Gotowa bibliografia na temat „Resource consumption attack”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Resource consumption attack”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Resource consumption attack"
Gao, Minyan, Liton Kumar Biswas, Navid Asadi, and Domenic Forte. "Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource." Cryptography 8, no. 2 (2024): 13. http://dx.doi.org/10.3390/cryptography8020013.
Pełny tekst źródłaMoataz, H. Khalil, Azab Mohamed, Elsayed Ashraf, Sheta Walaa, Gabr Mahmoud, and S. Elmaghraby Adel. "MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS." International Journal of Computer Networks & Communications (IJCNC) 11, no. 6 (2019): 1–22. https://doi.org/10.5281/zenodo.3564217.
Pełny tekst źródłaPadmaja, K., and K. Padmaja. "Radial Basis Kernel Regressive Feature Extraction and Robert Ensembled Brown Boost Classifier for Attack Detection in Cloud Environment." Webology 18, no. 2 (2021): 41–59. http://dx.doi.org/10.14704/web/v18i2/web18306.
Pełny tekst źródłaKim, Sungbeen, and Dohoon Kim. "Securing the Cyber Resilience of a Blockchain-Based Railroad Non-Stop Customs Clearance System." Sensors 23, no. 6 (2023): 2914. http://dx.doi.org/10.3390/s23062914.
Pełny tekst źródłaZhang, Yanshuo, Liqiu Li, Hengyu Bao, Xiaohong Qin, Zhiyuan Zhang, and Xiaoyi Duan. "IAESR: IoT-oriented authenticated encryption based on iShadow round function." PeerJ Computer Science 11 (June 11, 2025): e2947. https://doi.org/10.7717/peerj-cs.2947.
Pełny tekst źródłaShruthi, R., and Z. Khan Prof.Rasheeda. "Preventing X-DoS attack on Cloud using Reputation-Based Technology." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 68–75. https://doi.org/10.5281/zenodo.581759.
Pełny tekst źródłaGarcia Ribera, Eric, Brian Martinez Alvarez, Charisma Samuel, Philokypros P. Ioulianou, and Vassilios G. Vassilakis. "An Intrusion Detection System for RPL-Based IoT Networks." Electronics 11, no. 23 (2022): 4041. http://dx.doi.org/10.3390/electronics11234041.
Pełny tekst źródłaWu, Hongyu, Xiaoning Feng, and Jiale Zhang. "Quantum Implementation of the SAND Algorithm and Its Quantum Resource Estimation for Brute-Force Attack." Entropy 26, no. 3 (2024): 216. http://dx.doi.org/10.3390/e26030216.
Pełny tekst źródłaKannan, Charulatha, Rajendiran Muthusamy, Vimala Srinivasan, Vivek Chidambaram, and Kiruthika Karunakaran. "Machine learning based detection of DDoS attacks in software defined network." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 3 (2023): 1503. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1503-1511.
Pełny tekst źródłaShi, Haibin, Guang Cheng, Ying Hu, Fuzhou Wang, and Haoxuan Ding. "RT-SAD: Real-Time Sketch-Based Adaptive DDoS Detection for ISP Network." Security and Communication Networks 2021 (July 27, 2021): 1–10. http://dx.doi.org/10.1155/2021/9409473.
Pełny tekst źródłaCzęści książek na temat "Resource consumption attack"
Jiao, Libin, Yonghua Huo, Ningling Ge, Zhongdi Ge, and Yang Yang. "A Resource Consumption Attack Identification Method Based on Data Fusion." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73562-3_11.
Pełny tekst źródłaAbdelhaq, Maha, Rosilah Hassan, and Raed Alsaqour. "Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET." In Software Engineering and Computer Systems. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22203-0_38.
Pełny tekst źródłaWoodhouse, Stephen, and Mostyn Brown. "The Impact of Digitalization." In The Palgrave Handbook of International Energy Economics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-86884-0_30.
Pełny tekst źródła"Research on resource consumption attack detection and defend." In Control Engineering and Information Systems. CRC Press, 2015. http://dx.doi.org/10.1201/b17732-138.
Pełny tekst źródłaJain, Rachna. "Apprising Trust Key Management in IoT Cross-Layer Framework." In Transforming the Internet of Things for Next-Generation Smart Systems. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7541-3.ch002.
Pełny tekst źródłaZhao, Yi, Ningping Mou, Yunjie Ge, and Qian Wang. "Improving Adversarial Transferability with Ghost Samples." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2023. http://dx.doi.org/10.3233/faia230629.
Pełny tekst źródłaAmeen, Nabeena, and R. Rajagopal. "Secure Boot and Key Management Protocols for IoT Edge Devices." In Lightweight Cryptographic Algorithms for Secure IoT Devices, 2025th ed. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552302-12.
Pełny tekst źródłaShahid, Hafsa, Humaira Ashraf, N. Z. Jhanjhi, and Qurat-ul Ain Zam Zam. "Reshaping Cybersecurity of Wireless Sensor Networks Using Energy-Optimized Approach Against Wormhole Attack." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-5415-5.ch004.
Pełny tekst źródłaAl-Na'amneh, Qais, Walid Dhifallah, Rahaf Hazaymih, et al. "DIS Flooding Attack Impact in RPL-Based 6LowPAN Network." In Advances in Computational Intelligence and Robotics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-7540-2.ch004.
Pełny tekst źródłaTalukder, Mohammad Badruddoza, Musfiqur Rahoman Khan, and Sanjeev Kumar. "Socioeconomic Gaps and Foster Inclusive Growth." In Advances in Hospitality, Tourism, and the Services Industry. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-5405-6.ch003.
Pełny tekst źródłaStreszczenia konferencji na temat "Resource consumption attack"
Lazri, Kahina, Sylvie Laniepce, Haiming Zheng, and Jalel Ben-Othman. "AMAD: Resource Consumption Profile-Aware Attack Detection in IaaS Cloud." In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC). IEEE, 2014. http://dx.doi.org/10.1109/ucc.2014.48.
Pełny tekst źródłaRustogi, Rishabh, Abhishek Agarwal, Ayush Prasad, and Samant Saurabh. "Machine Learning Based Web-Traffic Analysis for Detection of Fraudulent Resource Consumption Attack in Cloud." In WI '19: IEEE/WIC/ACM International Conference on Web Intelligence. ACM, 2019. http://dx.doi.org/10.1145/3350546.3352567.
Pełny tekst źródłaSilva, Antônia Mayara de A. da, Michel Sales Bonfim, Arthur de Castro Callado, and Enyo José T. Gonçalves. "Detection and Mitigation of Attacks at the Edge of IoT Networks Using Deep Learning and P4." In Simpósio Brasileiro de Sistemas de Informação. Sociedade Brasileira de Computação, 2025. https://doi.org/10.5753/sbsi.2025.246599.
Pełny tekst źródłaTsiatsikas, Zisis, Georgios Kambourakis, and Dimitris Geneiatakis. "Exposing resource consumption attacks in internet multimedia services." In 2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). IEEE, 2014. http://dx.doi.org/10.1109/isspit.2014.7446237.
Pełny tekst źródłaDeepan Kumar, Sadhasivam, Vishnu Ramesh Kumar R, Boopathi M, R. Manojkumar, Gobinath R, and Vignesh M. "FPGA Implementation of HLS Crypto Accelerators for Embedded Security in Autonomous Vehicles." In Advances in Design, Materials, Manufacturing and Surface Engineering for Mobility (ADMMS’25). SAE International, 2025. https://doi.org/10.4271/2025-28-0205.
Pełny tekst źródłaWu, Mingtao, and Young B. Moon. "Intrusion Detection of Cyber-Physical Attacks in Manufacturing Systems: A Review." In ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-10135.
Pełny tekst źródłaPontes, Marcos F., Rodrigo C. Pedrosa, Pedro H. Lopes, and Eduardo J. Luz. "Evaluating Federated Learning with Homomorphic Encryption for Medical Named Entity Recognition Using Compact BERT Models." In Simpósio Brasileiro de Tecnologia da Informação e da Linguagem Humana. Sociedade Brasileira de Computação, 2024. https://doi.org/10.5753/stil.2024.245381.
Pełny tekst źródłaBezerra, Vitor Hugo, Victor G. Turrisi da Costa, Sylvio Barbon Junior, Rodrigo Sanches Miani, and Bruno Bogaz Zarpelão. "One-class Classification to Detect Botnets in IoT devices." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/sbseg.2018.4242.
Pełny tekst źródłaK, Selvamani, Anbuchelian S, Kanimozhi S, Elakkiya R, Bose S, and Kannan A. "A hybrid framework of intrusion detection system for resource consumption based attacks in wireless ad-hoc networks." In 2012 International Conference on Systems and Informatics (ICSAI). IEEE, 2012. http://dx.doi.org/10.1109/icsai.2012.6223291.
Pełny tekst źródłaMoncea, Mădălina, Lăcrămioara Drăcea, and Răzvan-Cătălin Dobrea. "Overview on the Impact of Consumer Behavior Decisions on the Tourism Industry in Romania." In 9th BASIQ International Conference on New Trends in Sustainable Business and Consumption. Editura ASE, 2023. http://dx.doi.org/10.24818/basiq/2023/09/072.
Pełny tekst źródłaRaporty organizacyjne na temat "Resource consumption attack"
Ekström, Thomas. Kunskapsöversikt: Lärdomar från Ukraina med relevans för svensk infrastruktur. Swedish Defence University, 2024. https://doi.org/10.62061/xjyn5209.
Pełny tekst źródła