Статті в журналах з теми "False Report Injection Attack"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "False Report Injection Attack".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Jungsub, Ahn, and Cho Taeho. "An Enhancement of Cluster-Based False Data Filtering Scheme Through Dynamic Security Selection in Wireless Sensor Networks." International Journal of Computer Networks & Communications (IJCNC) 11, no. 2 (2019): 83–94. https://doi.org/10.5281/zenodo.3233335.
Повний текст джерелаSanthosh, Gayathri, and Yogesh Palanichamy. "Rank-Based Report Filtering Scheme (RRFS) for Verifying Phoney Reports in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2020 (September 15, 2020): 1–22. http://dx.doi.org/10.1155/2020/2785960.
Повний текст джерелаSanghyeok, Lim, and Cho Taeho. "Improvement of False Report Detection Performance Based on Invalid Data Detection Using Neural Network in WSN." International Journal of Computer Networks & Communications (IJCNC) 10, no. 6 (2018): 21–34. https://doi.org/10.5281/zenodo.2349310.
Повний текст джерелаLee, Hyun Woo, and Tae Ho Cho. "An Effective Control Report Based Security Countermeasure against the Joint Attacks of False Report Injection Attack and Selective Forwarding Attack." Wireless Sensor Network 04, no. 08 (2012): 185–90. http://dx.doi.org/10.4236/wsn.2012.48027.
Повний текст джерелаTae-Ho, Cho, and Ahn Jung-Sub. "METHOD FOR THE PERIOD DETERMINATION OF SECURITY LEVEL UPDATE IN STATISTICAL EN-ROUTE FILTERING." International Journal of Research - Granthaalayah 5, no. 11 (2017): 158–67. https://doi.org/10.5281/zenodo.1069419.
Повний текст джерелаSu, Man Nam1 and Tae Ho Cho2. "A SECURITY METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE-REPORT INJECTION, FALSE-VOTE INJECTION, AND WORMHOLE ATTACKS." A SECURITY METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE-REPORT INJECTION, FALSE-VOTE INJECTION, AND WORMHOLE ATTACKS 02, dec (2014): 01–17. https://doi.org/10.5121/ieij.2014.2402.
Повний текст джерелаNam, Su Man, and Tae Ho Cho. "A Security Method for Multiple Attacks in Sensor Networks: Against the False Report Injection Attack and the Sinkhole Attack." International Journal on Information Theory 2, no. 4 (2013): 15–33. http://dx.doi.org/10.5121/ijit.2014.2402.
Повний текст джерелаSang-Hyeok, Lim, and Cho Tae-Ho. "WSN Lifetime Extension Using GA Optimised Fuzzy Logic." International Journal of Computer Science & Information Technology (IJCSIT) 9, no. 5 (2017): 1–14. https://doi.org/10.5121/ijcsit.2017.9501.
Повний текст джерелаCho, Tae-Ho, and Jung-Sub Ahn. "METHOD FOR THE PERIOD DETERMINATION OF SECURITY LEVEL UPDATE IN STATISTICAL EN-ROUTE FILTERING." International Journal of Research -GRANTHAALAYAH 5, no. 11 (2017): 158–67. http://dx.doi.org/10.29121/granthaalayah.v5.i11.2017.2340.
Повний текст джерелаYi, Chuanjun. "En-Route Message Authentication Scheme for Filtering False Data in WSNs." Security and Communication Networks 2021 (September 11, 2021): 1–18. http://dx.doi.org/10.1155/2021/4068507.
Повний текст джерелаNam, Su Man, and Tae Ho Cho. "A Security Method for Multiple Attacks in Sensor Networks: Against False-Report Injection, False-Vote Injection and Wormhole Attacks." Informatics Engineering, an International Journal 2, no. 4 (2014): 13–29. http://dx.doi.org/10.5121/ieij.2014.2402.
Повний текст джерелаHu, Pengfei, Wengen Gao, Yunfei Li, Minghui Wu, Feng Hua, and Lina Qiao. "Detection of False Data Injection Attacks in Smart Grids Based on Expectation Maximization." Sensors 23, no. 3 (2023): 1683. http://dx.doi.org/10.3390/s23031683.
Повний текст джерелаJung-sub, Ahn, and Cho Tae-ho. "Fuzzy Logic Optimization Method for Energy Efficiency Improvement of CFFS using GA in WSN." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 474–80. https://doi.org/10.35940/ijeat.F1524.089620.
Повний текст джерелаJae, Kwan Lee1 Su Man Nam2 and Tae Ho Cho3. "ENSP: ENERGY EFFICIENT NEXT HOP SELECTION IN A PROBABILISTIC VOTING-BASED FILTERING SCHEME USING FUZZY LOGIC." Informatics Engineering, an International Journal (IEIJ) 02, dec (2014): 01–12. https://doi.org/10.5121/ieij.2014.2401.
Повний текст джерелаElshazly, Amr A., Islam Elgarhy, Ahmed T. Eltoukhy, et al. "False Data Injection Attacks on Reinforcement Learning-Based Charging Coordination in Smart Grids and a Countermeasure." Applied Sciences 14, no. 23 (2024): 10874. http://dx.doi.org/10.3390/app142310874.
Повний текст джерелаM.Sasirekha, Thaseen .I Sumaiya, and Banu.J Saira. "A Defense Mechanism for Credit Card Fraud Detection." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 89–100. https://doi.org/10.5281/zenodo.3461713.
Повний текст джерелаM.Sasirekha, Thaseen .I Sumaiya, and Banu.J Saira. "A Defense Mechanism for Credit Card Fraud Detection." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 89–100. https://doi.org/10.5281/zenodo.3587436.
Повний текст джерелаMuhammad, K. Shahzad1 and Tae Ho Cho1. "AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELESS SENSOR NETWORKS." Informatics Engineering, an International Journal (IEIJ) 03, sep (2015): 01–16. https://doi.org/10.5121/ieij.2015.3302.
Повний текст джерелаYe-lim, Kang, and Cho Tae-ho. "Fuzzy-based Dynamic Security Parameters Determination Method to Improve Energy Efficiency." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 1952–58. https://doi.org/10.35940/ijeat.D9024.049420.
Повний текст джерелаB. Kalaiselvi, B. Kalaiselvi, Mannepalle Sai Chandu, Maridhu Narendra, and Mannepalle Deekshith Kumar. "SQL-Injection Vulnerability Scanning Tool for Automatic Creation of SQL-Injection Attacks." International Journal of Advances in Engineering and Management 7, no. 1 (2025): 577–87. https://doi.org/10.35629/5252-0701577587.
Повний текст джерелаShahzad, Muhammad K., S. M. Riazul Islam, Kyung-Sup Kwak, and Lewis Nkenyereye. "AEF: Adaptive En-Route Filtering to Extend Network Lifetime in Wireless Sensor Networks." Sensors 19, no. 18 (2019): 4036. http://dx.doi.org/10.3390/s19184036.
Повний текст джерелаYi, Chuanjun, Geng Yang, Hua Dai, Liang Liu, and Ning Li. "Public Key-Based Authentication and En-Route Filtering Scheme in Wireless Sensor Networks." Sensors 18, no. 11 (2018): 3829. http://dx.doi.org/10.3390/s18113829.
Повний текст джерелаNam, Su Man, and Tae Ho Cho. "Fuzzy-Based Energy Efficient Method for Multiple Attacks in Sensor Networks: Against False Vote and Report Injection Attacks." International Journal on Cybernetics & Informatics 2, no. 2 (2013): 1–12. http://dx.doi.org/10.5121/ijci.2013.2201.
Повний текст джерелаLiu, Jizhao, Weidong Yang, Junbao Zhang, and Changlin Yang. "Detecting false messages in vehicular ad hoc networks based on a traffic flow model." International Journal of Distributed Sensor Networks 16, no. 2 (2020): 155014772090639. http://dx.doi.org/10.1177/1550147720906390.
Повний текст джерелаShahzad, Muhammad K., S. M. Riazul Islam, Mahmud Hossain, Mohammad Abdullah-Al-Wadud, Atif Alamri, and Mehdi Hussain. "GAFOR: Genetic Algorithm Based Fuzzy Optimized Re-Clustering in Wireless Sensor Networks." Mathematics 9, no. 1 (2020): 43. http://dx.doi.org/10.3390/math9010043.
Повний текст джерелаBriland, Mathieu, and Fabrice Bouquet. "An Approach for Testing False Data Injection Attack on Data Dependent Industrial Devices." JUCS - Journal of Universal Computer Science 27, no. 7 (2021): 774–92. http://dx.doi.org/10.3897/jucs.70326.
Повний текст джерелаBriland, Mathieu, and Fabrice Bouquet. "An Approach for Testing False Data Injection Attack on Data Dependent Industrial Devices." JUCS - Journal of Universal Computer Science 27, no. (7) (2021): 774–92. https://doi.org/10.3897/jucs.70326.
Повний текст джерелаRouhani, Seyed Hossein, Hamed Mojallali, and Alfred Baghramian. "Load frequency control in the presence of simultaneous cyber-attack and participation of demand response program." Transactions of the Institute of Measurement and Control 44, no. 10 (2022): 1993–2011. http://dx.doi.org/10.1177/01423312211068645.
Повний текст джерелаSheng, Jingyuan. "Research on SQL Injection Attack and Defense Technology of Power Dispatching Data Network: Based on Data Mining." Mobile Information Systems 2022 (July 30, 2022): 1–8. http://dx.doi.org/10.1155/2022/6207275.
Повний текст джерелаDeng, Wenping, Ziyu Yang, Peng Xun, Peidong Zhu, and Baosheng Wang. "Advanced Bad Data Injection Attack and Its Migration in Cyber-Physical Systems." Electronics 8, no. 9 (2019): 941. http://dx.doi.org/10.3390/electronics8090941.
Повний текст джерелаAhmed, Mohiuddin. "False Image Injection Prevention Using iChain." Applied Sciences 9, no. 20 (2019): 4328. http://dx.doi.org/10.3390/app9204328.
Повний текст джерелаYu, Xiaoquan, Wei Li, Shuo Li, Yingze Yang, and Jun Peng. "False Data Injection Attack Detection for Virtual Coupling Systems of Heavy-Haul Trains: A Deep Learning Approach." Journal of Advanced Computational Intelligence and Intelligent Informatics 29, no. 1 (2025): 175–86. https://doi.org/10.20965/jaciii.2025.p0175.
Повний текст джерелаHua, Yi, Feng Chen, Shuwei Deng, Shukai Duan, and Lidan Wang. "Secure distributed estimation against false data injection attack." Information Sciences 515 (April 2020): 248–62. http://dx.doi.org/10.1016/j.ins.2019.12.016.
Повний текст джерелаMitropoulos, Dimitris, and Diomidis Spinellis. "Fatal injection: a survey of modern code injection attack countermeasures." PeerJ Computer Science 3 (November 27, 2017): e136. http://dx.doi.org/10.7717/peerj-cs.136.
Повний текст джерелаWu, Po, Jiangnan Zhang, Shengyao Luo, Yanlou Song, Jiawei Zhang, and Yi Wang. "A Fusion Adaptive Cubature Kalman Filter Approach for False Data Injection Attack Detection of DC Microgrids." Electronics 13, no. 9 (2024): 1612. http://dx.doi.org/10.3390/electronics13091612.
Повний текст джерелаLu, Rentao, and Jie Wang. "Distributed Control for AC Microgrids with False Data Injection Attacks and Time Delays." E3S Web of Conferences 194 (2020): 03023. http://dx.doi.org/10.1051/e3sconf/202019403023.
Повний текст джерелаTang, Xu, Jing Wang, Xiaohong Ran, Kaipei Liu, and Liang Qin. "False Data Injection Attack Against the Optimal Energy Management of Active Distribution Networks: A Bilevel Programming Model." Journal of Physics: Conference Series 2662, no. 1 (2023): 012006. http://dx.doi.org/10.1088/1742-6596/2662/1/012006.
Повний текст джерелаChaudhary, Pooja, B. B. Gupta, and Shashank Gupta. "A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network." International Journal of Information Technology and Web Engineering 14, no. 1 (2019): 85–111. http://dx.doi.org/10.4018/ijitwe.2019010105.
Повний текст джерелаYe, Jun. "Estimation of False Data Injection Attacks for Load Frequency Control Systems." Journal of Physics: Conference Series 2076, no. 1 (2021): 012093. http://dx.doi.org/10.1088/1742-6596/2076/1/012093.
Повний текст джерелаNarasimhan, Shilpa, Matthew J. Ellis, and Nael H. El-Farra. "Detection of Multiplicative False Data Injection Cyberattacks on Process Control Systems via Randomized Control Mode Switching." Processes 12, no. 2 (2024): 327. http://dx.doi.org/10.3390/pr12020327.
Повний текст джерелаAl-Marshoud, Mishri Saleh, Ali H. Al-Bayatti, and Mehmet Sabir Kiraz. "Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs." Electronics 10, no. 11 (2021): 1302. http://dx.doi.org/10.3390/electronics10111302.
Повний текст джерелаXu, Aidong, Tengyue Zhang, Liang Chen, et al. "Research on False Data Injection Attack in Smart Grid." IOP Conference Series: Earth and Environmental Science 693, no. 1 (2021): 012010. http://dx.doi.org/10.1088/1755-1315/693/1/012010.
Повний текст джерелаLi, Xiaohang, Chunlin Song, Shaokun Liu, and Jinlong Li. "Adaptive Compensation Control under Constant False Data Injection Attack." IOP Conference Series: Materials Science and Engineering 782 (April 15, 2020): 032072. http://dx.doi.org/10.1088/1757-899x/782/3/032072.
Повний текст джерелаLei, L., W. Yang, C. Yang, and H. B. Shi. "False data injection attack on consensus-based distributed estimation." International Journal of Robust and Nonlinear Control 27, no. 9 (2016): 1419–32. http://dx.doi.org/10.1002/rnc.3645.
Повний текст джерелаTian, Jiwei, Buhong Wang, and Xia Li. "Data-Driven and Low-Sparsity False Data Injection Attacks in Smart Grid." Security and Communication Networks 2018 (September 26, 2018): 1–11. http://dx.doi.org/10.1155/2018/8045909.
Повний текст джерелаShang, Fute, Buhong Wang, Fuhu Yan, and Tengyao Li. "Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems." Security and Communication Networks 2019 (March 3, 2019): 1–11. http://dx.doi.org/10.1155/2019/8936784.
Повний текст джерелаHu, Jiamin, Xiaofan Yang, and Luxing Yang. "A Novel Diagnosis Scheme against Collusive False Data Injection Attack." Sensors 23, no. 13 (2023): 5943. http://dx.doi.org/10.3390/s23135943.
Повний текст джерелаSu, Man Nam, and Ho Cho Tae. "A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL ENROUTE FILTERING BASED WSNS." Advances in Vision Computing: An International Journal (AVC) 3, no. 3 (2016): 09–16. https://doi.org/10.5281/zenodo.3518809.
Повний текст джерелаSu, Man Nam, and Ho Cho Tae. "A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL ENROUTE FILTERING BASED WSNS." Advances in Vision Computing: An International Journal (AVC) 3, no. 3 (2016): 09–16. https://doi.org/10.5281/zenodo.3689099.
Повний текст джерелаXia, Meng, Dajun Du, Minrui Fei, Xue Li, and Taicheng Yang. "A Novel Sparse Attack Vector Construction Method for False Data Injection in Smart Grids." Energies 13, no. 11 (2020): 2940. http://dx.doi.org/10.3390/en13112940.
Повний текст джерела