Journal articles on the topic 'Attack Resilience'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Attack Resilience.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Podobnik, B., D. Horvatic, T. Lipic, M. Perc, J. M. Buldú, and H. E. Stanley. "The cost of attack in competing networks." Journal of The Royal Society Interface 12, no. 112 (November 2015): 20150770. http://dx.doi.org/10.1098/rsif.2015.0770.
Full textЛисенко, Сергій Миколайович, Вячеслав Сергійович Харченко, Кіра Юліївна Бобровнікова, and Роман Володимирович Щука. "РЕЗИЛЬЄНТНІСТЬ КОМП’ЮТЕРНИХ СИСТЕМ В УМОВАХ КІБЕРЗАГРОЗ: ТАКСОНОМІЯ ТА ОНТОЛОГІЯ." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 1 (January 28, 2020): 17–28. http://dx.doi.org/10.32620/reks.2020.1.02.
Full textHe, Yao, Yongchun Yang, Meimei Wang, and Xudong Zhang. "Resilience Analysis of Container Port Shipping Network Structure: The Case of China." Sustainability 14, no. 15 (August 2, 2022): 9489. http://dx.doi.org/10.3390/su14159489.
Full textIbrahim, Mariam, and Asma Alkhraibat. "Resiliency Assessment of Microgrid Systems." Applied Sciences 10, no. 5 (March 6, 2020): 1824. http://dx.doi.org/10.3390/app10051824.
Full textLiu, Yuntao, Michael Zuzak, Yang Xie, Abhishek Chakraborty, and Ankur Srivastava. "Robust and Attack Resilient Logic Locking with a High Application-Level Impact." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (May 11, 2021): 1–22. http://dx.doi.org/10.1145/3446215.
Full textChen, Mingyu, and Huapu Lu. "Analysis of Transportation Network Vulnerability and Resilience within an Urban Agglomeration: Case Study of the Greater Bay Area, China." Sustainability 12, no. 18 (September 9, 2020): 7410. http://dx.doi.org/10.3390/su12187410.
Full textAfrin, Tanzina, and Nita Yodo. "Resilience-Based Recovery Assessments of Networked Infrastructure Systems under Localized Attacks." Infrastructures 4, no. 1 (March 12, 2019): 11. http://dx.doi.org/10.3390/infrastructures4010011.
Full textYan, Shu, Shao Ting Tang, Sen Pei, Shi Jin Jiang, Wei Hua Li, Xian Teng, and Zhi Ming Zheng. "Resilience to Intentional Attacks of Complex Networks." Applied Mechanics and Materials 421 (September 2013): 647–51. http://dx.doi.org/10.4028/www.scientific.net/amm.421.647.
Full textYeboah-Ofori, Abel, Cameron Swart, Francisca Afua Opoku-Boateng, and Shareeful Islam. "Cyber resilience in supply chain system security using machine learning for threat predictions." Continuity & Resilience Review 4, no. 1 (February 9, 2022): 1–36. http://dx.doi.org/10.1108/crr-10-2021-0034.
Full textMennink, Bart, and Samuel Neves. "On the Resilience of Even-Mansour to Invariant Permutations." Designs, Codes and Cryptography 89, no. 5 (February 23, 2021): 859–93. http://dx.doi.org/10.1007/s10623-021-00850-2.
Full textLYSENKO, SERGII, DMYTRO SOKALSKYI, and IIANA MYKHASKO. "METHODS FOR CYBERATTACKS DETECTION IN THE COMPUTER NETWORKS AS A MEAN OF RESILIENT IT-INFRASTRUCTURE CONSTRUCTION: STATE-OF-ART." Computer systems and information technologies, no. 3 (April 14, 2022): 31–35. http://dx.doi.org/10.31891/csit-2021-5-4.
Full textV. Jog, Vivek, and Senthil Murugan T. "Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things." International Journal of Intelligent Computing and Cybernetics 10, no. 2 (June 12, 2017): 241–56. http://dx.doi.org/10.1108/ijicc-08-2016-0030.
Full textBriland, Mathieu, and Fabrice Bouquet. "An Approach for Testing False Data Injection Attack on Data Dependent Industrial Devices." JUCS - Journal of Universal Computer Science 27, no. 7 (July 28, 2021): 774–92. http://dx.doi.org/10.3897/jucs.70326.
Full textЛисенко, Сергій Миколайович. "МЕТОД ЗАБЕЗПЕЧЕННЯ РЕЗИЛЬЄНТНОСТІ КОМП’ЮТЕРНИХ СИСТЕМ В УМОВАХ КІБЕРЗАГРОЗ НА ОСНОВІ САМОАДАПТИВНОСТІ." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 4 (December 25, 2019): 4–16. http://dx.doi.org/10.32620/reks.2019.4.01.
Full textMa, Liang, and Gang Xu. "Distributed Resilient Voltage and Reactive Power Control for Islanded Microgrids under False Data Injection Attacks." Energies 13, no. 15 (July 25, 2020): 3828. http://dx.doi.org/10.3390/en13153828.
Full textGheyas, Iffat, Gregory Epiphaniou, Carsten Maple, and Subhash Lakshminarayana. "A Resilient Cyber-Physical Demand Forecasting System for Critical Infrastructures against Stealthy False Data Injection Attacks." Applied Sciences 12, no. 19 (October 7, 2022): 10093. http://dx.doi.org/10.3390/app121910093.
Full textDong, Gaogao, Nan Wang, Fan Wang, Ting Qing, Yangyang Liu, and André L. M. Vilela. "Network resilience of non-hub nodes failure under memory and non-memory based attacks with limited information." Chaos: An Interdisciplinary Journal of Nonlinear Science 32, no. 6 (June 2022): 063110. http://dx.doi.org/10.1063/5.0092284.
Full textNikolopoulos, Dionysios, Avi Ostfeld, Elad Salomons, and Christos Makropoulos. "Resilience Assessment of Water Quality Sensor Designs under Cyber-Physical Attacks." Water 13, no. 5 (February 28, 2021): 647. http://dx.doi.org/10.3390/w13050647.
Full textXu, Feifei, Shubin Si, Dongli Duan, Changchun Lv, and Junlan Xie. "Dynamical resilience of networks against targeted attack." Physica A: Statistical Mechanics and its Applications 528 (August 2019): 121329. http://dx.doi.org/10.1016/j.physa.2019.121329.
Full textAn, Hyok, Yoonjong Na, Heejo Lee, and Adrian Perrig. "Resilience Evaluation of Multi-Path Routing against Network Attacks and Failures." Electronics 10, no. 11 (May 24, 2021): 1240. http://dx.doi.org/10.3390/electronics10111240.
Full textHinz, Juri. "Resilience Analysis for Double Spending via Sequential Decision Optimization." Applied System Innovation 3, no. 1 (January 17, 2020): 7. http://dx.doi.org/10.3390/asi3010007.
Full textMohammadi, Fazel. "Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review." Energies 14, no. 5 (March 3, 2021): 1380. http://dx.doi.org/10.3390/en14051380.
Full textPeng, Hao, Cheng Qian, Dandan Zhao, Ming Zhong, Jianmin Han, and Wei Wang. "Targeting attack hypergraph networks." Chaos: An Interdisciplinary Journal of Nonlinear Science 32, no. 7 (July 2022): 073121. http://dx.doi.org/10.1063/5.0090626.
Full textLiu, Xiao Fan, Xiao-Ke Xu, Michael Small, and Chi K. Tse. "Attack Resilience of the Evolving Scientific Collaboration Network." PLoS ONE 6, no. 10 (October 14, 2011): e26271. http://dx.doi.org/10.1371/journal.pone.0026271.
Full textDurodié, Bill, and Simon Wessely. "Resilience or panic? The public and terrorist attack." Lancet 360, no. 9349 (December 2002): 1901–2. http://dx.doi.org/10.1016/s0140-6736(02)11936-2.
Full textJuretus, Kyle, and Ioannis Savidis. "Increased Output Corruption and Structural Attack Resilience for SAT Attack Secure Logic Locking." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 40, no. 1 (January 2021): 38–51. http://dx.doi.org/10.1109/tcad.2020.2988629.
Full textUsynin, Dmitrii, Daniel Rueckert, Jonathan Passerat-Palmbach, and Georgios Kaissis. "Zen and the art of model adaptation: Low-utility-cost attack mitigations in collaborative machine learning." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (November 20, 2021): 274–90. http://dx.doi.org/10.2478/popets-2022-0014.
Full textRamani, Sagar, and Rutvij H. Jhaveri. "ML-Based Delay Attack Detection and Isolation for Fault-Tolerant Software-Defined Industrial Networks." Sensors 22, no. 18 (September 14, 2022): 6958. http://dx.doi.org/10.3390/s22186958.
Full textKim, Jin Hyun, Hyo Jin Jo, and Insup Lee. "Model Checking Resiliency and Sustainability of In-Vehicle Network for Real-Time Authenticity." Applied Sciences 11, no. 3 (January 25, 2021): 1068. http://dx.doi.org/10.3390/app11031068.
Full textClarke, Samuel Alexander, and A. G. A. Weir. "UK resilience to a chemical incident." BMJ Military Health 166, no. 2 (May 31, 2019): 95–98. http://dx.doi.org/10.1136/jramc-2019-001233.
Full textWang, Yihe, Mingli Zhang, Kun Song, Tie Li, and Na Zhang. "An Optimal DoS Attack Strategy Disturbing the Distributed Economic Dispatch of Microgrid." Complexity 2021 (April 1, 2021): 1–16. http://dx.doi.org/10.1155/2021/5539829.
Full textBERCHE, BERTRAND, CHRISTIAN VON FERBER, TARAS HOLOVATCH, and YURIJ HOLOVATCH. "TRANSPORTATION NETWORK STABILITY: A CASE STUDY OF CITY TRANSIT." Advances in Complex Systems 15, supp01 (June 2012): 1250063. http://dx.doi.org/10.1142/s0219525912500634.
Full textGurina, Liudmila. "Increasing Cyber Resilience of SCADA and WAMS in the Event of Cyber Attacks on the Information and Communication Subsystem of the Electric Power System." Voprosy kiberbezopasnosti, no. 2(48) (2022): 18–26. http://dx.doi.org/10.21681/2311-3456-2022-2-18-26.
Full textKuter, Ugur, Mark Burstein, J. Benton, Daniel Bryce, Jordan Thayer, and Steve McCoy. "HACKAR: Helpful Advice for Code Knowledge and Attack Resilience." Proceedings of the AAAI Conference on Artificial Intelligence 29, no. 2 (January 25, 2015): 3987–92. http://dx.doi.org/10.1609/aaai.v29i2.19059.
Full textWadhwani, Ganesh Kumar, Sunil Kumar Khatri, and S. K. Mutto. "Trust framework for attack resilience in MANET using AODV." Journal of Discrete Mathematical Sciences and Cryptography 23, no. 1 (January 2, 2020): 209–20. http://dx.doi.org/10.1080/09720529.2020.1721885.
Full textZhu, Yihai, Jun Yan, Yufei Tang, Yan Lindsay Sun, and Haibo He. "Resilience Analysis of Power Grids Under the Sequential Attack." IEEE Transactions on Information Forensics and Security 9, no. 12 (December 2014): 2340–54. http://dx.doi.org/10.1109/tifs.2014.2363786.
Full textKlein Breteler, Mark, Marcel Bottema, G. A. M. Kruse, G. C. Mourik, and A. Capel. "RESILIENCE OF DIKES AFTER INITIAL DAMAGE BY WAVE ATTACK." Coastal Engineering Proceedings 1, no. 33 (October 25, 2012): 36. http://dx.doi.org/10.9753/icce.v33.structures.36.
Full textMosquera Palacios, Darin Jairo, Edwin Rivas Trujillo, and Jesús María López-Lezama. "Vulnerability Analysis to Maximize the Resilience of Power Systems Considering Demand Response and Distributed Generation." Electronics 10, no. 12 (June 21, 2021): 1498. http://dx.doi.org/10.3390/electronics10121498.
Full textSu, Yi-Zhu, and Wei-Chang Yeh. "The protection and recovery strategy development of dynamic resilience analysis and cost consideration in the infrastructure network." Journal of Computational Design and Engineering 9, no. 1 (February 2022): 168–86. http://dx.doi.org/10.1093/jcde/qwab079.
Full textMalatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (October 14, 2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Full textMalatji, Masike, Annlizé L. Marnewick, and Suné Von Solms. "Cybersecurity capabilities for critical infrastructure resilience." Information & Computer Security 30, no. 2 (October 14, 2021): 255–79. http://dx.doi.org/10.1108/ics-06-2021-0091.
Full textHu, Hao, Yuling Liu, Hongqi Zhang, and Yuchen Zhang. "Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis." Security and Communication Networks 2018 (August 2, 2018): 1–14. http://dx.doi.org/10.1155/2018/5787102.
Full textPuspawatie, Eva, Ayu Prawesti, and Titin Sutini. "THE DESCRIPTION OF RESILIENCE IN POST-ACUTE ATTACK PATIENT WITH CORONARY ARTERY DISEASE." Belitung Nursing Journal 4, no. 3 (June 29, 2018): 312–22. http://dx.doi.org/10.33546/bnj.493.
Full textHodgetts, TJ, KM Porter, PF Mahoney, A. Thurgood, and C. McKinnie. "Enhancing national resilience: The citizenAID initiative." Trauma 19, no. 2 (April 2017): 83–85. http://dx.doi.org/10.1177/1460408617694217.
Full textPeres, Julio F. P., Bernd Foerster, Leandro G. Santana, Mauricio Domingues Fereira, Antonia G. Nasello, Mariângela Savoia, Alexander Moreira-Almeida, and Henrique Lederman. "Police officers under attack: Resilience implications of an fMRI study." Journal of Psychiatric Research 45, no. 6 (June 2011): 727–34. http://dx.doi.org/10.1016/j.jpsychires.2010.11.004.
Full textGil Pérez, Manuel, Juan E. Tapiador, John A. Clark, Gregorio Martínez Pérez, and Antonio F. Skarmeta Gómez. "Trustworthy placements: Improving quality and resilience in collaborative attack detection." Computer Networks 58 (January 2014): 70–86. http://dx.doi.org/10.1016/j.comnet.2013.08.026.
Full textYuan, Quan, Mehdi Tibouchi, and Masayuki Abe. "On subset-resilient hash function families." Designs, Codes and Cryptography 90, no. 3 (February 6, 2022): 719–58. http://dx.doi.org/10.1007/s10623-022-01008-4.
Full textLópez Lezama, Jesús María, Bonie Johana Restrepo Cuestas, and Juan Pablo Hernández Valencia. "A Bilevel Attacker-Defender Model for Enhancing Power Systems Resilience with Distributed Generation." Scientia et Technica 25, no. 4 (December 30, 2020): 540–47. http://dx.doi.org/10.22517/23447214.23721.
Full textRen, Xiao-Long, Niels Gleinig, Dijana Tolić, and Nino Antulov-Fantulin. "Underestimated Cost of Targeted Attacks on Complex Networks." Complexity 2018 (2018): 1–15. http://dx.doi.org/10.1155/2018/9826243.
Full textMarin, Florin Cristian, Mirela Calinescu, Mihaela Sumedrea, and Emil Chitu. "BEHAVIOR OF SOME WALNUT VARIETIES UNDER JUVENILE PHASE TO BACTERIOSE AND ANTRACNOSE ATTACK." Fruit Growing Research 36 (December 22, 2020): 45–54. http://dx.doi.org/10.33045/fgr.v36.2020.06.
Full text