Littérature scientifique sur le sujet « Byzantines Attack »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Byzantines Attack ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Byzantines Attack"
Böhm, Marcin. « Constantine X Doukas (1059–1067) versus Uzes – about the Nomads on Boats on the Danube in 1064 ». Studia Ceranea 11 (30 décembre 2021) : 39–49. http://dx.doi.org/10.18778/2084-140x.11.02.
Texte intégralVeselinović, Ivana. « The role of the despotess Irene Kantakouzene in the political life of the Serbian Despotate ». Zbornik radova Filozofskog fakulteta u Pristini 52, no 2 (2022) : 177–90. http://dx.doi.org/10.5937/zrffp52-36443.
Texte intégralYang, Xiong, Wang et Zhang. « Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks ». Sensors 19, no 15 (5 août 2019) : 3436. http://dx.doi.org/10.3390/s19153436.
Texte intégralWang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long et Xiaowen Liu. « WGM-dSAGA : Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median ». Electronics 12, no 5 (1 mars 2023) : 1190. http://dx.doi.org/10.3390/electronics12051190.
Texte intégralSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama et Khaled Mahmoud Badran. « CSMCSM ». International Journal of Information Security and Privacy 15, no 1 (janvier 2021) : 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Texte intégralWang, Jingyao, Xingming Deng, Jinghua Guo et Zeqin Zeng. « Resilient Consensus Control for Multi-Agent Systems : A Comparative Survey ». Sensors 23, no 6 (7 mars 2023) : 2904. http://dx.doi.org/10.3390/s23062904.
Texte intégralAmir, Y., B. Coan, J. Kirsch et J. Lane. « Prime : Byzantine Replication under Attack ». IEEE Transactions on Dependable and Secure Computing 8, no 4 (juillet 2011) : 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.
Texte intégralWan, Fangyi, Ting Ma, Yi Hua, Bin Liao et Xinlin Qing. « Secure distributed estimation under Byzantine attack and manipulation attack ». Engineering Applications of Artificial Intelligence 116 (novembre 2022) : 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.
Texte intégralABORISADE, D. O., A. S. SODIYA, A. A. ODUMOSU, O. Y. ALOWOSILE et A. A. ADEDEJI. « A SURVIVABLE DISTRIBUTED DATABASE AGAINST BYZANTINE FAILURE ». Journal of Natural Sciences Engineering and Technology 15, no 2 (22 novembre 2017) : 61–72. http://dx.doi.org/10.51406/jnset.v15i2.1684.
Texte intégralMakani, Ruchi, et Busi V. Ramana Reddy. « Performance Evaluation of Cognitive Internet on Things Under Routing Attacks ». International Journal of Sensors, Wireless Communications and Control 10, no 1 (7 février 2020) : 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.
Texte intégralThèses sur le sujet "Byzantines Attack"
Sironen, Erkki. « The late Roman and early Byzantine inscriptions of Athens and Attica : an edition with appendices on scripts, sepulchral formulae and occupations / ». Helsinki : Hakapaino Oy, 1997. http://bibpurl.oclc.org/web/25751.
Texte intégralAlam, Mohammad Rafiqul. « Detecting wormhole and Byzantine attacks in mobile ad hoc networks ». Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.
Texte intégralKALLAS, KASSEM. « A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks ». Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.
Texte intégralTzavella, Elissavet. « Urban and rural landscape in early and middle Byzantine Attica (4th-12th c. AD) ». Thesis, University of Birmingham, 2013. http://etheses.bham.ac.uk//id/eprint/4321/.
Texte intégralWang, Qianlong. « Blockchain-Empowered Secure Machine Learning and Applications ». Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1625183576139299.
Texte intégralHan, Kai. « Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy Systems ». Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/26917.
Texte intégralPh. D.
Chen, Ho-Chun, et 陳和均. « The Study of Byzantine Attack in Large Scale Wireless Sensor Networks ». Thesis, 2017. http://ndltd.ncl.edu.tw/handle/n2y87u.
Texte intégral國立臺灣大學
電信工程學研究所
106
In this thesis, we study the problem of Byzantine attacks in large scale wireless sensor networks (WSNs). WSN is a critical technology in the future Internet of Things era, supporting various applications such as smart home, environmental monitoring, Internet of vehicles, etc. A WSN generally consists of some sensors and a fusion center (FC). Each sensor makes an observation about a phenomenon of interest, and transmits local message to the FC, who then makes a final decision based on those messages. Due to the exposed nature of the sensors and the characteristics of wireless channel, WSN is prone to be attacked and faulty. One of the attacks against WSN is called the Byzantine attack, which the attacker compromises some sensors and sends falsified messages to the FC. Unlike channel errors caused by noise or interference, Byzantine attack is targeted and may be more harmful to the system. It''s thus an important and challenging goal to design a robust system that is immune to the attack, and this is the purpose of our research. The effect of Byzantine attack has been studied a lot in recent years, however, many works formulate it as a simple hypothesis testing problem by assuming each sensor being independently compromised with probability alpha_t, where alpha_t is the fraction of Byzantine sensors. We call this model the i.i.d. mixture model since the local messages are i.i.d. to a mixture distribution. It''s easy to obtain the optimal error exponent in this problem formulation, however, we are not satisfied with the model since in practice it''s unlikely an attacker randomly attack the sensors each time. To fix this assumption, we introduce a parameter that indicates the indices of compromised sensors and formulate the Byzantine attack as a composite hypothesis testing problem. Using the idea of Hoeffding test in conventional composite hypothesis testing, we propose a "Hoeffding-type test''. The Hoeffding-type test depends only on the type of local messages, and achieves an error exponent which is the same as the optimal exponent in i.i.d. mixture model. We also show that it''s easy to generalize the Hoeffding-type test so that it becomes universal over all possible attack distributions. Since Hoeffding-type test only uses the type information, we further propose an "Order-aware Hoeffding-type test''. In the order-aware test, we perform joint detection of the indices parameter and the underlying hypothesis by brute-force search. Although the order-aware test seems to be using more information than the Hoeffding-type test, we show that they are equivalent in the asymptotic regime. The proposed detect algorithms can be applied in two kinds of defense scheme: 1. Direct Detect: FC has no information on the identities of Byzantine sensors and performs detection with all local messages 2. Clustering and Detect: FC will first identifies the Byzantines and clusters the sensors into two groups through some side information. For each group, independent detection is performed then results from both groups are combined using 0-AND rule. We show that the Clustering Detect scheme performs better than Direct Detect scheme, and FC can''t be blinded unless all sensors are compromised. Finally, some numerical results are presented to compare the two defense scheme.
(9154928), Aritra Mitra. « New Approaches to Distributed State Estimation, Inference and Learning with Extensions to Byzantine-Resilience ». Thesis, 2020.
Trouver le texte intégralTseng, Yi-Ying, et 曾奕穎. « Countering Byzantine Attacks in a Network with Random Linear Network Coding ». Thesis, 2012. http://ndltd.ncl.edu.tw/handle/88fyjp.
Texte intégral國立東華大學
電機工程學系
100
Network coding is an elegant technique where, instead of simply relaying the packets of information they receive, the nodes of a network are allowed to combine \emph{several} packets together for transmission and this technique can be used to achieve the maximum possible information flow in a network. Recent implementations of network coding for wired and wireless environments have demonstrated its practical benefits, especially in multicast communication. Because communication in wireless environment is essentially multicast, network coding has highly attracted research attention in this field. Due to that one transmitting information is actually combination of multiple other information , network coding has variety of applications such as P2P, redundant data storage, switch and etc. However, this special characteristic also exposes network coding systems to a wide range of error attacks, especially Byzantine attacks. When some adversary nodes generate error data in the network with network coding, those erroneous information will be mixed at intermeidate nodes and thus corrupt all the information reaching a destination. In short, network coding will propagate errors. Recent research has shown that network coding can be combined with classical cryptography for secure communication, such as using concept of ECC (error correcting code) to perform end-to-end error correction or misbehavaior detection. Nevertheless, when it comes to Byzantine attacks, these results have limited effect. In fact, unless we find out those adversary nodes and isolate them, network coding may perform much worse than pure routing in the presence of malicious nodes. Our research develops a distributed hierarchical algorithm based on random linear network coding to locate malicious nodes.
Cheng, Sheng-Hong, et 鄭勝鴻. « Defense and Detection of Sybil Attack Using Byzantine Agreement Algorithm in Mobile Ad Hoc Network ». Thesis, 2018. http://ndltd.ncl.edu.tw/handle/24pgmr.
Texte intégral淡江大學
資訊工程學系碩士班
106
The topology of mobile ad hoc networks (MANET) is dynamic, can be quickly configured, and lacks features such as wireless APs and adapters. Due to these benefits, a MANET system is able to be applied to specific situations, such as search and rescue operations, military use or emergency operations. Based on the routing protocol, node connections provide information to each other and can jointly establish a complete transmission path independently. But security is a major issue in MANET systems. Because MANET system are open and perform on a non-centralized infrastructure, they lacks security considerations in routing protocols, which make MANET systems more difficult to secure than wired networks. Attacks are easily exploited by its weaknesses. In this study, we conducted further research on the most common Sybil Attack of MANET systems. The common Sybil attack may cause packet flow redirection and other extended effects. We used the simulation environment NS-3 Project to create a consensus-based practical Byzantine Fault Tolerance algorithm to explore solutions to the Sybil attack''s threat to free mobile networks. Ensuring that all the original network nodes that are vulnerable to tampering are protected can ensure the integrity of the data during transmission. We must demonstrate in the simulation experiment that this method can have an ideal performance in both network and security performance. The goal is to ensure that the general network has the security of the network form under the infrastructure without being compromised.
Livres sur le sujet "Byzantines Attack"
Chapitres de livres sur le sujet "Byzantines Attack"
Hancock, James F. « Spice trade in the dark ages of Europe. » Dans Spices, scents and silk : catalysts of world trade, 146–56. Wallingford : CABI, 2021. http://dx.doi.org/10.1079/9781789249743.0012.
Texte intégralFiat, Amos, Jared Saia et Maxwell Young. « Making Chord Robust to Byzantine Attacks ». Dans Algorithms – ESA 2005, 803–14. Berlin, Heidelberg : Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11561071_71.
Texte intégralPooja, A. Saraswathi, Rampa Theresa, Satya Govind et Anuja Aloy Mary. « Detection of Byzantine Attack in Cognitive Radio Network ». Dans Advances in Intelligent Systems and Computing, 459–68. Singapore : Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5029-4_37.
Texte intégralHe, Xiaofan, et Huaiyu Dai. « Case Study II : HMM-Based Byzantine Attack Detection ». Dans SpringerBriefs in Electrical and Computer Engineering, 51–62. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_5.
Texte intégralHe, Xiaofan, et Huaiyu Dai. « Case Study III : CFC-Based Byzantine Attack Detection ». Dans SpringerBriefs in Electrical and Computer Engineering, 63–72. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_6.
Texte intégralZhang, Linyuan, Guoru Ding et Qihui Wu. « Byzantine Attack and Defense in Wireless Data Fusion ». Dans Encyclopedia of Wireless Networks, 147–50. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_301.
Texte intégralZhang, Linyuan, Guoru Ding et Qihui Wu. « Byzantine Attack and Defense in Wireless Data Fusion ». Dans Encyclopedia of Wireless Networks, 1–4. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_301-1.
Texte intégralAbrardo, Andrea, Mauro Barni, Kassem Kallas et Benedetta Tondi. « Security Attacks and Defenses in Distributed Sensor Networks ». Dans Information Fusion in Distributed Sensor Networks with Byzantines, 29–43. Singapore : Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-32-9001-3_3.
Texte intégralBing, Yuchen, Long Wang et Zesheng Chen. « A Spectrum Sensing Method for UAV Swarms Under Byzantine Attack ». Dans Proceedings of 2021 International Conference on Autonomous Unmanned Systems (ICAUS 2021), 1748–58. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9492-9_172.
Texte intégralSingla, Gagan, et Pallavi Kaliyar. « A Secure Routing Protocol for MANETs Against Byzantine Attacks ». Dans Lecture Notes in Electrical Engineering, 571–78. New York, NY : Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-6154-8_56.
Texte intégralActes de conférences sur le sujet "Byzantines Attack"
Stanev, Kamen. « THE FIFTH SLAVIC SIEGE OF THESSALONIKI ». Dans THE PATH OF CYRIL AND METHODIUS – SPATIAL AND CULTURAL HISTORICAL DIMENSIONS. Cyrillo-Methodian Research Centre – Bulgarian Academy of Sciences, 2023. http://dx.doi.org/10.59076/2815-3855.2023.33.16.
Texte intégralAmir, Yair, Brian Coan, Jonathan Kirsch et John Lane. « Byzantine replication under attack ». Dans 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). IEEE, 2008. http://dx.doi.org/10.1109/dsn.2008.4630088.
Texte intégralSun, Ziteng, Chuang Zhang et Pingyi Fan. « Optimal Byzantine Attack and Byzantine Identification in Distributed Sensor Networks ». Dans 2016 IEEE Globecom Workshops (GC Wkshps). IEEE, 2016. http://dx.doi.org/10.1109/glocomw.2016.7848991.
Texte intégralWan, Wei, Shengshan Hu, jianrong Lu, Leo Yu Zhang, Hai Jin et Yuanyuan He. « Shielding Federated Learning : Robust Aggregation with Adaptive Client Selection ». Dans Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California : International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/106.
Texte intégralXia, Qi, Zeyi Tao, Zijiang Hao et Qun Li. « FABA : An Algorithm for Fast Aggregation against Byzantine Attacks in Distributed Neural Networks ». Dans Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California : International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/670.
Texte intégralJi, Jinlong, Xuhui Chen, Qianlong Wang, Lixing Yu et Pan Li. « Learning to Learn Gradient Aggregation by Gradient Descent ». Dans Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California : International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/363.
Texte intégralZhu, Heng, et Qing Ling. « Bridging Differential Privacy and Byzantine-Robustness via Model Aggregation ». Dans Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California : International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/337.
Texte intégralDeng, Gelei, Yuan Zhou, Yuan Xu, Tianwei Zhang et Yang Liu. « An Investigation of Byzantine Threats in Multi-Robot Systems ». Dans RAID '21 : 24th International Symposium on Research in Attacks, Intrusions and Defenses. New York, NY, USA : ACM, 2021. http://dx.doi.org/10.1145/3471621.3471867.
Texte intégralXiao, Guomei, Bo Mi, Darong Huang, Yang Liu, Yang Li et Yuan Weng. « Anonymous Voting System Against Byzantine Attacks ». Dans 2021 CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes (SAFEPROCESS). IEEE, 2021. http://dx.doi.org/10.1109/safeprocess52771.2021.9693543.
Texte intégralGouissem, A., K. Abualsaud, E. Yaacoub, T. Khattab et M. Guizani. « Federated Learning Stability Under Byzantine Attacks ». Dans 2022 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2022. http://dx.doi.org/10.1109/wcnc51071.2022.9771594.
Texte intégral