Auswahl der wissenschaftlichen Literatur zum Thema „Trust attacks Prevention“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Trust attacks Prevention" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Trust attacks Prevention"
Karabacak, Bilge, und Todd Whittaker. „Zero Trust and Advanced Persistent Threats: Who Will Win the War?“ International Conference on Cyber Warfare and Security 17, Nr. 1 (02.03.2022): 92–101. http://dx.doi.org/10.34190/iccws.17.1.10.
Der volle Inhalt der QuelleLi, Lixiang, Jürgen Kurths, Yixian Yang und Guole Liu. „Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks“. Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/189213.
Der volle Inhalt der QuelleKhan, Muhammad Ali, Rao Naveed Bin Rais, Osman Khalid und Sanan Ahmad. „Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks“. Sensors 24, Nr. 6 (09.03.2024): 1775. http://dx.doi.org/10.3390/s24061775.
Der volle Inhalt der QuelleS, Ananthakumaran. „Prevention of Routing Attacks using Trust-Based Multipath Protocol“. International Journal of Advanced Trends in Computer Science and Engineering 9, Nr. 3 (25.06.2020): 4022–29. http://dx.doi.org/10.30534/ijatcse/2020/227932020.
Der volle Inhalt der QuelleAtiq, Eman, Maheen Mujeeb und Mujeeb Ur Rehman. „An Epidemiological study of Acid Burn Incidents in Pakistan: Causes, Consequences and Prevention Strategies“. British journal of Psychology Research 11, Nr. 2 (15.02.2023): 51–58. http://dx.doi.org/10.37745/bjpr.2013/vol11n25158.
Der volle Inhalt der QuelleBoakye-Boateng, Kwasi, Ali A. Ghorbani und Arash Habibi Lashkari. „A Trust-Influenced Smart Grid: A Survey and a Proposal“. Journal of Sensor and Actuator Networks 11, Nr. 3 (11.07.2022): 34. http://dx.doi.org/10.3390/jsan11030034.
Der volle Inhalt der QuelleSalahdine, Fatima, und Naima Kaabouch. „Social Engineering Attacks: A Survey“. Future Internet 11, Nr. 4 (02.04.2019): 89. http://dx.doi.org/10.3390/fi11040089.
Der volle Inhalt der QuelleSubathra, P., S. Sivagurunathan und N. Ramaraj. „Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks“. International Journal of Business Data Communications and Networking 6, Nr. 1 (Januar 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.
Der volle Inhalt der QuelleMoinescu, Radu. „Study of social engineering attacks in Romania 2019“. Scientific Bulletin of Naval Academy XXIII, Nr. 1 (15.07.2020): 263–70. http://dx.doi.org/10.21279/1454-864x-20-i1-037.
Der volle Inhalt der QuelleQuader, Faisal, und Vandana P. Janeja. „Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies“. Journal of Cybersecurity and Privacy 1, Nr. 4 (11.11.2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.
Der volle Inhalt der QuelleDissertationen zum Thema "Trust attacks Prevention"
Masmoudi, Mariam. „Prévention des attaques de confiance en temps réel dans l'IoT social“. Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.
Der volle Inhalt der QuelleThe social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
Alruwaili, Fahad F. „Information security, privacy, and compliance models for cloud computing services“. Thesis, 2016. http://hdl.handle.net/1828/7119.
Der volle Inhalt der QuelleGraduate
0984
0790
fahd333@gmail.com
Bücher zum Thema "Trust attacks Prevention"
Office, General Accounting. Financial management: Recommendations on Indian trust fund Strategic Plan proposals : report to the Secretary of the Interior. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1997.
Den vollen Inhalt der Quelle findenUnited States. Congress. Senate. Committee on Indian Affairs., Hrsg. Financial management: Creation of Bureau of Indian Affairs' Trust Fund Special Projects Team : report to the Chairman, Committee on Indian Affairs, U.S. Senate. Washington, D.C: The Office, 1993.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Financial management: Status of the governmentwide efforts to address improper payment problems : report to the Subcommittee on Government Efficiency and Financial Management, Committee on Government Reform, House of Representatives. Washington, D.C: GAO, 2003.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Financial management: Survey of capitalization threshold and other policies for property, plant, and equipment : report to Agency officials. Washington, D.C: U.S. General Accounting Office, 2002.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Financial management: Profile of Army financial managers : report to the Assistant Secretary of the Army (Financial Management and Comptroller). Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1998.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Financial management: Differences in Army and Air Force disbursing and accounting records : report to the Honorable Charles E. Grassley, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 2000.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Financial management: Coordinated approach needed to address the government's improper payments problems : report to the Ranking Minority Member, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: United States General Accounting Office, 2002.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Financial management: Profile of Navy and Marine Corps financial managers : report to the Acting Assistant Secretary of the Navy (Financial Management and Comptroller). Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1998.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Financial management: Problems in accounting for Navy transactions impair funds control and financial reporting : report to agency officials. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Financial management: An overview of finance and accounting activities in DOD : report to the Chairman, Subcommittee on Defense, Committee on Appropriations, U.S. Senate. Washington, D.C: The Office, 1997.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Trust attacks Prevention"
Sardar, Mousumi, Subhashis Banerjee, Kishore Majhi und Koushik Majumder. „Trust Based Network Layer Attacks Prevention in MANET“. In Lecture Notes in Electrical Engineering, 193–204. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.
Der volle Inhalt der QuelleChouhan, Piyush, und Swapnil Jain. „Prevention of DDoS Attack Through Trust Management System for VANET Environment“. In Second International Conference on Computer Networks and Communication Technologies, 424–35. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37051-0_49.
Der volle Inhalt der QuelleRoy, Amit Kumar, und Ajoy Kumar Khan. „Prevention Against Internal Attack via Trust-Based Detection for Wireless Mesh Networks“. In Lecture Notes in Electrical Engineering, 109–17. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5341-7_8.
Der volle Inhalt der QuelleSingla, Bhawna, A. K. Verma und L. R. Raheja. „Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection“. In Machine Learning for Computer and Cyber Security, 258–77. Boca Raton, FL : Taylor & Francis Group, [2019] | “A science publishers book.”: CRC Press, 2019. http://dx.doi.org/10.1201/9780429504044-11.
Der volle Inhalt der Quelle„Chapter 7: Terrorism prevention through trust-building“. In A Mindsponge-Based Investigation into the Psycho-Religious Mechanism Behind Suicide Attacks, 70–82. Sciendo, 2021. http://dx.doi.org/10.2478/9788366675599-013.
Der volle Inhalt der QuelleShukla, Piyush Kumar, und Kirti Raj Bhatele. „Security in Ad-Hoc Networks (MANETS)“. In Next Generation Wireless Network Security and Privacy, 286–312. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8687-8.ch010.
Der volle Inhalt der QuelleKapoor, Janesh, und Nor Azlina Abdul Rahman. „Organizational Security Improvement in Preventing Deepfake Ransomware“. In Digital Innovation Adoption: Architectural Recommendations and Security Solutions, 58–78. BENTHAM SCIENCE PUBLISHERS, 2024. http://dx.doi.org/10.2174/9789815079661124010009.
Der volle Inhalt der QuelleRevathy P und Belshia Jebamalar G. „A Review Based on Secure Banking Application Against Server Attacks“. In Advances in Parallel Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210044.
Der volle Inhalt der QuelleGorman, Sara E., und Jack M. Gorman. „The Attack on Health and Science Institutions“. In Denying to the Grave, 303–32. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197547458.003.0009.
Der volle Inhalt der QuelleDe Rango, Floriano. „Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs“. In Networking and Telecommunications, 1488–505. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch097.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Trust attacks Prevention"
Rathour, Shimmi Singh, und Nitin Manjhi. „Trust base hybrid approach for detection and prevention MANET from attacks“. In 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). IEEE, 2016. http://dx.doi.org/10.1109/icacdot.2016.7877737.
Der volle Inhalt der QuelleChoudhary, Sarika, und Nishtha Kesswani. „Detection and Prevention of Routing Attacks in Internet of Things“. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018. http://dx.doi.org/10.1109/trustcom/bigdatase.2018.00219.
Der volle Inhalt der QuelleVaseer, Gurveen, Garima Ghai und Dhruva Ghai. „Distributed Trust-Based Multiple Attack Prevention for Secure MANETs“. In 2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS). IEEE, 2018. http://dx.doi.org/10.1109/ises.2018.00032.
Der volle Inhalt der QuelleGriscioli, Federico, Maurizio Pizzonia und Marco Sacchetti. „USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction“. In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7907004.
Der volle Inhalt der QuelleGhosh, Shamit, und Dipanwita Roy Chowdhury. „Preventing fault attack on stream cipher using randomization“. In 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2015. http://dx.doi.org/10.1109/hst.2015.7140243.
Der volle Inhalt der QuelleDachowicz, Adam, Mikhail Atallah und Jitesh H. Panchal. „Extraction and Analysis of Spatial Correlation Micrograph Features for Traceability in Manufacturing“. In ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-98378.
Der volle Inhalt der QuellePadmanabhan, Jayashree, K. S. Easwarakumar, Gokul B. und Harishankar S. „Trust based traffic monitoring approach for preventing denial of service attacks“. In the 2nd international conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1626195.1626245.
Der volle Inhalt der QuelleBhawsar, Aditya, Yogadhar Pandey und Upendra Singh. „Detection and Prevention of Wormhole Attack using the Trust-based Routing System“. In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2020. http://dx.doi.org/10.1109/icesc48915.2020.9156009.
Der volle Inhalt der QuelleSaxena, Mohit. „A mutual playmate attack prevention algorithm enhancing trust levels in MANET's systems“. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7155036.
Der volle Inhalt der QuelleNakano, Hironori, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida und Iwao Sasase. „Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN“. In 2019 25th Asia-Pacific Conference on Communications (APCC). IEEE, 2019. http://dx.doi.org/10.1109/apcc47188.2019.9026521.
Der volle Inhalt der Quelle