Journal articles on the topic 'Attack on the network'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Attack on the network.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ahmed, Abdulghani Ali. "Investigation Approach for Network Attack Intention Recognition." International Journal of Digital Crime and Forensics 9, no. 1 (January 2017): 17–38. http://dx.doi.org/10.4018/ijdcf.2017010102.
Full textSinghal, Prateek, Puneet Sharma, and Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.
Full textGlăvan, Dragoș. "Sniffing attacks on computer networks." Scientific Bulletin of Naval Academy XXIII, no. 1 (July 15, 2020): 202–7. http://dx.doi.org/10.21279/1454-864x-20-i1-027.
Full textWinda Andrini Wulandari. "THE ANALYSIS NETWORK FORENSICS USING HONEYPOT ON PUBLIC CLOUD COMPUTING SERVICE NETWORK." Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) 3, no. 1 (April 20, 2018): 18–25. http://dx.doi.org/10.20527/jtiulm.v3i1.24.
Full textKamaleshwar, T., R. Lakshminarayanan, Yuvaraja Teekaraman, Ramya Kuppusamy, and Arun Radhakrishnan. "Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN." Wireless Communications and Mobile Computing 2021 (December 26, 2021): 1–8. http://dx.doi.org/10.1155/2021/5143124.
Full textPark, Sanglee, and Jungmin So. "On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification." Applied Sciences 10, no. 22 (November 14, 2020): 8079. http://dx.doi.org/10.3390/app10228079.
Full textQin, Yuan. "Computer Network Attack Modeling and Network Attack Graph Study." Advanced Materials Research 1079-1080 (December 2014): 816–19. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.816.
Full textGandhi, Kaushal, Rajneesh Narula, Sumeer Khullar, and Anish Arora. "Security Issues of Routing Protocols in MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 2 (October 30, 2012): 339–42. http://dx.doi.org/10.24297/ijct.v3i2c.2894.
Full textSehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Analysis of AODV protocol under sinkhole attack in wireless sensor network." International Journal of Engineering & Technology 7, no. 2.4 (March 10, 2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.4.13028.
Full textMoskal, Stephen, Shanchieh Jay Yang, and Michael E. Kuhl. "Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 1 (August 15, 2017): 13–29. http://dx.doi.org/10.1177/1548512917725408.
Full textPodobnik, B., D. Horvatic, T. Lipic, M. Perc, J. M. Buldú, and H. E. Stanley. "The cost of attack in competing networks." Journal of The Royal Society Interface 12, no. 112 (November 2015): 20150770. http://dx.doi.org/10.1098/rsif.2015.0770.
Full textPatel, Anshuman, and Devesh Jinwala. "A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things." International Journal of Information Security and Privacy 15, no. 4 (October 2021): 1–17. http://dx.doi.org/10.4018/ijisp.2021100101.
Full textBALABAN, Ioana. "Denial-of-Service Attack." International Journal of Information Security and Cybercrime 10, no. 1 (June 29, 2021): 59–64. http://dx.doi.org/10.19107/ijisc.2021.01.06.
Full textYan, Yao, and Rui Xu. "DDoS Attacks for Ad Hoc Network Based on Attack Cluster." Advanced Materials Research 546-547 (July 2012): 1371–76. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1371.
Full textChandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (January 2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.
Full textDhaked, Urvashi, Dr Ashok Kumar, and Dr Brajesh Kumar Singh. "Detection and Isolation Technique for Sinkhole Attack in WSN." Journal of University of Shanghai for Science and Technology 23, no. 10 (October 9, 2021): 381–90. http://dx.doi.org/10.51201/jusst/21/10718.
Full textShan, Chun, Benfu Jiang, Jingfeng Xue, Fang Guan, and Na Xiao. "An Approach for Internal Network Security Metric Based on Attack Probability." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3652170.
Full textMitchel, Christopher, Baraq Ghaleb, Safwan M. Ghaleb, Zakwan Jaroucheh, and Bander Ali Saleh Al-rimy. "The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks." International Journal of Engineering and Advanced Technology 10, no. 2 (December 30, 2020): 66–72. http://dx.doi.org/10.35940/ijeat.b1962.1210220.
Full textSowah, Robert A., Kwadwo B. Ofori-Amanfo, Godfrey A. Mills, and Koudjo M. Koumadi. "Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN)." Journal of Computer Networks and Communications 2019 (January 20, 2019): 1–14. http://dx.doi.org/10.1155/2019/4683982.
Full textXia, Kui Liang. "Modeling and Simulation of Low Rate of Denial of Service Attacks." Applied Mechanics and Materials 484-485 (January 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.1063.
Full textDivekar, Anuja Sanjay, Deepali Borade, and Vivek Bugad. "A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in IP network through LOLS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 3 (January 8, 2015): 5543–49. http://dx.doi.org/10.24297/ijct.v14i3.1998.
Full textNajafabadi, Maryam M., Taghi M. Khoshgoftaar, and Amri Napolitano. "Detecting Network Attacks Based on Behavioral Commonalities." International Journal of Reliability, Quality and Safety Engineering 23, no. 01 (February 2016): 1650005. http://dx.doi.org/10.1142/s0218539316500054.
Full textMunir, Misbachul, Ipung Ardiansyah, Joko Dwi Santoso, Ali Mustopa, and Sri Mulyatun. "DETECTION AND MITIGATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS ON NETWORK ARCHITECTURE SOFTWARE DEFINED NETWORKING USING THE NAIVE BAYES ALGORITHM." Journal of Information System Management (JOISM) 3, no. 2 (January 16, 2022): 51–55. http://dx.doi.org/10.24076/joism.2022v3i2.656.
Full textSun, Yan, and Xue Guang Zhou. "Research on Attack Model for Cognitive Network Based on Scientific Analysis of Network Material System." Applied Mechanics and Materials 63-64 (June 2011): 911–14. http://dx.doi.org/10.4028/www.scientific.net/amm.63-64.911.
Full textThakur, Mandeep, and Amninder Kaur Gill. "Detection and Isolation Technique for Blackhole Attack in Wireless Sensor Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 25. http://dx.doi.org/10.23956/ijarcsse.v7i8.12.
Full textHoumer, Meriem, and Moulay Lahcen Hasnaoui. "A risk and security assessment of VANET availability using attack tree concept." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (December 1, 2020): 6039. http://dx.doi.org/10.11591/ijece.v10i6.pp6039-6044.
Full textApiecionek, Łukasz, and Matusz Biedziak. "Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection." JUCS - Journal of Universal Computer Science 26, no. 11 (November 28, 2020): 1435–54. http://dx.doi.org/10.3897/jucs.2020.076.
Full textvan Heerden, R. P., B. Irwin, I. D. Burke, and L. Leenen. "A Computer Network Attack Taxonomy and Ontology." International Journal of Cyber Warfare and Terrorism 2, no. 3 (July 2012): 12–25. http://dx.doi.org/10.4018/ijcwt.2012070102.
Full textLalar, Sacachin, Shashi Bhushan, and Surender Surender. "Analysis of Clone Detection Approaches in Static Wireless Sensor Networks." Oriental journal of computer science and technology 10, no. 3 (August 5, 2017): 653–59. http://dx.doi.org/10.13005/ojcst/10.03.14.
Full textWang, Rui, Yingxian Chang, Lei Ma, Hao Zhang, Xin Liu, Jianfei Chen, Donglan Liu, Yong Zhang, and Bing Su. "The Border Attack Defense System is Software-Based." Journal of Physics: Conference Series 2074, no. 1 (November 1, 2021): 012041. http://dx.doi.org/10.1088/1742-6596/2074/1/012041.
Full textBERCHE, BERTRAND, CHRISTIAN VON FERBER, TARAS HOLOVATCH, and YURIJ HOLOVATCH. "TRANSPORTATION NETWORK STABILITY: A CASE STUDY OF CITY TRANSIT." Advances in Complex Systems 15, supp01 (June 2012): 1250063. http://dx.doi.org/10.1142/s0219525912500634.
Full textAl-Rushdan, Huthifh, Mohammad Shurman, and Sharhabeel Alnabelsi. "On Detection and Prevention of Zero-Day Attack Using Cuckoo Sandbox in Software-Defined Networks." International Arab Journal of Information Technology 17, no. 4A (July 31, 2020): 662–70. http://dx.doi.org/10.34028/iajit/17/4a/11.
Full textLi, Yunpeng, and Xi Li. "Research on Multi-Target Network Security Assessment with Attack Graph Expert System Model." Scientific Programming 2021 (May 7, 2021): 1–11. http://dx.doi.org/10.1155/2021/9921731.
Full textRajeshwari, T., and C. Thangamani. "Attack Impact Discovery and Recovery with Dynamic Bayesian Networks." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 74–79. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1953.
Full textAlamsyah, Hendri, Riska, and Abdussalam Al Akbar. "Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System." JOINTECS (Journal of Information Technology and Computer Science) 5, no. 1 (January 25, 2020): 17. http://dx.doi.org/10.31328/jointecs.v5i1.1240.
Full textSatvir Kaur, Gureshpal Singh, Baljinder Singh. "Detection and Prevention of DDoS Attack Using Gateway Mechanism." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 2 (February 28, 2019): 21–26. http://dx.doi.org/10.17762/ijritcc.v7i2.5227.
Full textK*, Parvathy. "Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review." International Journal of Recent Technology and Engineering 10, no. 1 (May 30, 2021): 199–203. http://dx.doi.org/10.35940/ijrte.a5873.0510121.
Full textDhamodharan, Udaya Suriya Raj Kumar, and Rajamani Vayanaperumal. "Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method." Scientific World Journal 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/841267.
Full textYang, Yong, Kaijun Xu, and Honghui Xiang. "Analysis on Chinese Airline Network Invulnerability." Journal of Systems Science and Information 7, no. 4 (September 25, 2019): 359–72. http://dx.doi.org/10.21078/jssi-2019-359-14.
Full textAncy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (September 1, 2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.
Full textLi, Muhai, and Ming Li. "An Adaptive Approach for Defending against DDoS Attacks." Mathematical Problems in Engineering 2010 (2010): 1–15. http://dx.doi.org/10.1155/2010/570940.
Full textFeng, Xinzhi, Yang Yang, Xiaozhong Qi, Chunming Xu, and Ze Ji. "Output Feedback NCS of DoS Attacks Triggered by Double-Ended Events." Security and Communication Networks 2021 (February 10, 2021): 1–14. http://dx.doi.org/10.1155/2021/6643034.
Full textStiawan, Deris, Mohd Yazid Idris, Reza Firsandaya Malik, Siti Nurmaini, Nizar Alsharif, and Rahmat Budiarto. "Investigating Brute Force Attack Patterns in IoT Network." Journal of Electrical and Computer Engineering 2019 (April 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/4568368.
Full textAdhana, Finandito, and I. Ketut Gede Suhartana. "Deteksi Serangan Denial of Service di Situs Web dengan Wireshark Menggunakan Metode IDS Berbasis Anomali." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 4 (February 4, 2020): 375. http://dx.doi.org/10.24843/jlk.2020.v08.i04.p02.
Full text., Sonika, Sandeep Kumar Arora, and Mahedi Masud. "Review on Security Based Vehicular Ad-Hoc Network." International Journal of Engineering & Technology 7, no. 3.8 (July 7, 2018): 125. http://dx.doi.org/10.14419/ijet.v7i3.8.16846.
Full textSharma, Vishal, Kyungroul Lee, Soonhyun Kwon, Jiyoon Kim, Hyungjoon Park, Kangbin Yim, and Sun-Young Lee. "A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT." Security and Communication Networks 2017 (2017): 1–24. http://dx.doi.org/10.1155/2017/4749085.
Full textFan, Cong, Nitheesh Murugan Kaliyamurthy, Shi Chen, He Jiang, Yiwen Zhou, and Carlene Campbell. "Detection of DDoS Attacks in Software Defined Networking Using Entropy." Applied Sciences 12, no. 1 (December 31, 2021): 370. http://dx.doi.org/10.3390/app12010370.
Full textKumar Baitha, Anuj, and Prof Smitha Vinod. "Session Hijacking and Prevention Technique." International Journal of Engineering & Technology 7, no. 2.6 (March 11, 2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.6.10566.
Full textAsabere, Nana Yaw, Elikem Fiamavle, Joseph Agyiri, Wisdom Kwawu Torgby, Joseph Eyram Dzata, and Nina Pearl Doe. "SARCP." International Journal of Decision Support System Technology 14, no. 1 (January 2022): 1–21. http://dx.doi.org/10.4018/ijdsst.286691.
Full textBAO, ZHE-JING, WEN-JUN YAN, and CHUANG-XIN GUO. "RISK ASSESSMENT OF ATTACK-INDUCED CASCADE IN COMPLEX NETWORKS." International Journal of Modern Physics C 22, no. 08 (August 2011): 765–73. http://dx.doi.org/10.1142/s0129183111016579.
Full text