Artykuły w czasopismach na temat „Attack deployment”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Attack deployment”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Miao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (2021): 1–36. http://dx.doi.org/10.1145/3465171.
Pełny tekst źródłaXavier, Riofrío, Astudillo-Salinas Fabian, Tello-Oquendo Luis, and Merchan-Lima Jorge. "The Zero-day attack: Deployment and evolution." Latin-American Journal of Computing 8, no. 1 (2021): 38–53. https://doi.org/10.5281/zenodo.5747676.
Pełny tekst źródłaHisham, A. Kholidy ˡ'²᾽³ Fabrizio Baiardi ². and Salim Hariri ˡ. "A HIERARCHICAL INTRUSION DETECTION SYSTEM FOR CLOUDS: DESIGN AND EVALUATION." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 2, December (2018): 01–24. https://doi.org/10.5281/zenodo.1435321.
Pełny tekst źródłaHance, Jack, Jordan Milbrath, Noah Ross, and Jeremy Straub. "Distributed Attack Deployment Capability for Modern Automated Penetration Testing." Computers 11, no. 3 (2022): 33. http://dx.doi.org/10.3390/computers11030033.
Pełny tekst źródłaWang, Junyi. "Vision-Language Model Security in Autonomous Driving: A Survey." Applied and Computational Engineering 146, no. 1 (2025): None. https://doi.org/10.54254/2755-2721/2025.tj22524.
Pełny tekst źródłaKennedy, Edemacu, Euku Martin, and Ssekibuule Richard. "PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW." International Journal of Network Security & Its Applications (IJNSA) 6, no. 5 (2014): 75–86. https://doi.org/10.5281/zenodo.7502898.
Pełny tekst źródłaBayani, Samir Vinayak, Sanjeev Prakash, and Jesu Narkarunai Arasu Malaiyappan. "Unifying Assurance A Framework for Ensuring Cloud Compliance in AIML Deployment." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, no. 3 (2023): 457–72. http://dx.doi.org/10.60087/jklst.vol2.n3.p472.
Pełny tekst źródłaTong, Xin, Lan Chen, and Ying Li. "A Cellular Intrusion Detection Framework for Packet Dropping Attacks in Wireless Sensor Networks." Applied Mechanics and Materials 128-129 (October 2011): 441–45. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.441.
Pełny tekst źródłaKaiya, Haruhiko, Junya Sakai, Shinpei Ogata, and Kenji Kaijiri. "Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment." International Journal of Secure Software Engineering 4, no. 3 (2013): 42–63. http://dx.doi.org/10.4018/jsse.2013070103.
Pełny tekst źródłaHasin, Martin, Martin Chovanec, Jakub Palša, and Martin Havrilla. "Analysis and Collection Data from IP Network." Acta Electrotechnica et Informatica 22, no. 3 (2022): 18–23. http://dx.doi.org/10.2478/aei-2022-0013.
Pełny tekst źródłaMyette, Alexander L., Thomas J. Hossie, and Dennis L. Murray. "Defensive posture in a terrestrial salamander deflects predatory strikes irrespective of body size." Behavioral Ecology 30, no. 6 (2019): 1691–99. http://dx.doi.org/10.1093/beheco/arz137.
Pełny tekst źródłaWu, Libing, Jing Wang, Sherali Zeadally, and Debiao He. "Anonymous and Efficient Message Authentication Scheme for Smart Grid." Security and Communication Networks 2019 (May 12, 2019): 1–12. http://dx.doi.org/10.1155/2019/4836016.
Pełny tekst źródłaAissaoui, Sihem, and Sofiane Boukli Hacene. "Sinkhole Attack Detection-Based SVM In Wireless Sensor Networks." International Journal of Wireless Networks and Broadband Technologies 10, no. 2 (2021): 16–31. http://dx.doi.org/10.4018/ijwnbt.2021070102.
Pełny tekst źródłaKhare, Surbhi, and Abhishek Badholia. "BLA2C2: Design of a Novel Blockchain-based Light-Weight Authentication & Access Control Layer for Cloud Deployments." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3 (2023): 283–94. http://dx.doi.org/10.17762/ijritcc.v11i3.6359.
Pełny tekst źródłaLee, Yohan, Jeremy S. Fried, Heidi J. Albers, and Robert G. Haight. "Deploying initial attack resources for wildfire suppression: spatial coordination, budget constraints, and capacity constraints." Canadian Journal of Forest Research 43, no. 1 (2013): 56–65. http://dx.doi.org/10.1139/cjfr-2011-0433.
Pełny tekst źródłaTulashvili, Yurii, and Viktor Kosheliuk. "Orchestrating honeypot deployment in lightweight container platforms to improve security." International Science Journal of Engineering & Agriculture 4, no. 1 (2025): 1–13. https://doi.org/10.46299/j.isjea.20250401.01.
Pełny tekst źródłaLeahy, Darragh, and Christina Thorpe. "Zero Trust Container Architecture (ZTCA)." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 111–20. http://dx.doi.org/10.34190/iccws.17.1.35.
Pełny tekst źródłaJia, Zhi-Xiang, and Jean-Fu Kiang. "Deployment Optimization of Defense Stations in an Attack-Defense Aerial War Game." Applied Sciences 12, no. 21 (2022): 10801. http://dx.doi.org/10.3390/app122110801.
Pełny tekst źródłaNaqvi, Sardar Shan Ali, Yuancheng Li, and Muhammad Uzair. "DDoS attack detection in smart grid network using reconstructive machine learning models." PeerJ Computer Science 10 (January 9, 2024): e1784. http://dx.doi.org/10.7717/peerj-cs.1784.
Pełny tekst źródłaGao, Yazhuo, Guomin Zhang, and Changyou Xing. "A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction." Security and Communication Networks 2021 (October 21, 2021): 1–15. http://dx.doi.org/10.1155/2021/6378218.
Pełny tekst źródłaMoubayed, Abdallah. "A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection." Future Internet 16, no. 9 (2024): 331. http://dx.doi.org/10.3390/fi16090331.
Pełny tekst źródłaWatermeyer, Matthew John, Nicole Dippenaar, Nelly Clotildea Tchouambou Simo, Sean Buchanan, and Abdullah Ebrahim Laher. "Essential Lessons in a Potential Sarin Attack Disaster Plan for a Resource-Constrained Environment." Disaster Medicine and Public Health Preparedness 12, no. 2 (2017): 249–56. http://dx.doi.org/10.1017/dmp.2017.49.
Pełny tekst źródłaMoussaileb, Routa, Nora Cuppens, Jean-Louis Lanet, and Hélène Le Bouder. "A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms." ACM Computing Surveys 54, no. 6 (2021): 1–36. http://dx.doi.org/10.1145/3453153.
Pełny tekst źródłaNtayagabiri, Jean Pierre, Youssef Bentaleb, Jeremie Ndikumagenge, and Hind El Makhtoum. "A Comparative Analysis of Supervised Machine Learning Algorithms for IoT Attack Detection and Classification." Journal of Computing Theories and Applications 2, no. 3 (2025): 395–409. https://doi.org/10.62411/jcta.11901.
Pełny tekst źródłaLi, Qiuxiang, and Jianping Wu. "Optimizing the Effectiveness of Moving Target Defense in a Probabilistic Attack Graph: A Deep Reinforcement Learning Approach." Electronics 13, no. 19 (2024): 3855. http://dx.doi.org/10.3390/electronics13193855.
Pełny tekst źródłaSharma, Prof Sanjay Kumar. "Responsible Prompt Engineering: An Embedding Based Approach to Secure LLM Interactions." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 1128–33. https://doi.org/10.22214/ijraset.2025.72157.
Pełny tekst źródłaJi, Yun. "A Wireless Sensor Network-Based Defence Model against Selective Forwarding Attack." International Journal of Online Engineering (iJOE) 14, no. 05 (2018): 70. http://dx.doi.org/10.3991/ijoe.v14i05.8651.
Pełny tekst źródłaAridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications." International Journal of Handheld Computing Research 8, no. 4 (2017): 40–51. http://dx.doi.org/10.4018/ijhcr.2017100104.
Pełny tekst źródłaLi, Qianmu, Jun Hou, Shunmei Meng, and Huaqiu Long. "GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks." Complexity 2020 (March 30, 2020): 1–18. http://dx.doi.org/10.1155/2020/7136160.
Pełny tekst źródłaReddy, Vonteru Srikanth, and Kumar Debasis. "Statistical Review of Health Monitoring Models for Real-Time Hospital Scenarios." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7s (2023): 465–81. http://dx.doi.org/10.17762/ijritcc.v11i7s.7025.
Pełny tekst źródłaWang, Yongwei, Yong Liu, and Zhiqi Shen. "Revisiting Item Promotion in GNN-Based Collaborative Filtering: A Masked Targeted Topological Attack Perspective." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 12 (2023): 15206–14. http://dx.doi.org/10.1609/aaai.v37i12.26774.
Pełny tekst źródłaYin, Xiangyu, Sihao Wu, Jiaxu Liu, et al. "Representation-Based Robustness in Goal-Conditioned Reinforcement Learning." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 19 (2024): 21761–69. http://dx.doi.org/10.1609/aaai.v38i19.30176.
Pełny tekst źródłaAdnyana, I. Gede, Ayu Manik Dirgayusari, and Ketut Jaya Atmaja. "Data Visualization for Building a Cyber Attack Monitoring Dashboard Based on Honeypot." sinkron 8, no. 4 (2024): 2510–18. http://dx.doi.org/10.33395/sinkron.v8i4.14144.
Pełny tekst źródłaHuang, Xijie, Xinyuan Wang, Hantao Zhang, et al. "Medical MLLM Is Vulnerable: Cross-Modality Jailbreak and Mismatched Attacks on Medical Multimodal Large Language Models." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 4 (2025): 3797–805. https://doi.org/10.1609/aaai.v39i4.32396.
Pełny tekst źródłaHe, Haoyu, Isaiah J. King, and H. Howie Huang. "Maui: Black-Box Edge Privacy Attack on Graph Neural Networks." Proceedings on Privacy Enhancing Technologies 2024, no. 4 (2024): 364–80. http://dx.doi.org/10.56553/popets-2024-0121.
Pełny tekst źródłaBaskaran, Hasventhran, Abbas M. Al-Ghaili, Zul Azri Ibrahim, Fiza Abdul Rahim, Saravanan Muthaiyah, and Hairoladenan Kasim. "Data falsification attacks in advanced metering infrastructure." Bulletin of Electrical Engineering and Informatics 10, no. 1 (2021): 412–18. http://dx.doi.org/10.11591/eei.v10i1.2024.
Pełny tekst źródłaVinay Tila Patil. "Enhancing IoT Network Security with Deep Learning-Based Anomaly Detection." Journal of Information Systems Engineering and Management 10, no. 28s (2025): 357–71. https://doi.org/10.52783/jisem.v10i28s.4336.
Pełny tekst źródłaFarooq, Muhammad Shoaib, Shamyla Riaz, and Atif Alvi. "Security and Privacy Issues in Software-Defined Networking (SDN): A Systematic Literature Review." Electronics 12, no. 14 (2023): 3077. http://dx.doi.org/10.3390/electronics12143077.
Pełny tekst źródłaKundu, Suparna, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, and Ingrid Verbauwhede. "Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 2 (2024): 844–69. http://dx.doi.org/10.46586/tches.v2024.i2.844-869.
Pełny tekst źródłaMiki, Masato, Toshihiro Yamauchi, and Satoru Kobayashi. "Effectiveness of MAC Systems based on LSM and their Security Policy Configuration for Protecting IoT Devices." Journal of Internet Services and Information Security 14, no. 3 (2024): 293–315. http://dx.doi.org/10.58346/jisis.2024.i3.018.
Pełny tekst źródłaM. M., Savitha, and Prabhugoud I. Basarkod. "Improving the Reliability of RPL Using Hybrid Deep Learning and Objective Function-Based DODAG Structure for AMI." Mathematical Modelling of Engineering Problems 9, no. 3 (2022): 1717–29. http://dx.doi.org/10.18280/mmep.090634.
Pełny tekst źródłaBhargavi Goparaju and Bandla Sreenivasa Rao. "Distributed Denial-of-Service (DDoS) Attack Detection using 1D Convolution Neural Network (CNN) and Decision Tree Model." Journal of Advanced Research in Applied Sciences and Engineering Technology 32, no. 2 (2023): 30–41. http://dx.doi.org/10.37934/araset.32.2.3041.
Pełny tekst źródłaMohammad, Farhaan, Singh Shivanshu, Singh Shivendra, Malhotra Sakshi, and Javed Miya Dr. "Security threats Detection and Handling Mechanism in Wireless Sensor Networks using Machine Learning." International Journal of Innovative Science and Research Technology 7, no. 5 (2022): 604–11. https://doi.org/10.5281/zenodo.6613611.
Pełny tekst źródłaKim, Taeyoung, Jeongwan Park, and Julak Lee. "An Empirical Study of Factors Influencing Drone Terrorist Attack Casualties." International Journal of Cyber Warfare and Terrorism 14, no. 1 (2024): 1–16. http://dx.doi.org/10.4018/ijcwt.350049.
Pełny tekst źródłaGuo, Wei, Zhi Zhang, Liyuan Chang, Yue Song, and Liuguo Yin. "A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid." Drones 8, no. 9 (2024): 437. http://dx.doi.org/10.3390/drones8090437.
Pełny tekst źródłaMalvika, Rajput* Asst. Prof. C.P. Singh. "A SURVEY ON WORMHOLE DETECTION AND PREVENTION APPROACH." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 8 (2017): 192–99. https://doi.org/10.5281/zenodo.839167.
Pełny tekst źródłaHasventhran, Baskaran, M. Al-Ghaili Abbas, Ibrahim Zul-Azri, Abdul Rahim Fiza, Muthaiyah Saravanan, and Kasim Hairoladenan. "Data falsification attacks in advanced metering infrastructure." Bulletin of Electrical Engineering and Informatics 10, no. 1 (2021): 412–18. https://doi.org/10.11591/eei.v10i1.2024.
Pełny tekst źródłaJ, Anthoniraj. "NODE BASED CLONE ATTACK DETECTION IN STATIC WIRELESS SENSOR NETWORKS." ICTACT Journal on Communication Technology 12, no. 2 (2021): 2395–401. http://dx.doi.org/10.21917/ijct.2021.0354.
Pełny tekst źródłaLi, Hao, Fanggao Wan, Yue Su, Yue Wu, Mingyang Zhang, and Maoguo Gong. "AdvDisplay: Adversarial Display Assembled by Thermoelectric Cooler for Fooling Thermal Infrared Detectors." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 17 (2025): 18279–86. https://doi.org/10.1609/aaai.v39i17.34011.
Pełny tekst źródłaAdefemi Alimi, Kuburat Oyeranti, Khmaies Ouahada, Adnan M. Abu-Mahfouz, and Suvendi Rimer. "A Survey on the Security of Low Power Wide Area Networks: Threats, Challenges, and Potential Solutions." Sensors 20, no. 20 (2020): 5800. http://dx.doi.org/10.3390/s20205800.
Pełny tekst źródła