages are i.i.d. to a mixture distribution. It''s easy to obtain the optimal error exponent in this problem formulation, however, we are not satisfied with the model since in practice it''s unlikely an attacker randomly attack the sensors each time. To fix this assumption, we introduce a parameter that indicates the indices of compromised sensors and formulate the Byzantine attack as a composite hypothesis testing problem. Using the idea of Hoeffding test in conventional composite hypothesis testing, we propose a "Hoeffding-type test''. The Hoeffding-type test depends only on the type of local messages, and achieves an error exponent which is the same as the optimal exponent in i.i.d. mixture model. We also show that it''s easy to generalize the Hoeffding-type test so that it becomes universal over all possible attack distributions. Since Hoeffding-type test only uses the type information, we further propose an "Order-aware Hoeffding-type test''. In the order-aware test, we perform joint detection of the indices parameter and the underlying hypothesis by brute-force search. Although the order-aware test seems to be using more information than the Hoeffding-type test, we show that they are equivalent in the asymptotic regime. The proposed detect algorithms can be applied in two kinds of defense scheme: 1. Direct Detect: FC has no information on the identities of Byzantine sensors and performs detection with all local messages 2. Clustering and Detect: FC will first identifies the Byzantines and clusters the sensors into two groups through some side information. For each group, independent detection is performed then results from both groups are combined using 0-AND rule. We show that the Clustering Detect scheme performs better than Direct Detect scheme, and FC can''t be blinded unless all sensors are compromised. Finally, some numerical results are presented to compare the two defense scheme.
(9154928), Aritra Mitra. "New Approaches to Distributed State Estimation, Inference and Learning with Extensions to Byzantine-Resilience". Thesis, 2020.
Buscar texto completoTseng, Yi-Ying y 曾奕穎. "Countering Byzantine Attacks in a Network with Random Linear Network Coding". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/88fyjp.
Texto completo國立東華大學
電機工程學系
100
Network coding is an elegant technique where, instead of simply relaying the packets of information they receive, the nodes of a network are allowed to combine \emph{several} packets together for transmission and this technique can be used to achieve the maximum possible information flow in a network. Recent implementations of network coding for wired and wireless environments have demonstrated its practical benefits, especially in multicast communication. Because communication in wireless environment is essentially multicast, network coding has highly attracted research attention in this field. Due to that one transmitting information is actually combination of multiple other information , network coding has variety of applications such as P2P, redundant data storage, switch and etc. However, this special characteristic also exposes network coding systems to a wide range of error attacks, especially Byzantine attacks. When some adversary nodes generate error data in the network with network coding, those erroneous information will be mixed at intermeidate nodes and thus corrupt all the information reaching a destination. In short, network coding will propagate errors. Recent research has shown that network coding can be combined with classical cryptography for secure communication, such as using concept of ECC (error correcting code) to perform end-to-end error correction or misbehavaior detection. Nevertheless, when it comes to Byzantine attacks, these results have limited effect. In fact, unless we find out those adversary nodes and isolate them, network coding may perform much worse than pure routing in the presence of malicious nodes. Our research develops a distributed hierarchical algorithm based on random linear network coding to locate malicious nodes.
Cheng, Sheng-Hong y 鄭勝鴻. "Defense and Detection of Sybil Attack Using Byzantine Agreement Algorithm in Mobile Ad Hoc Network". Thesis, 2018. http://ndltd.ncl.edu.tw/handle/24pgmr.
Texto completo淡江大學
資訊工程學系碩士班
106
The topology of mobile ad hoc networks (MANET) is dynamic, can be quickly configured, and lacks features such as wireless APs and adapters. Due to these benefits, a MANET system is able to be applied to specific situations, such as search and rescue operations, military use or emergency operations. Based on the routing protocol, node connections provide information to each other and can jointly establish a complete transmission path independently. But security is a major issue in MANET systems. Because MANET system are open and perform on a non-centralized infrastructure, they lacks security considerations in routing protocols, which make MANET systems more difficult to secure than wired networks. Attacks are easily exploited by its weaknesses. In this study, we conducted further research on the most common Sybil Attack of MANET systems. The common Sybil attack may cause packet flow redirection and other extended effects. We used the simulation environment NS-3 Project to create a consensus-based practical Byzantine Fault Tolerance algorithm to explore solutions to the Sybil attack''s threat to free mobile networks. Ensuring that all the original network nodes that are vulnerable to tampering are protected can ensure the integrity of the data during transmission. We must demonstrate in the simulation experiment that this method can have an ideal performance in both network and security performance. The goal is to ensure that the general network has the security of the network form under the infrastructure without being compromised.
Libros sobre el tema "Byzantines Attack"
Capítulos de libros sobre el tema "Byzantines Attack"
Hancock, James F. "Spice trade in the dark ages of Europe." En Spices, scents and silk: catalysts of world trade, 146–56. Wallingford: CABI, 2021. http://dx.doi.org/10.1079/9781789249743.0012.
Texto completoFiat, Amos, Jared Saia y Maxwell Young. "Making Chord Robust to Byzantine Attacks". En Algorithms – ESA 2005, 803–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11561071_71.
Texto completoPooja, A. Saraswathi, Rampa Theresa, Satya Govind y Anuja Aloy Mary. "Detection of Byzantine Attack in Cognitive Radio Network". En Advances in Intelligent Systems and Computing, 459–68. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5029-4_37.
Texto completoHe, Xiaofan y Huaiyu Dai. "Case Study II: HMM-Based Byzantine Attack Detection". En SpringerBriefs in Electrical and Computer Engineering, 51–62. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_5.
Texto completoHe, Xiaofan y Huaiyu Dai. "Case Study III: CFC-Based Byzantine Attack Detection". En SpringerBriefs in Electrical and Computer Engineering, 63–72. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_6.
Texto completoZhang, Linyuan, Guoru Ding y Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion". En Encyclopedia of Wireless Networks, 147–50. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_301.
Texto completoZhang, Linyuan, Guoru Ding y Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion". En Encyclopedia of Wireless Networks, 1–4. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_301-1.
Texto completoAbrardo, Andrea, Mauro Barni, Kassem Kallas y Benedetta Tondi. "Security Attacks and Defenses in Distributed Sensor Networks". En Information Fusion in Distributed Sensor Networks with Byzantines, 29–43. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-32-9001-3_3.
Texto completoBing, Yuchen, Long Wang y Zesheng Chen. "A Spectrum Sensing Method for UAV Swarms Under Byzantine Attack". En Proceedings of 2021 International Conference on Autonomous Unmanned Systems (ICAUS 2021), 1748–58. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9492-9_172.
Texto completoSingla, Gagan y Pallavi Kaliyar. "A Secure Routing Protocol for MANETs Against Byzantine Attacks". En Lecture Notes in Electrical Engineering, 571–78. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-6154-8_56.
Texto completoActas de conferencias sobre el tema "Byzantines Attack"
Stanev, Kamen. "THE FIFTH SLAVIC SIEGE OF THESSALONIKI". En THE PATH OF CYRIL AND METHODIUS – SPATIAL AND CULTURAL HISTORICAL DIMENSIONS. Cyrillo-Methodian Research Centre – Bulgarian Academy of Sciences, 2023. http://dx.doi.org/10.59076/2815-3855.2023.33.16.
Texto completoAmir, Yair, Brian Coan, Jonathan Kirsch y John Lane. "Byzantine replication under attack". En 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). IEEE, 2008. http://dx.doi.org/10.1109/dsn.2008.4630088.
Texto completoSun, Ziteng, Chuang Zhang y Pingyi Fan. "Optimal Byzantine Attack and Byzantine Identification in Distributed Sensor Networks". En 2016 IEEE Globecom Workshops (GC Wkshps). IEEE, 2016. http://dx.doi.org/10.1109/glocomw.2016.7848991.
Texto completoWan, Wei, Shengshan Hu, jianrong Lu, Leo Yu Zhang, Hai Jin y Yuanyuan He. "Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection". En Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/106.
Texto completoXia, Qi, Zeyi Tao, Zijiang Hao y Qun Li. "FABA: An Algorithm for Fast Aggregation against Byzantine Attacks in Distributed Neural Networks". En Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/670.
Texto completoJi, Jinlong, Xuhui Chen, Qianlong Wang, Lixing Yu y Pan Li. "Learning to Learn Gradient Aggregation by Gradient Descent". En Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/363.
Texto completoZhu, Heng y Qing Ling. "Bridging Differential Privacy and Byzantine-Robustness via Model Aggregation". En Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/337.
Texto completoDeng, Gelei, Yuan Zhou, Yuan Xu, Tianwei Zhang y Yang Liu. "An Investigation of Byzantine Threats in Multi-Robot Systems". En RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3471621.3471867.
Texto completoXiao, Guomei, Bo Mi, Darong Huang, Yang Liu, Yang Li y Yuan Weng. "Anonymous Voting System Against Byzantine Attacks". En 2021 CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes (SAFEPROCESS). IEEE, 2021. http://dx.doi.org/10.1109/safeprocess52771.2021.9693543.
Texto completoGouissem, A., K. Abualsaud, E. Yaacoub, T. Khattab y M. Guizani. "Federated Learning Stability Under Byzantine Attacks". En 2022 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2022. http://dx.doi.org/10.1109/wcnc51071.2022.9771594.
Texto completo