Zeitschriftenartikel zum Thema „Trust attacks Prevention“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Trust attacks Prevention" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Karabacak, Bilge, und Todd Whittaker. „Zero Trust and Advanced Persistent Threats: Who Will Win the War?“ International Conference on Cyber Warfare and Security 17, Nr. 1 (02.03.2022): 92–101. http://dx.doi.org/10.34190/iccws.17.1.10.
Der volle Inhalt der QuelleLi, Lixiang, Jürgen Kurths, Yixian Yang und Guole Liu. „Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks“. Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/189213.
Der volle Inhalt der QuelleKhan, Muhammad Ali, Rao Naveed Bin Rais, Osman Khalid und Sanan Ahmad. „Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks“. Sensors 24, Nr. 6 (09.03.2024): 1775. http://dx.doi.org/10.3390/s24061775.
Der volle Inhalt der QuelleS, Ananthakumaran. „Prevention of Routing Attacks using Trust-Based Multipath Protocol“. International Journal of Advanced Trends in Computer Science and Engineering 9, Nr. 3 (25.06.2020): 4022–29. http://dx.doi.org/10.30534/ijatcse/2020/227932020.
Der volle Inhalt der QuelleAtiq, Eman, Maheen Mujeeb und Mujeeb Ur Rehman. „An Epidemiological study of Acid Burn Incidents in Pakistan: Causes, Consequences and Prevention Strategies“. British journal of Psychology Research 11, Nr. 2 (15.02.2023): 51–58. http://dx.doi.org/10.37745/bjpr.2013/vol11n25158.
Der volle Inhalt der QuelleBoakye-Boateng, Kwasi, Ali A. Ghorbani und Arash Habibi Lashkari. „A Trust-Influenced Smart Grid: A Survey and a Proposal“. Journal of Sensor and Actuator Networks 11, Nr. 3 (11.07.2022): 34. http://dx.doi.org/10.3390/jsan11030034.
Der volle Inhalt der QuelleSalahdine, Fatima, und Naima Kaabouch. „Social Engineering Attacks: A Survey“. Future Internet 11, Nr. 4 (02.04.2019): 89. http://dx.doi.org/10.3390/fi11040089.
Der volle Inhalt der QuelleSubathra, P., S. Sivagurunathan und N. Ramaraj. „Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks“. International Journal of Business Data Communications and Networking 6, Nr. 1 (Januar 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.
Der volle Inhalt der QuelleMoinescu, Radu. „Study of social engineering attacks in Romania 2019“. Scientific Bulletin of Naval Academy XXIII, Nr. 1 (15.07.2020): 263–70. http://dx.doi.org/10.21279/1454-864x-20-i1-037.
Der volle Inhalt der QuelleQuader, Faisal, und Vandana P. Janeja. „Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies“. Journal of Cybersecurity and Privacy 1, Nr. 4 (11.11.2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.
Der volle Inhalt der QuelleSrinivas, T. Aditya Sai, und S. S. Manivannan. „Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing“. Journal of Ambient Intelligence and Smart Environments 13, Nr. 2 (26.03.2021): 133–56. http://dx.doi.org/10.3233/ais-210591.
Der volle Inhalt der QuelleAl-Shareeda, Mahmood A., Selvakumar Manickam, Murtaja Ali Saare und Navaneethan C. Arjuman. „Proposed security mechanism for preventing fake router advertisement attack in IPv6 link-local network“. Indonesian Journal of Electrical Engineering and Computer Science 29, Nr. 1 (01.01.2022): 518. http://dx.doi.org/10.11591/ijeecs.v29.i1.pp518-526.
Der volle Inhalt der QuelleOvaz Akpinar, Kevser, und Ibrahim Ozcelik. „Development of the ECAT Preprocessor with the Trust Communication Approach“. Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/2639750.
Der volle Inhalt der QuelleKarri, Ganesh Reddy, A. V. Prabu, Sidheswar Routray, D. Sumathi, S. Rajasoundaran, Amrit Mukherjee, Pushpita Chatterjee und Waleed Alnumay. „Efficient Key Management Mechanism with Trusted Gateways for Wireless Mesh Networks“. Wireless Communications and Mobile Computing 2022 (17.08.2022): 1–20. http://dx.doi.org/10.1155/2022/7240795.
Der volle Inhalt der QuelleAndrade, Rui, Isabel Praça, Sinan Wannous und Sergio Ramos. „The Impact of Attacks in LEM and Prevention Measures Based on Forecasting and Trust Models“. Processes 9, Nr. 2 (08.02.2021): 314. http://dx.doi.org/10.3390/pr9020314.
Der volle Inhalt der QuelleUllah, Ikram, Gerard de Roode, Nirvana Meratnia und Paul Havinga. „Threat Modeling—How to Visualize Attacks on IOTA?“ Sensors 21, Nr. 5 (06.03.2021): 1834. http://dx.doi.org/10.3390/s21051834.
Der volle Inhalt der QuelleMartínez, Jeferson, und Javier M. Durán. „Software Supply Chain Attacks, a Threat to Global Cybersecurity: SolarWinds’ Case Study“. International Journal of Safety and Security Engineering 11, Nr. 5 (31.10.2021): 537–45. http://dx.doi.org/10.18280/ijsse.110505.
Der volle Inhalt der QuelleChandan, Radha Raman, Awatef Balobaid, Naga Lakshmi Sowjanya Cherukupalli, Gururaj H L, Francesco Flammini und Rajesh Natarajan. „Secure Modern Wireless Communication Network Based on Blockchain Technology“. Electronics 12, Nr. 5 (22.02.2023): 1095. http://dx.doi.org/10.3390/electronics12051095.
Der volle Inhalt der QuelleUslu, Suleyman, Davinder Kaur, Mimoza Durresi und Arjan Durresi. „Trustability for Resilient Internet of Things Services on 5G Multiple Access Edge Cloud Computing“. Sensors 22, Nr. 24 (16.12.2022): 9905. http://dx.doi.org/10.3390/s22249905.
Der volle Inhalt der QuelleSinghal, Prateek, Puneet Sharma und Deepak Arora. „An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator“. International Journal of Engineering & Technology 7, Nr. 2.8 (19.03.2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.
Der volle Inhalt der QuelleSantosh Kumar, Dinesh Kumar Singh, Atma Prakash Singh,. „Enhanced Internet Access in MANETs: A Robust and Efficient Gateway Detection Approach with Amplified Backing“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 9 (05.11.2023): 2403–7. http://dx.doi.org/10.17762/ijritcc.v11i9.9295.
Der volle Inhalt der QuelleKhan, Prince Waqas, und Yungcheol Byun. „A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things“. Entropy 22, Nr. 2 (04.02.2020): 175. http://dx.doi.org/10.3390/e22020175.
Der volle Inhalt der QuelleZimba, Aaron, Luckson Simukonda und Mumbi Chishimba. „Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and Information Security“. Zambia ICT Journal 1, Nr. 1 (11.12.2017): 35–40. http://dx.doi.org/10.33260/zictjournal.v1i1.19.
Der volle Inhalt der QuelleU. V., Esara, Mfon E. A. und Walter O. O. „Impact of Modern Cultism and Governance in Akwa Ibom State, Nigeria“. African Journal of Law, Political Research and Administration 7, Nr. 1 (02.07.2024): 135–47. http://dx.doi.org/10.52589/ajlpra-4ndqroth.
Der volle Inhalt der QuelleJohnson, Anju P., Hussain Al-Aqrabi und Richard Hill. „Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems“. Sensors 20, Nr. 3 (05.02.2020): 844. http://dx.doi.org/10.3390/s20030844.
Der volle Inhalt der QuelleMaheshwari, Uma, Suresh .., Mahendra .., Kadiyam .. und Manideepika Manchikalapati. „Analysis of Security Mechanism in Adhoc Network with Machine Learning Techniques“. International Journal of Wireless and Ad Hoc Communication, Nr. 1 (2019): 31–44. http://dx.doi.org/10.54216/ijwac.000103.
Der volle Inhalt der QuelleYang, Jing, Yen-Lin Chen, Lip Yee Por und Chin Soon Ku. „A Systematic Literature Review of Information Security in Chatbots“. Applied Sciences 13, Nr. 11 (23.05.2023): 6355. http://dx.doi.org/10.3390/app13116355.
Der volle Inhalt der QuellePreiya, V. Sathya, V. D. Ambeth Kumar, R. Vijay, Vijay K. und N. Kirubakaran. „Blockchain-Based E-Voting System with Face Recognition“. Fusion: Practice and Applications 12, Nr. 1 (2023): 53–63. http://dx.doi.org/10.54216/fpa.120104.
Der volle Inhalt der QuelleAlshammari, Salah T., und Khalid Alsubhi. „Building a Reputation Attack Detector for Effective Trust Evaluation in a Cloud Services Environment“. Applied Sciences 11, Nr. 18 (13.09.2021): 8496. http://dx.doi.org/10.3390/app11188496.
Der volle Inhalt der QuelleKuo, Jong-Yih, Zhi-Jia Wen, Ti-Feng Hsieh und Han-Xuan Huang. „A Study on the Security of Online Judge System Applied Sandbox Technology“. Electronics 12, Nr. 14 (10.07.2023): 3018. http://dx.doi.org/10.3390/electronics12143018.
Der volle Inhalt der QuellePark, Sangwoo, Soowoong Lee und Jooseok Song. „An Improved Trust-Free Approach for Preserving Privacy in Internet of Things“. International Journal on Cybernetics & Informatics 11, Nr. 4 (27.08.2022): 157–65. http://dx.doi.org/10.5121/ijci.2022.110412.
Der volle Inhalt der QuelleChandel, Tanmay. „Review of Malware and Phishing in the Current and Next Generation of the Internet“. International Journal for Research in Applied Science and Engineering Technology 11, Nr. 5 (31.05.2023): 6499–502. http://dx.doi.org/10.22214/ijraset.2023.52927.
Der volle Inhalt der QuelleZhang, Fu-Guo. „Preventing Recommendation Attack in Trust-Based Recommender Systems“. Journal of Computer Science and Technology 26, Nr. 5 (September 2011): 823–28. http://dx.doi.org/10.1007/s11390-011-0181-4.
Der volle Inhalt der QuelleBlatchford, J. „An audit of a general practices compliance with national recommendations for the avoidance of complications for type 2 diabetic patients“. International Journal of Pharmacy Practice 31, Supplement_2 (30.11.2023): ii8—ii9. http://dx.doi.org/10.1093/ijpp/riad074.010.
Der volle Inhalt der QuelleNivedita, V., und N. Nandhagopal. „Trust Management-Based Service Recovery and Attack Prevention in MANET“. Intelligent Automation & Soft Computing 29, Nr. 3 (2021): 771–86. http://dx.doi.org/10.32604/iasc.2021.017547.
Der volle Inhalt der QuelleRajamäki, Jyri. „Towards Resilient Cyber-Physical eHealth Systems“. EQUATIONS 1 (24.12.2021): 78–82. http://dx.doi.org/10.37394/232021.2021.1.12.
Der volle Inhalt der QuelleHaval, Abhijeet Madhukar. „Integration of Nonlinear Dynamics in Blockchain Security Protocols“. Advances in Nonlinear Variational Inequalities 26, Nr. 2 (30.06.2023): 94–109. http://dx.doi.org/10.52783/anvi.v26.i2.286.
Der volle Inhalt der QuelleSyed, Salman Ali, und Shahzad Ali. „Enhanced dynamic source routing for verifying trust in mobile ad hoc network for secure routing“. International Journal of Electrical and Computer Engineering (IJECE) 12, Nr. 1 (01.02.2022): 425. http://dx.doi.org/10.11591/ijece.v12i1.pp425-430.
Der volle Inhalt der QuelleKang, Xin, und Yongdong Wu. „A trust-based pollution attack prevention scheme in peer-to-peer streaming networks“. Computer Networks 72 (Oktober 2014): 62–73. http://dx.doi.org/10.1016/j.comnet.2014.07.012.
Der volle Inhalt der QuelleBalaji Srikaanth, P., und V. Nagarajan. „A Fuzzy Trust Relationship Perspective-Based Prevention Mechanism for Vampire Attack in MANETs“. Wireless Personal Communications 101, Nr. 1 (02.05.2018): 339–57. http://dx.doi.org/10.1007/s11277-018-5691-8.
Der volle Inhalt der QuelleShinde, Prof Kaustubh, Sakshi Hadole, Rutuja Sathe, Sakshi Sirgan und Abhijit Thorat. „Cyber Attack Detection“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 03 (05.03.2024): 1–13. http://dx.doi.org/10.55041/ijsrem29058.
Der volle Inhalt der QuelleSingh, Kamini, Gyan Singh und Arpit Agrawal. „A Trust based Approach for Detecting and Preventing Wormhole Attack in MANET“. International Journal of Computer Applications 94, Nr. 20 (30.05.2014): 1–5. http://dx.doi.org/10.5120/16548-5825.
Der volle Inhalt der QuelleGellert, George A., Sean P. Kelly, Edwin W. Wright und Leslie C. Keil. „Zero Trust and the future of cybersecurity in healthcare delivery organizations“. Journal of Hospital Administration 12, Nr. 1 (09.02.2023): 1. http://dx.doi.org/10.5430/jha.v12n1p1.
Der volle Inhalt der QuelleJunejo, Aisha Kanwal, Imran Ali Jokhio und Tony Jan. „A Multi-Dimensional and Multi-Factor Trust Computation Framework for Cloud Services“. Electronics 11, Nr. 13 (21.06.2022): 1932. http://dx.doi.org/10.3390/electronics11131932.
Der volle Inhalt der QuelleMehetre, Deepak C., S. Emalda Roslin und Sanjeev J. Wagh. „Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust“. Cluster Computing 22, S1 (14.03.2018): 1313–28. http://dx.doi.org/10.1007/s10586-017-1622-9.
Der volle Inhalt der QuelleIsaac Sajan, R., und J. Jasper. „Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network“. International Journal of Communication Systems 33, Nr. 8 (28.01.2020): e4341. http://dx.doi.org/10.1002/dac.4341.
Der volle Inhalt der QuelleMishra, Priya, Ompal Singh und Abhishek Bhatt. „A Trust Election based Mechanism for finding selfish node and preventing them from Attack“. International Journal of Computer Sciences and Engineering 7, Nr. 2 (28.02.2019): 223–29. http://dx.doi.org/10.26438/ijcse/v7i2.223229.
Der volle Inhalt der QuelleOtari, Grantej Vinod, und Vijay Ram Ghorpade. „A trust management model based on NSGA-II in mobile grid system“. International Journal of Knowledge-based and Intelligent Engineering Systems 24, Nr. 3 (28.09.2020): 235–42. http://dx.doi.org/10.3233/kes-200045.
Der volle Inhalt der QuelleShinde, Kaustubh. „Implementation Paper on Cyberattack Detection“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 05 (31.05.2024): 1–5. http://dx.doi.org/10.55041/ijsrem35135.
Der volle Inhalt der QuelleMarynissen, Hugo, und Mike Lauder. „Stakeholder-Focused Communication Strategy During Crisis: A Case Study Based on the Brussels Terror Attacks“. International Journal of Business Communication 57, Nr. 2 (02.11.2019): 176–93. http://dx.doi.org/10.1177/2329488419882736.
Der volle Inhalt der Quelle