Gotowa bibliografia na temat „Malicious attacks”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Malicious attacks”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Malicious attacks"
Wang, Jing Lei. "Research on the Detection Method of the Malicious Attacks on Campus Network." Applied Mechanics and Materials 644-650 (September 2014): 3291–94. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3291.
Pełny tekst źródłaGlancy, Fletcher, David P. Biros, Nan Liang, and Andy Luse. "Classification of malicious insiders and the association of the forms of attacks." Journal of Criminal Psychology 10, no. 3 (2020): 233–47. http://dx.doi.org/10.1108/jcp-03-2020-0012.
Pełny tekst źródłaJiang, Yufan, Maryam Zarezadeh, Tianxiang Dai, and Stefan Köpsell. "AlphaFL: Secure Aggregation with Malicious2 Security for Federated Learning against Dishonest Majority." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 348–68. https://doi.org/10.56553/popets-2025-0134.
Pełny tekst źródłaKumari, Ankita, Sandip Dutta, and Soubhik Chakraborty. "A comparative study of different security issues in MANET." International Journal of Experimental Research and Review 31, Spl Volume (2023): 168–86. http://dx.doi.org/10.52756/10.52756/ijerr.2023.v31spl.016.
Pełny tekst źródłaS., Tamil Selvi, and Visalakshi P. "Connect attack in IoT-WSN detect through cyclic analysis based on forward and backward elimination." PeerJ Computer Science 10 (June 28, 2024): e2130. http://dx.doi.org/10.7717/peerj-cs.2130.
Pełny tekst źródłaLee, Kyungroul, Jaehyuk Lee, and Kangbin Yim. "Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack." Applied Sciences 13, no. 5 (2023): 2894. http://dx.doi.org/10.3390/app13052894.
Pełny tekst źródłaPohane, Miss Mayuri Arvind. "Implementation Paper on Detection of Malicious URLs Using Machine Learning Techniques." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 296–98. http://dx.doi.org/10.22214/ijraset.2022.41084.
Pełny tekst źródłaIsah, Abdulkadir Onivehu, John Kolo Alhassan, Idris Ismaila, and Olawale Surajudeen Adebayo. "Tracking of Malicious Attacks on Data Online: A Systematic Review." Transactions on Networks and Communications 8, no. 4 (2020): 31–44. http://dx.doi.org/10.14738/tnc.84.9463.
Pełny tekst źródłaBoyanov, Petar. "A TAXONOMY OF THE CYBER ATTACKS." Journal scientific and applied research 3, no. 1 (2013): 114–24. http://dx.doi.org/10.46687/jsar.v3i1.73.
Pełny tekst źródłaAridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications." International Journal of Handheld Computing Research 8, no. 4 (2017): 40–51. http://dx.doi.org/10.4018/ijhcr.2017100104.
Pełny tekst źródłaRozprawy doktorskie na temat "Malicious attacks"
Opie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.
Pełny tekst źródłaAbu-Bakar, Kamalrulnizam. "Protecting agents against malicious host attacks." Thesis, Aston University, 2004. http://publications.aston.ac.uk/10612/.
Pełny tekst źródłaFischer, Benjamin. "Vehicular Group Membership Resilient to Malicious Attacks." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086.
Pełny tekst źródłaCasile, Roberta <1986>. "GNSS interference management techniques against malicious attacks." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7025/1/Casile_Roberta_tesi.pdf.
Pełny tekst źródłaCasile, Roberta <1986>. "GNSS interference management techniques against malicious attacks." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7025/.
Pełny tekst źródłaSivakumaran, Arun. "Malicious user attacks in decentralised cognitive radio networks." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/79657.
Pełny tekst źródłaMahlburg, Karl. "Structure Attacks in Cryptographic Protocols." Scholarship @ Claremont, 2001. https://scholarship.claremont.edu/hmc_theses/130.
Pełny tekst źródłaNarasimhan, Mayur Harn Lein. "Protecting a mobile agent from colluded truncation attacks by malicious hosts." Diss., UMK access, 2007.
Znajdź pełny tekst źródłaJolley, Jason. "Attribution, state responsibility, and the duty to prevent malicious cyber-attacks in international law." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8452/.
Pełny tekst źródłaLikarish, Peter F. "Early detection of malicious web content with applied machine learning." Diss., University of Iowa, 2011. https://ir.uiowa.edu/etd/4871.
Pełny tekst źródłaKsiążki na temat "Malicious attacks"
M, Johansson Jesper, ed. Windows vista security: Securing vista against malicious attacks. Wiley Technology Pub., 2007.
Znajdź pełny tekst źródłaSun, Kun, and Shu Wang. Secure Voice Processing Systems against Malicious Voice Attacks. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-44748-8.
Pełny tekst źródłaChen, Bo, Tongxiang Li, Wen-An Zhang, and Li Yu. Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-9396-9.
Pełny tekst źródłaJiang, Jiaojiao, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, and Wanlei Zhou. Malicious Attack Propagation and Source Identification. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02179-5.
Pełny tekst źródłaUnited States. Congress. House. Committee on Science. Subcommittee on Technology. The love bug virus: Protecting lovesick computers from malicious attack : hearing before the Subcommittee on Technology of the Committee on Science, House of Representatives, One Hundred Sixth Congress, second session, May 10, 2000. U.S. G.P.O., 2000.
Znajdź pełny tekst źródłaGrimes, Roger A., and Jesper M. Johansson. Windows Vista Security: Securing Vista Against Malicious Attacks. Wiley, 2007.
Znajdź pełny tekst źródłaGrimes, Roger A., and Jesper M. Johansson. Windows Vista Security: Securing Vista Against Malicious Attacks. Wiley & Sons, Incorporated, John, 2008.
Znajdź pełny tekst źródłaSecure Voice Processing Systems Against Malicious Voice Attacks. Springer, 2023.
Znajdź pełny tekst źródłaMauro, Aaron. The Language of Cyber Attacks. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781350354715.
Pełny tekst źródłaKleymenov, Alexey, and Amr Thabet. Mastering Malware Analysis: A Malware Analyst's Practical Guide to Combating Malicious Software, APT, Cybercrime, and IoT Attacks. Packt Publishing, Limited, 2022.
Znajdź pełny tekst źródłaCzęści książek na temat "Malicious attacks"
Yu, Shui. "Malicious Networks for DDoS Attacks." In Distributed Denial of Service Attack and Defense. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9491-1_2.
Pełny tekst źródłaRong, Qingnan, Jun Zhang, Xiaoqian Sun, and Sebastian Wandelt. "Network Strengthening Against Malicious Attacks." In Complex Networks and Their Applications VIII. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36687-2_63.
Pełny tekst źródłaJiang, Jiaojiao, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, and Wanlei Zhou. "User Influence in the Propagation of Malicious Attacks." In Malicious Attack Propagation and Source Identification. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02179-5_3.
Pełny tekst źródłaLi, Yuping, Jiyong Jang, Xin Hu, and Xinming Ou. "Android Malware Clustering Through Malicious Payload Mining." In Research in Attacks, Intrusions, and Defenses. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66332-6_9.
Pełny tekst źródłaLekies, Sebastian, Nick Nikiforakis, Walter Tighzert, Frank Piessens, and Martin Johns. "DEMACRO: Defense against Malicious Cross-Domain Requests." In Research in Attacks, Intrusions, and Defenses. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33338-5_13.
Pełny tekst źródłaAlnabulsi, Hussein, and Rafiqul Islam. "Web Sanitization from Malicious Code Injection Attacks." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98776-7_27.
Pełny tekst źródłaZhu, Yajie, Tai Xin, and Indrakshi Ray. "Recovering from Malicious Attacks in Workflow Systems." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11546924_2.
Pełny tekst źródłaChen, Weitong, Xiaofen Tu, Xin Liu, Jianwei Kong, Xiubo Chen, and Xiaomeng Liu. "Blockchain-Based Voting Scheme Against Malicious Attacks." In Proceedings of the UNIfied Conference of DAMAS, IncoME and TEPEN Conferences (UNIfied 2023). Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-49421-5_80.
Pełny tekst źródłaRay, Indrajit, and Nayot Poolsapassit. "Using Attack Trees to Identify Malicious Attacks from Authorized Insiders." In Computer Security – ESORICS 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11555827_14.
Pełny tekst źródłaSun, Kun, and Shu Wang. "Acoustic Compensation System Against Adversarial Voice Recognition." In Secure Voice Processing Systems against Malicious Voice Attacks. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-44748-8_4.
Pełny tekst źródłaStreszczenia konferencji na temat "Malicious attacks"
Abozaid, Fatemah, and Ali Baydoun. "Resilience of Aviation Cyber-Physical Systems to Malicious Attacks." In 2024 International Conference on Computer and Applications (ICCA). IEEE, 2024. https://doi.org/10.1109/icca62237.2024.10927823.
Pełny tekst źródłaWu, Qirui, Yirun Zhang, Zhaohui Yang, and Mohammad Shikh-Bahaei. "Knowledge Distillation-Based Robust UAV Swarm Communication Under Malicious Attacks." In 2024 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, 2024. http://dx.doi.org/10.1109/iccworkshops59551.2024.10615342.
Pełny tekst źródłaFalou, Ammar El. "A Study on Malicious Attacks for RIS-Aided Wireless Systems." In 2025 5th IEEE Middle East and North Africa Communications Conference (MENACOMM). IEEE, 2025. https://doi.org/10.1109/menacomm62946.2025.10911031.
Pełny tekst źródłaMahbooba, Basim, Mohan Timilsina, and Martin Serrano. "Trusting Machine Learning Algorithms in Predicting Malicious Nodes Attacks." In 9th International Conference on Artificial Intelligence and Applications (AIAP 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.120408.
Pełny tekst źródłaWan, Wei, Shengshan Hu, jianrong Lu, Leo Yu Zhang, Hai Jin, and Yuanyuan He. "Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/106.
Pełny tekst źródłaAbdelgawad, Mohamed, and Marianne A. Azer. "Securing Hardware from Malicious Attacks." In 2021 16th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2021. http://dx.doi.org/10.1109/icces54031.2021.9686147.
Pełny tekst źródłaArulsuju, D. "Hunting malicious attacks in social networks." In 2011 Third International Conference on Advanced Computing (ICoAC). IEEE, 2011. http://dx.doi.org/10.1109/icoac.2011.6165172.
Pełny tekst źródłaRayatidamavandi, Maede, Frank Conlon, and Mahshid Rahnamay-Naeini. "Reducing Network Vulnerability to Malicious Attacks." In 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2018. http://dx.doi.org/10.1109/iccnc.2018.8390313.
Pełny tekst źródłaAu, Man Ho, Yi Mu, Jing Chen, Duncan S. Wong, Joseph K. Liu, and Guomin Yang. "Malicious KGC attacks in certificateless cryptography." In Asia CCS07: Asia CCS'07 ACM Symposium on Information, Computer and Communications Security. ACM, 2007. http://dx.doi.org/10.1145/1229285.1266997.
Pełny tekst źródłaTejaswi, Chakravarma Sai, Yemireddy Chaitanya, A. Jesudoss, and Prayla Shyry. "Malicious Attacks Detection Using Machine Learning." In 2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 2022. http://dx.doi.org/10.1109/icirca54612.2022.9985551.
Pełny tekst źródłaRaporty organizacyjne na temat "Malicious attacks"
Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Pełny tekst źródłaChristie, Lorna. Physical threats to infrastructure. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/hs23.
Pełny tekst źródłaFekri, Faramarz, E. Ayday, and R. Subramanian. Design Principles for Secure Wireless Sensor Networks: Key Management Schemes and Malicious Attacks. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada533169.
Pełny tekst źródłaDesmedt, Yvo. Critical Analysis of the Use of Redundancy to Achieve Survivability in the Presence of Malicious Attacks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada403635.
Pełny tekst źródłaFedchenko, Vitaly. Nuclear Security During Armed Conflict: Lessons From Ukraine. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/zzsp5617.
Pełny tekst źródłaTayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Pełny tekst źródłaBelcher, Scott, Terri Belcher, James Grimes, Lusa Holmstrom, and Andy Souders. Does the Transit Industry Understand the Risks of Cybersecurity and are the Risks Being Appropriately Prioritized? Mineta Transportation Institute, 2025. https://doi.org/10.31979/mti.2025.2405.
Pełny tekst źródłaAcosta, Jaime C. From Malicious Eyes: A Method for Concise Representation of Ad-Hoc Networks and Efficient Attack Survivability Analysis. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada564943.
Pełny tekst źródłaThreat assessment of malicious code and external attacks. National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4939.
Pełny tekst źródła