Artykuły w czasopismach na temat „Malicious attacks”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Malicious attacks”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Wang, Jing Lei. "Research on the Detection Method of the Malicious Attacks on Campus Network." Applied Mechanics and Materials 644-650 (September 2014): 3291–94. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3291.
Pełny tekst źródłaGlancy, Fletcher, David P. Biros, Nan Liang, and Andy Luse. "Classification of malicious insiders and the association of the forms of attacks." Journal of Criminal Psychology 10, no. 3 (2020): 233–47. http://dx.doi.org/10.1108/jcp-03-2020-0012.
Pełny tekst źródłaJiang, Yufan, Maryam Zarezadeh, Tianxiang Dai, and Stefan Köpsell. "AlphaFL: Secure Aggregation with Malicious2 Security for Federated Learning against Dishonest Majority." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 348–68. https://doi.org/10.56553/popets-2025-0134.
Pełny tekst źródłaKumari, Ankita, Sandip Dutta, and Soubhik Chakraborty. "A comparative study of different security issues in MANET." International Journal of Experimental Research and Review 31, Spl Volume (2023): 168–86. http://dx.doi.org/10.52756/10.52756/ijerr.2023.v31spl.016.
Pełny tekst źródłaS., Tamil Selvi, and Visalakshi P. "Connect attack in IoT-WSN detect through cyclic analysis based on forward and backward elimination." PeerJ Computer Science 10 (June 28, 2024): e2130. http://dx.doi.org/10.7717/peerj-cs.2130.
Pełny tekst źródłaLee, Kyungroul, Jaehyuk Lee, and Kangbin Yim. "Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack." Applied Sciences 13, no. 5 (2023): 2894. http://dx.doi.org/10.3390/app13052894.
Pełny tekst źródłaPohane, Miss Mayuri Arvind. "Implementation Paper on Detection of Malicious URLs Using Machine Learning Techniques." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 296–98. http://dx.doi.org/10.22214/ijraset.2022.41084.
Pełny tekst źródłaIsah, Abdulkadir Onivehu, John Kolo Alhassan, Idris Ismaila, and Olawale Surajudeen Adebayo. "Tracking of Malicious Attacks on Data Online: A Systematic Review." Transactions on Networks and Communications 8, no. 4 (2020): 31–44. http://dx.doi.org/10.14738/tnc.84.9463.
Pełny tekst źródłaBoyanov, Petar. "A TAXONOMY OF THE CYBER ATTACKS." Journal scientific and applied research 3, no. 1 (2013): 114–24. http://dx.doi.org/10.46687/jsar.v3i1.73.
Pełny tekst źródłaAridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications." International Journal of Handheld Computing Research 8, no. 4 (2017): 40–51. http://dx.doi.org/10.4018/ijhcr.2017100104.
Pełny tekst źródłaXie, Gang, Xincheng Zhou, and Jinchun Gao. "Adaptive Trust Threshold Model Based on Reinforcement Learning in Cooperative Spectrum Sensing." Sensors 23, no. 10 (2023): 4751. http://dx.doi.org/10.3390/s23104751.
Pełny tekst źródłaPANG, Ming, and Zhi-Hua ZHOU. "Unorganized malicious attacks detection." SCIENTIA SINICA Informationis 48, no. 2 (2018): 177–86. http://dx.doi.org/10.1360/n112017-00112.
Pełny tekst źródłaMcClure, Ben. "Thwarting malicious Java attacks." Computers & Security 17, no. 4 (1998): 326. http://dx.doi.org/10.1016/s0167-4048(98)80018-7.
Pełny tekst źródłaArti Deshpande. "Leveraging Signature Patterns and Machine Learning for Detecting HTTP Header Manipulation Attacks." Journal of Information Systems Engineering and Management 10, no. 9s (2025): 636–50. https://doi.org/10.52783/jisem.v10i9s.1290.
Pełny tekst źródłaLiu, Xin, Xiaomeng Liu, Ruiling Zhang, Dan Luo, Gang Xu, and Xiubo Chen. "Securely Computing the Manhattan Distance under the Malicious Model and Its Applications." Applied Sciences 12, no. 22 (2022): 11705. http://dx.doi.org/10.3390/app122211705.
Pełny tekst źródłaPsychogyios, Konstantinos, Terpsichori-Helen Velivassaki, Stavroula Bourou, Artemis Voulkidis, Dimitrios Skias, and Theodore Zahariadis. "GAN-Driven Data Poisoning Attacks and Their Mitigation in Federated Learning Systems." Electronics 12, no. 8 (2023): 1805. http://dx.doi.org/10.3390/electronics12081805.
Pełny tekst źródłaAksoy, Ahmet, Luis Valle, and Gorkem Kar. "Automated Network Incident Identification through Genetic Algorithm-Driven Feature Selection." Electronics 13, no. 2 (2024): 293. http://dx.doi.org/10.3390/electronics13020293.
Pełny tekst źródłaChiu, Hon Sun, King-Shan Lui, and Kwan L. Yeung. "DelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks." Journal of Communications Software and Systems 2, no. 2 (2017): 131. http://dx.doi.org/10.24138/jcomss.v2i2.296.
Pełny tekst źródłaZhang, Hongfeng, Xinyu Wang, Lan Ban, and Molin Sun. "A Novel Detection and Identification Mechanism for Malicious Injection Attacks in Power Systems." Symmetry 15, no. 12 (2023): 2104. http://dx.doi.org/10.3390/sym15122104.
Pełny tekst źródłaWang, Shuhan. "Survey of Malicious PDF Attacks." Frontiers in Computing and Intelligent Systems 5, no. 2 (2023): 104–7. http://dx.doi.org/10.54097/fcis.v5i2.13109.
Pełny tekst źródłaXiao, Hongyong, Xutong Mu, and Ke Cheng. "FedRMA: A Robust Federated Learning Resistant to Multiple Poisoning Attacks." Journal of Networking and Network Applications 4, no. 1 (2024): 31–38. http://dx.doi.org/10.33969/j-nana.2024.040104.
Pełny tekst źródłaWang, Qingya, Yi Wu, Haojun Xuan, and Huishu Wu. "FLARE: A Backdoor Attack to Federated Learning with Refined Evasion." Mathematics 12, no. 23 (2024): 3751. http://dx.doi.org/10.3390/math12233751.
Pełny tekst źródłaLi, Muhai, and Ming Li. "An Adaptive Approach for Defending against DDoS Attacks." Mathematical Problems in Engineering 2010 (2010): 1–15. http://dx.doi.org/10.1155/2010/570940.
Pełny tekst źródłaLiang, Jiaqi, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, and Ming Ni. "Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks." Complexity 2021 (February 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/6659879.
Pełny tekst źródłaMeamari, Ehsan, Khadijeh Afhamisisi, and Hadi Shahriar Shahhoseini. "Game Theory-Based Analysis on Interactions Among Secondary and Malicious Users in Coordinated Jamming Attack in Cognitive Radio Systems." Journal of Circuits, Systems and Computers 25, no. 08 (2016): 1650097. http://dx.doi.org/10.1142/s0218126616500973.
Pełny tekst źródłaZikratov, I. A., T. V. Zikratova, and E. A. Novikov. "Swarm Robotics System Algorithm for Defense against Coordinated Behavior Strategy Attacks." Proceedings of Telecommunication Universities 10, no. 3 (2024): 75–86. http://dx.doi.org/10.31854/1813-324x-2024-10-3-75-86.
Pełny tekst źródłaHsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai, and Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning." Sustainability 13, no. 22 (2021): 12514. http://dx.doi.org/10.3390/su132212514.
Pełny tekst źródłaWang, Xingyu. "Classification of Malicious Document Detection Based on Artificial Intelligence." International Journal of Computer Science and Information Technology 2, no. 2 (2024): 108–13. https://doi.org/10.62051/ijcsit.v2n2.10.
Pełny tekst źródłaThakur, Mandeep, and Amninder Kaur Gill. "Detection and Isolation Technique for Blackhole Attack in Wireless Sensor Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 25. http://dx.doi.org/10.23956/ijarcsse.v7i8.12.
Pełny tekst źródłaAlmomani, Ammar, Mohammad Alauthman, Firas Albalas, O. Dorgham, and Atef Obeidat. "An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms." International Journal of Cloud Applications and Computing 8, no. 2 (2018): 96–112. http://dx.doi.org/10.4018/ijcac.2018040105.
Pełny tekst źródłaTaylor, O. E., P. S. Ezekiel, and V. T. Emmah. "A Mult-Task System for Detecting and Classifying Malware Signatures Using Random Forest Classifier." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 73–84. http://dx.doi.org/10.22624/aims/abmic2021-v2-p6.
Pełny tekst źródłaLakshmi, Vimitha R. Vidhya. "VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 15, no. 1 (2024): 154–71. http://dx.doi.org/10.58346/jowua.2024.i1.011.
Pełny tekst źródłaVaddadi, Srinivas A., Sanjaikanth E. Vadakkethil Somanathan Pillai, Santosh Reddy Addula, Rohith Vallabhaneni, and Bhuvanesh Ananthan. "An efficient convolutional neural network for adversarial training against adversarial attack." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1769. http://dx.doi.org/10.11591/ijeecs.v36.i3.pp1769-1777.
Pełny tekst źródłaSrinivas, A. Vaddadi Sanjaikanth E. Vadakkethil Somanathan Pillai Santosh Reddy Addula Rohith Vallabhaneni Bhuvanesh Ananthan. "An efficient convolutional neural network for adversarial training against adversarial attack." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1769–77. https://doi.org/10.11591/ijeecs.v36.i3.pp1769-1777.
Pełny tekst źródłaChoi, Sunoh, and Jaehyuk Cho. "Novel Feature Extraction Method for Detecting Malicious MQTT Traffic Using Seq2Seq." Applied Sciences 12, no. 23 (2022): 12306. http://dx.doi.org/10.3390/app122312306.
Pełny tekst źródłaKim, Dohoon, Donghee Choi, and Jonghyun Jin. "Method for Detecting Core Malware Sites Related to Biomedical Information Systems." Computational and Mathematical Methods in Medicine 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/756842.
Pełny tekst źródłaAlmuhairi, Thani, Ahmad Almarri, and Khalid Hokal. "An Artificial Intelligence-based Intrusion Detection System." Journal of Cybersecurity and Information Management 07, no. 02 (2021): 95–111. http://dx.doi.org/10.54216/jcim.07.02.04.
Pełny tekst źródłaEt. al., Leelavathy S,. "A Secure Methodology to Detect and Prevent Ddos and Sql Injection Attacks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 341–46. http://dx.doi.org/10.17762/turcomat.v12i2.722.
Pełny tekst źródłaAPOSTOL, Mihai, Bogdan PALINIUC, Rareș MORAR, and Florin VIDU. "Malicious Strategy: Watering Hole Attacks." Romanian Cyber Security Journal 4, no. 1 (2022): 29–37. http://dx.doi.org/10.54851/v4i1y202204.
Pełny tekst źródłaLee, Jaehyun, Youngho Cho, Ryungeon Lee, et al. "A Novel Data Sanitization Method Based on Dynamic Dataset Partition and Inspection Against Data Poisoning Attacks." Electronics 14, no. 2 (2025): 374. https://doi.org/10.3390/electronics14020374.
Pełny tekst źródłaLiu, Zihao, Tianhao Wang, Mengdi Huai, and Chenglin Miao. "Backdoor Attacks via Machine Unlearning." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 13 (2024): 14115–23. http://dx.doi.org/10.1609/aaai.v38i13.29321.
Pełny tekst źródłaLi, Lixiang, Jürgen Kurths, Yixian Yang, and Guole Liu. "Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks." Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/189213.
Pełny tekst źródłaGovindaraj, Mareeswari. "Assorted Attack Detection for IoT." International Journal of Research in Engineering, Science and Management 3, no. 9 (2020): 52–55. http://dx.doi.org/10.47607/ijresm.2020.285.
Pełny tekst źródłaHuang, Wenli, Liang Chen, and Junli Li. "A Critical Candidate Node-Based Attack Model of Network Controllability." Entropy 26, no. 7 (2024): 580. http://dx.doi.org/10.3390/e26070580.
Pełny tekst źródłaRaj Panakadan, Rusheel, Chitluri Dhanush, and Dr Carmel Mary Belinda. "An effective solution for DDOS attack." International Journal of Engineering & Technology 7, no. 1.7 (2018): 194. http://dx.doi.org/10.14419/ijet.v7i1.7.10650.
Pełny tekst źródłaA. Sathiya Priya and A. Sandhiya. "Machine learning based Cyber Attack detection on Internet Traffic." International Journal of Science and Research Archive 11, no. 2 (2024): 619–24. http://dx.doi.org/10.30574/ijsra.2024.11.2.0459.
Pełny tekst źródłaPravylo, Valerii, and Yevhenii Averkiiev. "ANALYSING MALICIOUS SOFTWARE SUPPORTING DDOS ATTACKS ON IOT NETWORKS." Information and Telecommunication Sciences, no. 1 (June 28, 2024): 50–54. http://dx.doi.org/10.20535/2411-2976.12024.50-54.
Pełny tekst źródłaPopov, Georgiy Aleksandrovich, Nadezhda Valerievna Daviduk, Kirill Dmitrievich Kuzovlev, Shamil Shavketovich Iksanov, and Albert Salmanovich Safaraliev. "Analysis of the nearest attack moment in critical infrastructure objects with a gradual change in the intensity of attacks over time." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2025, no. 1 (2025): 46–55. https://doi.org/10.24143/2072-9502-2025-1-46-55.
Pełny tekst źródłaWang, Hai Tao, Hui Chen, Xue Ping Zhang, and Li Yan. "A Novel Cluster Based Survivable Routing Protocol for Wireless Sensor Network." Applied Mechanics and Materials 556-562 (May 2014): 5577–81. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5577.
Pełny tekst źródłaTrivedi, Munesh C., and Sachin Malhotra. "Identification and Prevention of Joint Gray Hole and Black Hole Attacks." International Journal of Ambient Computing and Intelligence 10, no. 2 (2019): 80–90. http://dx.doi.org/10.4018/ijaci.2019040106.
Pełny tekst źródła