Journal articles on the topic 'Attack Path'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Attack Path.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi, and A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing." E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Full textLi, Erxia, Chaoqun Kang, Deyu Huang, Modi Hu, Fangyuan Chang, Lianjie He, and Xiaoyong Li. "Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees." Information 10, no. 8 (July 29, 2019): 251. http://dx.doi.org/10.3390/info10080251.
Full textHuang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 3 (December 7, 2023): 1–30. http://dx.doi.org/10.1145/3626789.
Full textHuang, Yudi, Yilei Lin, and Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance." ACM SIGMETRICS Performance Evaluation Review 52, no. 1 (June 11, 2024): 51–52. http://dx.doi.org/10.1145/3673660.3655075.
Full textLi, Xinzhan, Yang Zhou, Xin Li, Lijuan Xu, and Dawei Zhao. "Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm." Mathematics 10, no. 21 (October 24, 2022): 3938. http://dx.doi.org/10.3390/math10213938.
Full textLevner, Eugene, and Dmitry Tsadikovich. "Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes." Algorithms 17, no. 11 (November 4, 2024): 504. http://dx.doi.org/10.3390/a17110504.
Full textBhavani, Y., V. Janaki, and R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback." Oriental journal of computer science and technology 10, no. 2 (June 6, 2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.
Full textGuo, Wei, Zhi Zhang, Liyuan Chang, Yue Song, and Liuguo Yin. "A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid." Drones 8, no. 9 (August 28, 2024): 437. http://dx.doi.org/10.3390/drones8090437.
Full textBhavani, Yerram, Vinjamuri Janaki, and Rangu Sridevi. "IP Traceback using Flow Based Classification." Recent Advances in Computer Science and Communications 13, no. 3 (August 12, 2020): 482–90. http://dx.doi.org/10.2174/2213275912666190328200635.
Full textAl-Araji, Zaid J., Sharifah Sakinah Syed Ahmad, and Raihana Syahirah Abdullah. "Attack Prediction to Enhance Attack Path Discovery Using Improved Attack Graph." Karbala International Journal of Modern Science 8, no. 3 (August 2, 2022): 313–29. http://dx.doi.org/10.33640/2405-609x.3235.
Full textHu, Jian, Zhenhong Zhang, Feilu Hang, and Linjiang Xie. "Design of 0-day Vulnerability Monitoring and Defense Architecture based on Artificial Intelligence Technology." Scalable Computing: Practice and Experience 25, no. 5 (August 1, 2024): 3491–99. http://dx.doi.org/10.12694/scpe.v25i5.3035.
Full textWu, Runze, Jinxin Gong, Weiyue Tong, and Bing Fan. "Network Attack Path Selection and Evaluation Based on Q-Learning." Applied Sciences 11, no. 1 (December 30, 2020): 285. http://dx.doi.org/10.3390/app11010285.
Full textAbujassar, Radwan, Mohamed Sayed, and Husam Yaseen. "A new algorithm to enhance security against cyber threats for internet of things application." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (August 1, 2023): 4452. http://dx.doi.org/10.11591/ijece.v13i4.pp4452-4466.
Full textAlArnaout, Zakwan, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly, and Ahmed Shdefat. "RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks." Sensors 23, no. 1 (December 22, 2022): 102. http://dx.doi.org/10.3390/s23010102.
Full textV, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (April 24, 2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.
Full textAn, Hyok, Yoonjong Na, Heejo Lee, and Adrian Perrig. "Resilience Evaluation of Multi-Path Routing against Network Attacks and Failures." Electronics 10, no. 11 (May 24, 2021): 1240. http://dx.doi.org/10.3390/electronics10111240.
Full textKoo, Kijong, Daesung Moon, Jun-Ho Huh, Se-Hoon Jung, and Hansung Lee. "Attack Graph Generation with Machine Learning for Network Security." Electronics 11, no. 9 (April 22, 2022): 1332. http://dx.doi.org/10.3390/electronics11091332.
Full textQiu, Shenjian, Zhipeng Shao, Jian Wang, Shiyou Xu, and Jiaxuan Fei. "Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge." Applied Sciences 14, no. 14 (July 16, 2024): 6189. http://dx.doi.org/10.3390/app14146189.
Full textPanda, Niranjan, and Binod Kumar Pattanayak. "Defense Against Co-Operative Black-hole Attack and Gray-hole Attack in MANET." International Journal of Engineering & Technology 7, no. 3.4 (June 25, 2018): 84. http://dx.doi.org/10.14419/ijet.v7i3.4.16752.
Full textHsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai, and Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning." Sustainability 13, no. 22 (November 12, 2021): 12514. http://dx.doi.org/10.3390/su132212514.
Full textWan, Gerry, Aaron Johnson, Ryan Wails, Sameer Wagh, and Prateek Mittal. "Guard Placement Attacks on Path Selection Algorithms for Tor." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 272–91. http://dx.doi.org/10.2478/popets-2019-0069.
Full textKasturi, Santanam, Xiaolong Li, Peng Li, and John Pickard. "Predicting Attack Paths from Application Security Vulnerabilities Using a Multi-Layer Perceptron." American Journal of Software Engineering and Applications 12, no. 1 (May 30, 2024): 23–35. http://dx.doi.org/10.11648/j.ajsea.20241201.14.
Full textZhang, Shuqin, Peiyu Shi, Tianhui Du, Xinyu Su, and Yunfei Han. "Threat Attribution and Reasoning for Industrial Control System Asset." International Journal of Ambient Computing and Intelligence 15, no. 1 (November 17, 2023): 1–27. http://dx.doi.org/10.4018/ijaci.333853.
Full textHe, Jiaji, Haocheng Ma, Kaiyue Song, and Yiqiang Zhao. "An Enhanced Logic Encryption Method with a Fully Correlated Key Interdependency Block." Electronics 8, no. 12 (November 22, 2019): 1392. http://dx.doi.org/10.3390/electronics8121392.
Full textLiao, Yan. "Enhancing Industrial Control Network Security Through Vulnerability Detection and Attack Graph Analysis." Scalable Computing: Practice and Experience 25, no. 1 (January 4, 2024): 65–74. http://dx.doi.org/10.12694/scpe.v25i1.2254.
Full textChaves, Cesar, Siavoosh Azad, Thomas Hollstein, and Johanna Sepúlveda. "DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures." Journal of Low Power Electronics and Applications 9, no. 1 (February 5, 2019): 7. http://dx.doi.org/10.3390/jlpea9010007.
Full textYi, Junkai, and Xiaoyan Liu. "Deep Reinforcement Learning for Intelligent Penetration Testing Path Design." Applied Sciences 13, no. 16 (August 21, 2023): 9467. http://dx.doi.org/10.3390/app13169467.
Full textShen, Limin, Hui Li, Hongyi Wang, and Yihuan Wang. "Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications." Mobile Information Systems 2020 (June 5, 2020): 1–16. http://dx.doi.org/10.1155/2020/3407437.
Full textZhang, Xiaojian, Qi Wang, Xiangqun Wang, and Run Zhang. "Attack path analysis of power monitoring system based on attack graph." IOP Conference Series: Earth and Environmental Science 645 (January 26, 2021): 012064. http://dx.doi.org/10.1088/1755-1315/645/1/012064.
Full textKhlobystova, A. O., M. V. Abramov, A. L. Tulupyev, and A. A. Zolotin. "Search for the shortest trajectory of a social engeneering attack between a pair of users in a graph with transition probabilities." Information and Control Systems, no. 6 (December 18, 2018): 74–81. http://dx.doi.org/10.31799/1684-8853-2018-6-74-81.
Full textZhang, Yan, Yong Wang, Yihua Hu, Zhi Lin, Yadi Zhai, Lei Wang, Qingsong Zhao, Kang Wen, and Linshuang Kang. "Security Performance Analysis of LEO Satellite Constellation Networks under DDoS Attack." Sensors 22, no. 19 (September 26, 2022): 7286. http://dx.doi.org/10.3390/s22197286.
Full textLi, Yanna. "The Cyber Attack in the Use of Force." Lecture Notes in Education Psychology and Public Media 69, no. 1 (November 15, 2024): 122–30. http://dx.doi.org/10.54254/2753-7048/69/20240165.
Full textYang, Jinwei, and Yu Yang. "Optimal Security Protection Selection Strategy Based on Markov Model Attack Graph." Journal of Physics: Conference Series 2132, no. 1 (December 1, 2021): 012020. http://dx.doi.org/10.1088/1742-6596/2132/1/012020.
Full textBraimah, Joseph Odunayo, Tendai Makoni, and Fabio Mathias Correa. "Predicting the Path of Insurgency: Data-Driven Strategies to Counter Boko Haram in Nigeria." F1000Research 13 (September 2, 2024): 989. http://dx.doi.org/10.12688/f1000research.153978.1.
Full textLi, Xiaohong, Ran Liu, Zhiyong Feng, and Ke He. "Threat modeling-oriented attack path evaluating algorithm." Transactions of Tianjin University 15, no. 3 (June 2009): 162–67. http://dx.doi.org/10.1007/s12209-009-0029-y.
Full textChandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (January 2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.
Full textChen, Yun, Kun Lv, and Changzhen Hu. "A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments." Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/2058429.
Full textAl-janabi, Rana Jumaa Surayh. "Messenger Attack(Problems and Solutions)." Journal of Kufa for Mathematics and Computer 1, no. 2 (October 30, 2010): 12–22. http://dx.doi.org/10.31642/jokmc/2018/010202.
Full textYang, Rong, Fang Ming Huang, and Hua Jun Gong. "Best Attack Position Model for BVR Multi-Target Air Combat." Advanced Materials Research 1016 (August 2014): 511–15. http://dx.doi.org/10.4028/www.scientific.net/amr.1016.511.
Full textVitali, Maycon. "Web Cache Deception Attack." H2HC Magazine, no. 16 (October 22, 2022): 34–40. http://dx.doi.org/10.47986/16/2.
Full textHarmeet Singh, Er, and Dr Vijay Dhir. "A Novel Hybrid and Secure Clustering Black hole Attacks Mitigation Technique in Wireless LAN." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 389. http://dx.doi.org/10.14419/ijet.v7i4.7.23035.
Full textElavarasan, R., K. Chitra, and Amsalu Gosu Adigo. "Enhanced Lion Optimization with Efficient Path Routing Equalization Technique against DoS Attack in Wireless Sensor Network." Wireless Communications and Mobile Computing 2022 (June 14, 2022): 1–9. http://dx.doi.org/10.1155/2022/3321870.
Full textGuo, Mingyu, Jialiang Li, Aneta Neumann, Frank Neumann, and Hung Nguyen. "Practical Fixed-Parameter Algorithms for Defending Active Directory Style Attack Graphs." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 9 (June 28, 2022): 9360–67. http://dx.doi.org/10.1609/aaai.v36i9.21167.
Full textLin, Hsiao-Chung, Ping Wang, Wen-Hui Lin, and Yu-Hsiang Huang. "A Multiple-Swarm Particle Swarm Optimisation Scheme for Tracing Packets Back to the Attack Sources of Botnet." Applied Sciences 11, no. 3 (January 26, 2021): 1139. http://dx.doi.org/10.3390/app11031139.
Full textUmaparvathi, M., and Dharmishtan K. Varughese. "Secure Video Transmission Against Black Hole Attack in MANETs." International Journal of Business Data Communications and Networking 7, no. 4 (October 2011): 1–17. http://dx.doi.org/10.4018/jbdcn.2011100101.
Full textSingh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Full textSrinivas, T. Aditya Sai, and S. S. Manivannan. "Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing." Journal of Ambient Intelligence and Smart Environments 13, no. 2 (March 26, 2021): 133–56. http://dx.doi.org/10.3233/ais-210591.
Full textFortilla, Zeny Arsya, and Muhammad Syauqi Jazuli. "Developing a 3D Virus Attack Simulation in Unity: A Case Study for Healthcare Education." Gameology and Multimedia Expert 1, no. 2 (April 1, 2024): 33. http://dx.doi.org/10.29103/game.v1i2.15885.
Full textZhang, Bing, Hui Li, Shuai Zhang, Jing Sun, Ning Wei, Wenhong Xu, and Huan Wang. "Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN." Future Internet 16, no. 4 (April 22, 2024): 143. http://dx.doi.org/10.3390/fi16040143.
Full textTan, Sery Vuth, Minh Yuk Choi, and Kee Cheon Kim. "The New Mechanism to Detect and Prevent BlackHole Attacks on AODV-Based MANET." Advanced Materials Research 684 (April 2013): 547–50. http://dx.doi.org/10.4028/www.scientific.net/amr.684.547.
Full text