Artykuły w czasopismach na temat „Resource consumption attack”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Resource consumption attack”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Gao, Minyan, Liton Kumar Biswas, Navid Asadi, and Domenic Forte. "Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource." Cryptography 8, no. 2 (2024): 13. http://dx.doi.org/10.3390/cryptography8020013.
Pełny tekst źródłaMoataz, H. Khalil, Azab Mohamed, Elsayed Ashraf, Sheta Walaa, Gabr Mahmoud, and S. Elmaghraby Adel. "MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS." International Journal of Computer Networks & Communications (IJCNC) 11, no. 6 (2019): 1–22. https://doi.org/10.5281/zenodo.3564217.
Pełny tekst źródłaPadmaja, K., and K. Padmaja. "Radial Basis Kernel Regressive Feature Extraction and Robert Ensembled Brown Boost Classifier for Attack Detection in Cloud Environment." Webology 18, no. 2 (2021): 41–59. http://dx.doi.org/10.14704/web/v18i2/web18306.
Pełny tekst źródłaKim, Sungbeen, and Dohoon Kim. "Securing the Cyber Resilience of a Blockchain-Based Railroad Non-Stop Customs Clearance System." Sensors 23, no. 6 (2023): 2914. http://dx.doi.org/10.3390/s23062914.
Pełny tekst źródłaZhang, Yanshuo, Liqiu Li, Hengyu Bao, Xiaohong Qin, Zhiyuan Zhang, and Xiaoyi Duan. "IAESR: IoT-oriented authenticated encryption based on iShadow round function." PeerJ Computer Science 11 (June 11, 2025): e2947. https://doi.org/10.7717/peerj-cs.2947.
Pełny tekst źródłaShruthi, R., and Z. Khan Prof.Rasheeda. "Preventing X-DoS attack on Cloud using Reputation-Based Technology." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 68–75. https://doi.org/10.5281/zenodo.581759.
Pełny tekst źródłaGarcia Ribera, Eric, Brian Martinez Alvarez, Charisma Samuel, Philokypros P. Ioulianou, and Vassilios G. Vassilakis. "An Intrusion Detection System for RPL-Based IoT Networks." Electronics 11, no. 23 (2022): 4041. http://dx.doi.org/10.3390/electronics11234041.
Pełny tekst źródłaWu, Hongyu, Xiaoning Feng, and Jiale Zhang. "Quantum Implementation of the SAND Algorithm and Its Quantum Resource Estimation for Brute-Force Attack." Entropy 26, no. 3 (2024): 216. http://dx.doi.org/10.3390/e26030216.
Pełny tekst źródłaKannan, Charulatha, Rajendiran Muthusamy, Vimala Srinivasan, Vivek Chidambaram, and Kiruthika Karunakaran. "Machine learning based detection of DDoS attacks in software defined network." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 3 (2023): 1503. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1503-1511.
Pełny tekst źródłaShi, Haibin, Guang Cheng, Ying Hu, Fuzhou Wang, and Haoxuan Ding. "RT-SAD: Real-Time Sketch-Based Adaptive DDoS Detection for ISP Network." Security and Communication Networks 2021 (July 27, 2021): 1–10. http://dx.doi.org/10.1155/2021/9409473.
Pełny tekst źródłaHwang, Min-Shiang, Jung-Wen Lo, and Chia-Hsin Liu. "Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack." Fundamenta Informaticae 61, no. 3-4 (2004): 389–98. https://doi.org/10.3233/fun-2004-613-412.
Pełny tekst źródłaLe, Duc, Minh Dao, and Quyen Nguyen. "Comparison of machine learning algorithms for DDoS attack detection in SDN." Information and Control Systems, no. 3 (June 15, 2020): 59–70. http://dx.doi.org/10.31799/1684-8853-2020-3-59-70.
Pełny tekst źródłaKumar Singh Yadav, Ajit, and Rajesh K. Yadav. "A Reliable and Secure AODV Protocol for MANETs." International Journal of Engineering & Technology 7, no. 4.38 (2018): 893. http://dx.doi.org/10.14419/ijet.v7i4.38.27603.
Pełny tekst źródłaAlani, Mohammed M., and Ernesto Damiani. "XRecon: An Explainbale IoT Reconnaissance Attack Detection System Based on Ensemble Learning." Sensors 23, no. 11 (2023): 5298. http://dx.doi.org/10.3390/s23115298.
Pełny tekst źródłaAbdelhaq, Maha. "A Study on the Vulnerability of AODV Routing Protocol to Resource Consumption Attack." Indian Journal of Science and Technology 5, no. 11 (2012): 1–5. http://dx.doi.org/10.17485/ijst/2012/v5i11.4.
Pełny tekst źródłaYaokumah, Winfred, Richard Nunoo Clottey, and Justice Kwame Appati. "Network Intrusion Detection in Internet of Things (IoT)." International Journal of Smart Security Technologies 8, no. 1 (2021): 49–65. http://dx.doi.org/10.4018/ijsst.2021010104.
Pełny tekst źródłaCao, Laicheng, and Min Zhu. "Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model." Sensors 22, no. 15 (2022): 5674. http://dx.doi.org/10.3390/s22155674.
Pełny tekst źródłaHajar, Dahhak, Nadia Afifi, and Imane Hilal. "Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience." Cryptography 9, no. 2 (2025): 22. https://doi.org/10.3390/cryptography9020022.
Pełny tekst źródłaAbdulkareem, Omar A., Raja Kumar Kontham, and Farhad E. Mahmood. "Collaborative Intrusion Detection System to Identify Joint Attacks in Routing Protocol for Low-Power and Lossy Networks Routing Protocol on the Internet of Everything." Mesopotamian Journal of CyberSecurity 4, no. 3 (2024): 251–77. https://doi.org/10.58496/mjcs/2024/026.
Pełny tekst źródłaNeve, Rahul P., and Rajesh Bansode. "Attack Analysis on Hybrid-SIMON-SPECKey Lightweight Cryptographic Algorithm for IoT Applications." Indian Journal Of Science And Technology 17, no. 10 (2024): 932–40. http://dx.doi.org/10.17485/ijst/v17i10.2811.
Pełny tekst źródłaOladipupo, Esau Taiwo, and Oluwakemi Christiana Abikoye. "Improved authenticated elliptic curve cryptography scheme for resource starve applications." Computer Science and Information Technologies 3, no. 3 (2022): 169–85. http://dx.doi.org/10.11591/csit.v3i3.p169-185.
Pełny tekst źródłaEsau Taiwo Oladipupo and Oluwakemi Christiana Abikoye. "Improved authenticated elliptic curve cryptography scheme for resource starve applications." Computer Science and Information Technologies 3, no. 3 (2022): 169–85. http://dx.doi.org/10.11591/csit.v3i3.pp169-185.
Pełny tekst źródłaEsau, Taiwo Oladipupo, and Christiana Abikoye Oluwakemi. "Improved authenticated elliptic curve cryptography scheme for resource starve applications." Computer Science and Information Technologies 3, no. 3 (2022): 169–85. https://doi.org/10.11591/csit.v3i3.pp169-185.
Pełny tekst źródłaHan, Seungjae, Keonyong Lee, Seongje Cho, and Moonju Park. "Anomaly Detection Based on Temporal Behavior Monitoring in Programmable Logic Controllers." Electronics 10, no. 10 (2021): 1218. http://dx.doi.org/10.3390/electronics10101218.
Pełny tekst źródłaAlcala’ Garrido, Hassel Aurora, Mario E. Rivero-Angeles, and Eleazar Aguirre Anaya. "Primary User Emulation in Cognitive Radio-Enabled WSNs for Structural Health Monitoring: Modeling and Attack Detection." Journal of Sensors 2019 (April 28, 2019): 1–14. http://dx.doi.org/10.1155/2019/6950534.
Pełny tekst źródłaPriya M R, Usha J. "A Study on DDoS Attack Detection Technique Prior to Machine Learning in Wireless Sensor Networks." Tuijin Jishu/Journal of Propulsion Technology 44, no. 5 (2023): 3698–721. http://dx.doi.org/10.52783/tjjpt.v44.i5.3458.
Pełny tekst źródłaTrikalinou, Anna, and Nikolaos Bourbakis. "An Enhanced Dynamic Information Flow Tracking Method with Reverse Stack Execution." International Journal of Monitoring and Surveillance Technologies Research 3, no. 1 (2015): 40–58. http://dx.doi.org/10.4018/ijmstr.2015010103.
Pełny tekst źródłaJain, Shaveta, and Kushagra Agrawal. "The Impact of Resource Consumption Attack on Signal-Stability based Adaptive Routing Protocol in Manet." Indian Journal of Science and Technology 10, no. 30 (2017): 1–5. http://dx.doi.org/10.17485/ijst/2017/v10i19/115535.
Pełny tekst źródłaJain, Shaveta, and Kushagra Agrawal. "The Impact of Resource Consumption Attack on Signal-Stability based Adaptive Routing Protocol in Manet." Indian Journal of Science and Technology 10, no. 30 (2017): 1–5. http://dx.doi.org/10.17485/ijst/2017/v10i30/115535.
Pełny tekst źródłaCho, Won, and Joonho Kong. "Memory and Cache Contention Denial-of-Service Attack in Mobile Edge Devices." Applied Sciences 11, no. 5 (2021): 2385. http://dx.doi.org/10.3390/app11052385.
Pełny tekst źródłaYan, Fei, Xiaoping Zhu, Zhou Zhou, and Yang Tang. "Heterogeneous multi-unmanned aerial vehicle task planning: Simultaneous attacks on targets using the Pythagorean hodograph curve." Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering 233, no. 13 (2019): 4735–49. http://dx.doi.org/10.1177/0954410019829368.
Pełny tekst źródłaNhu, Chien-Nguyen, and Minho Park. "Two-Phase Deep Learning-Based EDoS Detection System." Applied Sciences 11, no. 21 (2021): 10249. http://dx.doi.org/10.3390/app112110249.
Pełny tekst źródłaWu, Jianping, Jiahe Jin, and Chunming Wu. "Challenges and Countermeasures of Federated Learning Data Poisoning Attack Situation Prediction." Mathematics 12, no. 6 (2024): 901. http://dx.doi.org/10.3390/math12060901.
Pełny tekst źródłaIndrayati, Liestiana. "INVENTARISASI NEMATODA PARASIT PADA TANAMAN, HEWAN DAN MANUSIA." EnviroScienteae 13, no. 3 (2017): 195. http://dx.doi.org/10.20527/es.v13i3.4306.
Pełny tekst źródłaHoward, Brett R., Daniel Barrios-O’Neill, Mhairi E. Alexander, et al. "Functional responses of a cosmopolitan invader demonstrate intraspecific variability in consumer-resource dynamics." PeerJ 6 (September 28, 2018): e5634. http://dx.doi.org/10.7717/peerj.5634.
Pełny tekst źródłaRiaz, SK, and V. Srirammanoj. "Sufficient Authentication for Energy Consumption in Wireless Sensor Networks." TELKOMNIKA Indonesian Journal of Electrical Engineering 16, no. 2 (2015): 316. http://dx.doi.org/10.11591/tijee.v16i2.1619.
Pełny tekst źródłaDass, Ruby, Manikandan Narayanan, Gayathri Ananthakrishnan, et al. "A Cluster-Based Energy-Efficient Secure Optimal Path-Routing Protocol for Wireless Body-Area Sensor Networks." Sensors 23, no. 14 (2023): 6274. http://dx.doi.org/10.3390/s23146274.
Pełny tekst źródłaAlshdadi, Abdulrahman A., Abdulwahab Ali Almazroi, Nasir Ayub, Miltiadis D. Lytras, Eesa Alsolami, and Faisal S. Alsubaei. "Big Data-Driven Deep Learning Ensembler for DDoS Attack Detection." Future Internet 16, no. 12 (2024): 458. https://doi.org/10.3390/fi16120458.
Pełny tekst źródłaAlshammari, Majid, and Khaled Elleithy. "Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks." Sensors 18, no. 10 (2018): 3569. http://dx.doi.org/10.3390/s18103569.
Pełny tekst źródłaSukavasi, Hema Gopinath, Lokesh Kanagala, and Riaz Shaik. "Sufficient Authentication for Energy Consumption in Wireless Sensor Networks." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 2 (2016): 735. http://dx.doi.org/10.11591/ijece.v6i2.9038.
Pełny tekst źródłaSukavasi, Hema Gopinath, Lokesh Kanagala, and Riaz Shaik. "Sufficient Authentication for Energy Consumption in Wireless Sensor Networks." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 2 (2016): 735. http://dx.doi.org/10.11591/ijece.v6i2.pp735-742.
Pełny tekst źródłaDhananjay, Krithika, and Emre Salman. "Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher." Electronics 10, no. 12 (2021): 1438. http://dx.doi.org/10.3390/electronics10121438.
Pełny tekst źródłaZakiya Manzoor Khan, Et al. "Trust Based Mechanism for Isolation of Malicious Nodes in Internet of Things." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 1689–95. http://dx.doi.org/10.17762/ijritcc.v11i10.8740.
Pełny tekst źródłaZakiya Manzoor Khan, Et al. "Trust based Mechanism for Isolation of Malicious Nodes in Internet of Things." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 709–14. http://dx.doi.org/10.17762/ijritcc.v11i9.8863.
Pełny tekst źródłaRahul, P. Neve, and Bansode Rajesh. "Attack Analysis on Hybrid-SIMON-SPECKey Lightweight Cryptographic Algorithm for IoT Applications." Indian Journal of Science and Technology 17, no. 10 (2024): 932–40. https://doi.org/10.17485/IJST/v17i10.2811.
Pełny tekst źródłaJia, Hefei, Xu Liu, Xiaoqiang Di, et al. "A Secure Virtual Machine Allocation Strategy Against Co-Resident Attacks." Journal of Advanced Computational Intelligence and Intelligent Informatics 23, no. 5 (2019): 898–908. http://dx.doi.org/10.20965/jaciii.2019.p0898.
Pełny tekst źródłaIlokanuno, Ogochukwu A. "Smart Meter Tampering Detection Using IoT Based Unsupervised Machine Learning." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 5434–45. http://dx.doi.org/10.22214/ijraset.2024.61153.
Pełny tekst źródłaHoward, BR, DTS Wong, V. Aguiar, et al. "Effects of perceived competition and water temperature on the functional responses of invasive and native crabs." Marine Ecology Progress Series 684 (February 17, 2022): 69–78. http://dx.doi.org/10.3354/meps13974.
Pełny tekst źródłaZhang, Yuanyuan, Ning Wu, Fang Zhou, Jinbao Zhang, and Muhammad Yahya. "A Countermeasure against DPA on SIMON with an Area-Efficient Structure." Electronics 8, no. 2 (2019): 240. http://dx.doi.org/10.3390/electronics8020240.
Pełny tekst źródłaGankotiya, Anil Kumar, Vishal Kumar, and Kunwar Singh Vaisla. "Cross-layer DDoS attack detection in wireless mesh networks using deep learning algorithm." Journal of Electrical Engineering 76, no. 1 (2025): 34–47. https://doi.org/10.2478/jee-2025-0004.
Pełny tekst źródła