Статті в журналах з теми "Computer attack"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Computer attack".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Sukma Aji, Davito Rasendriya Rizqullah Putra, Imam Riadi, Abdul Fadlil, and Muhammad Nur Faiz. "A Classification Data Packets Using the Threshold Method for Detection of DDoS." Journal of Innovation Information Technology and Application (JINITA) 6, no. 1 (June 28, 2024): 28–36. http://dx.doi.org/10.35970/jinita.v6i1.2224.
Повний текст джерелаvan Heerden, R. P., B. Irwin, I. D. Burke, and L. Leenen. "A Computer Network Attack Taxonomy and Ontology." International Journal of Cyber Warfare and Terrorism 2, no. 3 (July 2012): 12–25. http://dx.doi.org/10.4018/ijcwt.2012070102.
Повний текст джерелаParadise, Paradise, Wahyu Adi Prabowo, and Teguh Rijanandi. "Analysis of Distributed Denial of Service Attacks Using Support Vector Machine and Fuzzy Tsukamoto." JURNAL MEDIA INFORMATIKA BUDIDARMA 7, no. 1 (January 28, 2023): 66. http://dx.doi.org/10.30865/mib.v7i1.5199.
Повний текст джерелаRamli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (October 17, 2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.
Повний текст джерелаGunawan, Teddy Surya, Muhammad Kasim Lim, Mira Kartiwi, Noreha Abdul Malik, and Nanang Ismail. "Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 729. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp729-737.
Повний текст джерелаWidodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (January 25, 2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.
Повний текст джерелаSun, Fei Xian. "Danger Theory Based Risk Evaluation Model for Smurf Attacks." Key Engineering Materials 467-469 (February 2011): 515–21. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.515.
Повний текст джерелаKhaliq, Abdul, and Sri Novida Sari. "PEMANFAATAN KERANGKA KERJA INVESTIGASI FORENSIK JARINGAN UNTUK IDENTIFIKASI SERANGAN JARINGAN MENGGUNAKAN SISTEM DETEKSI INTRUSI (IDS)." Jurnal Nasional Teknologi Komputer 2, no. 3 (August 18, 2022): 150–58. http://dx.doi.org/10.61306/jnastek.v2i3.52.
Повний текст джерелаLi, Biao. "Research on Computer Network Security and Prevention Strategy." Applied Mechanics and Materials 608-609 (October 2014): 526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.526.
Повний текст джерелаMiao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (July 2021): 1–36. http://dx.doi.org/10.1145/3465171.
Повний текст джерелаGlīzds, Lauris, and Artis Teilāns. "COMPUTER SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 21 (April 19, 2017): 101–8. http://dx.doi.org/10.17770/het2017.21.3588.
Повний текст джерелаJain, Lalit. "Computer Network: An Implementation of MAC Spoofing." International Journal of Engineering and Computer Science 12, no. 05 (May 16, 2023): 25717–21. http://dx.doi.org/10.18535/ijecs/v12i05.4733.
Повний текст джерелаGlăvan, Dragoș. "Sniffing attacks on computer networks." Scientific Bulletin of Naval Academy XXIII, no. 1 (July 15, 2020): 202–7. http://dx.doi.org/10.21279/1454-864x-20-i1-027.
Повний текст джерелаQuroturohman, Denis. "PENETRATION TESTING DALAM FORENSIK DIGITAL PADA JARINGAN FAKULTAS TEKNIK UNIVERSITAS IBN KHALDUN BOGOR DENGAN PING OF DEATH." Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 4, no. 2 (November 3, 2021): 81. http://dx.doi.org/10.32832/inova-tif.v4i2.5812.
Повний текст джерелаPaul, Surjit, Sanjay Kumar, and Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security." International Journal of Information Security and Privacy 13, no. 4 (October 2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.
Повний текст джерелаMaulana, Muhamad, Ahmad Luthfi, and Dwi Kurnia Wibowo. "Network Attacks Classification for Network Forensics Investigation: Literature Reviews." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7, no. 5 (October 1, 2023): 1132–39. http://dx.doi.org/10.29207/resti.v7i5.5153.
Повний текст джерелаRicho Muhhamad Farhan and Gregorius Hendita Artha Kusuma. "Teknik Sniffing Jaringan Menggunakan Wireshark." Journal of Informatics and Advanced Computing (JIAC) 4, no. 1 (May 1, 2023): 87–93. https://doi.org/10.35814/jiac.v4i1.5503.
Повний текст джерелаWahyu Wijaya Widiyanto and Rizka Licia. "Detection of Attacks in Computer Networks Using C4.5 Decision Tree Algorithm: An Approach to Network Security." International Journal of Information Engineering and Science 1, no. 4 (October 15, 2024): 01–12. http://dx.doi.org/10.62951/ijies.v1i4.48.
Повний текст джерелаMohammed, Moona Olakara. "Automatic Port Scanner." Volume 5 - 2020, Issue 9 - September 5, no. 9 (September 29, 2020): 711–17. http://dx.doi.org/10.38124/ijisrt20sep503.
Повний текст джерелаLee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (July 20, 2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.
Повний текст джерелаSun, Fei Xian, and Zhi Gang Wu. "Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness." Advanced Materials Research 181-182 (January 2011): 66–71. http://dx.doi.org/10.4028/www.scientific.net/amr.181-182.66.
Повний текст джерелаКобцев, О. Е., А. И. Шеншин, В. М. Питолин, Л. В. Паринова, В. Г. Юрасов, and Д. С. Печкин. "NETWORK ATTACKS BY COMPUTER VIRUSES: RISK LANDSCAPE." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 27, no. 1(-) (March 29, 2024): 55–66. http://dx.doi.org/10.36622/1682-7813.2024.27.1.003.
Повний текст джерелаStepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (May 16, 2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.
Повний текст джерелаDjanie, Tutu, and Dzisi. "A Proposed DoS Detection Scheme for Mitigating DoS Attack Using Data Mining Techniques." Computers 8, no. 4 (November 26, 2019): 85. http://dx.doi.org/10.3390/computers8040085.
Повний текст джерелаPetrov, M., and R. Fatkieva. "Model of Synthesis of Distributed Attacking Elements in a Computer Network." Proceedings of Telecommunication Universities 6, no. 2 (2020): 113–20. http://dx.doi.org/10.31854/1813-324x-2020-6-2-113-120.
Повний текст джерелаWijayanto, Agus, Imam Riadi, Yudi Prayudi, and Tri Sudinugraha. "Network Forensics Against Address Resolution Protocol Spoofing Attacks Using Trigger, Acquire, Analysis, Report, Action Method." Register: Jurnal Ilmiah Teknologi Sistem Informasi 8, no. 2 (January 7, 2023): 156–69. http://dx.doi.org/10.26594/register.v8i2.2953.
Повний текст джерелаAngelakis, Dimitris, Errikos Ventouras, Spyros Kostopoulos, and Pantelis Asvestas. "Cybersecurity Issues in Brain-Computer Interfaces: Analysis of Existing Bluetooth Vulnerabilities." Digital Technologies Research and Applications 3, no. 2 (July 10, 2024): 115–39. http://dx.doi.org/10.54963/dtra.v3i2.286.
Повний текст джерелаDevi, Savita, and Taran Singh Bharti. "A Review on Detection and Mitigation Analysis of Distributed Denial of Service Attacks and Their Effects on the Cloud." International Journal of Cloud Applications and Computing 12, no. 1 (January 1, 2022): 1–21. http://dx.doi.org/10.4018/ijcac.311036.
Повний текст джерелаRao, Yerra Shankar, Aswin Kumar Rauta, Satya Narayan Kund, Bhagirathi Sethi, and Jangyadatta Behera. "Mathematical Model on Distributed Denial of Service Attack in the Computer Network." WSEAS TRANSACTIONS ON COMMUNICATIONS 22 (December 31, 2023): 183–91. http://dx.doi.org/10.37394/23204.2023.22.18.
Повний текст джерелаErata, Ferhat, Chuanqi Xu, Ruzica Piskac, and Jakub Szefer. "Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 2 (March 12, 2024): 735–68. http://dx.doi.org/10.46586/tches.v2024.i2.735-768.
Повний текст джерелаUNDERCOFFER, JEFFREY, ANUPAM JOSHI, TIM FININ, and JOHN PINKSTON. "Using DAML+OIL to classify intrusive behaviours." Knowledge Engineering Review 18, no. 3 (September 2003): 221–41. http://dx.doi.org/10.1017/s0269888904000049.
Повний текст джерелаShan, Chun, Benfu Jiang, Jingfeng Xue, Fang Guan, and Na Xiao. "An Approach for Internal Network Security Metric Based on Attack Probability." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3652170.
Повний текст джерелаLi, Feng, and Hai Ying Wang. "Design on DDoS Attack Detection and Prevention Systems." Applied Mechanics and Materials 530-531 (February 2014): 798–801. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.798.
Повний текст джерелаShang, Yilun. "Optimal Control Strategies for Virus Spreading in Inhomogeneous Epidemic Dynamics." Canadian Mathematical Bulletin 56, no. 3 (September 1, 2013): 621–29. http://dx.doi.org/10.4153/cmb-2012-007-2.
Повний текст джерелаBarik, Mridul Sankar, Anirban Sengupta, and Chandan Mazumdar. "Attack Graph Generation and Analysis Techniques." Defence Science Journal 66, no. 6 (October 31, 2016): 559. http://dx.doi.org/10.14429/dsj.66.10795.
Повний текст джерелаSharma, Vijay Prakash, Narendra Singh Yadav, Sundar Suhrith Adavi, D. Sikha Datta Reddy, and Brij B. Gupta. "A two stage hybrid intrusion detection using genetic algorithm in IoT networks." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 667–76. http://dx.doi.org/10.47974/jdmsc-1737.
Повний текст джерелаWang, Rui, Yingxian Chang, Lei Ma, Hao Zhang, Xin Liu, Jianfei Chen, Donglan Liu, Yong Zhang, and Bing Su. "The Border Attack Defense System is Software-Based." Journal of Physics: Conference Series 2074, no. 1 (November 1, 2021): 012041. http://dx.doi.org/10.1088/1742-6596/2074/1/012041.
Повний текст джерелаYudhana, Anton, Imam Riadi, and Sri Suharti. "Distributed Denial of Service (DDoS) Analysis on Virtual Network and Real Network Traffic." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 5, no. 1 (July 16, 2021): 112–21. http://dx.doi.org/10.31289/jite.v5i1.5344.
Повний текст джерелаQin, Yuan. "Computer Network Attack Modeling and Network Attack Graph Study." Advanced Materials Research 1079-1080 (December 2014): 816–19. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.816.
Повний текст джерелаZhao, Min, Danyang Qin, Ruolin Guo, and Guangchao Xu. "Efficient Protection Mechanism Based on Self-Adaptive Decision for Communication Networks of Autonomous Vehicles." Mobile Information Systems 2020 (June 10, 2020): 1–9. http://dx.doi.org/10.1155/2020/2168086.
Повний текст джерелаKondakov, Sergey, and Ilya Rud. "Model of the Process of Conducting Computer Attacks Using Special Information Influences." Voprosy kiberbezopasnosti, no. 5(45) (2021): 12–20. http://dx.doi.org/10.21681/2311-3456-2021-5-12-20.
Повний текст джерелаFRĂȚILĂ, Andreea-Ioana. "Analysis of Computer Malware and Common Attacks." International Journal of Information Security and Cybercrime 9, no. 2 (December 30, 2020): 38–45. http://dx.doi.org/10.19107/ijisc.2020.02.06.
Повний текст джерелаLazarov, Andon D. "Mathematical Modelling of Malware Intrusion in Computer Networks." Cybernetics and Information Technologies 22, no. 3 (September 1, 2022): 29–47. http://dx.doi.org/10.2478/cait-2022-0026.
Повний текст джерелаRaj Panakadan, Rusheel, Chitluri Dhanush, and Dr Carmel Mary Belinda. "An effective solution for DDOS attack." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 194. http://dx.doi.org/10.14419/ijet.v7i1.7.10650.
Повний текст джерелаSilalahi, Putri Rosayanti, and Sunarsan Sitohang. "ANALISIS KEAMANAN JARINGAN PADA FASILITAS WIFI TERHADAP SERANGAN SNIFFING DI PT DUTA COMPUTER." Computer and Science Industrial Engineering (COMASIE) 9, no. 8 (October 9, 2023): 30. http://dx.doi.org/10.33884/comasiejournal.v9i8.7954.
Повний текст джерелаAdhar, Sandi, and Usep Saprudin. "Implementasi Cloudflare Zero Trust Dalam Mendeteksi Aktivitas Cryptojcking Pada Jaringan Komputer." JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi) 6, no. 1 (January 20, 2023): 23. http://dx.doi.org/10.56327/jtksi.v6i1.1388.
Повний текст джерелаKurniawan, Andre Arta, Jusak, and Musayyanah. "Intrusion Detection System Using Deep Learning for DoS Attack Detection." JEECS (Journal of Electrical Engineering and Computer Sciences) 6, no. 2 (December 31, 2021): 1087–98. http://dx.doi.org/10.54732/jeecs.v6i2.203.
Повний текст джерелаGoparaju, Bhargavi, and Dr Bandla Srinivasa Rao. "A DDoS Attack Detection using PCA Dimensionality Reduction and Support Vector Machine." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 1s (January 8, 2023): 01–08. http://dx.doi.org/10.17762/ijcnis.v14i1s.5586.
Повний текст джерелаSalih, Azar Abid, and Maiwan Bahjat Abdulrazzaq. "Cyber security: performance analysis and challenges for cyber attacks detection." Indonesian Journal of Electrical Engineering and Computer Science 31, no. 3 (September 1, 2023): 1763. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1763-1775.
Повний текст джерелаSharma, Kavita, and B. B. Gupta. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices." International Journal of E-Services and Mobile Applications 10, no. 2 (April 2018): 58–74. http://dx.doi.org/10.4018/ijesma.2018040104.
Повний текст джерела