Academic literature on the topic 'Byzantines Attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Byzantines Attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Byzantines Attack"
Böhm, Marcin. "Constantine X Doukas (1059–1067) versus Uzes – about the Nomads on Boats on the Danube in 1064." Studia Ceranea 11 (December 30, 2021): 39–49. http://dx.doi.org/10.18778/2084-140x.11.02.
Full textVeselinović, Ivana. "The role of the despotess Irene Kantakouzene in the political life of the Serbian Despotate." Zbornik radova Filozofskog fakulteta u Pristini 52, no. 2 (2022): 177–90. http://dx.doi.org/10.5937/zrffp52-36443.
Full textYang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (August 5, 2019): 3436. http://dx.doi.org/10.3390/s19153436.
Full textWang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long, and Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median." Electronics 12, no. 5 (March 1, 2023): 1190. http://dx.doi.org/10.3390/electronics12051190.
Full textSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (January 2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Full textWang, Jingyao, Xingming Deng, Jinghua Guo, and Zeqin Zeng. "Resilient Consensus Control for Multi-Agent Systems: A Comparative Survey." Sensors 23, no. 6 (March 7, 2023): 2904. http://dx.doi.org/10.3390/s23062904.
Full textAmir, Y., B. Coan, J. Kirsch, and J. Lane. "Prime: Byzantine Replication under Attack." IEEE Transactions on Dependable and Secure Computing 8, no. 4 (July 2011): 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.
Full textWan, Fangyi, Ting Ma, Yi Hua, Bin Liao, and Xinlin Qing. "Secure distributed estimation under Byzantine attack and manipulation attack." Engineering Applications of Artificial Intelligence 116 (November 2022): 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.
Full textABORISADE, D. O., A. S. SODIYA, A. A. ODUMOSU, O. Y. ALOWOSILE, and A. A. ADEDEJI. "A SURVIVABLE DISTRIBUTED DATABASE AGAINST BYZANTINE FAILURE." Journal of Natural Sciences Engineering and Technology 15, no. 2 (November 22, 2017): 61–72. http://dx.doi.org/10.51406/jnset.v15i2.1684.
Full textMakani, Ruchi, and Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (February 7, 2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.
Full textDissertations / Theses on the topic "Byzantines Attack"
Sironen, Erkki. "The late Roman and early Byzantine inscriptions of Athens and Attica : an edition with appendices on scripts, sepulchral formulae and occupations /." Helsinki : Hakapaino Oy, 1997. http://bibpurl.oclc.org/web/25751.
Full textAlam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.
Full textKALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.
Full textTzavella, Elissavet. "Urban and rural landscape in early and middle Byzantine Attica (4th-12th c. AD)." Thesis, University of Birmingham, 2013. http://etheses.bham.ac.uk//id/eprint/4321/.
Full textWang, Qianlong. "Blockchain-Empowered Secure Machine Learning and Applications." Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1625183576139299.
Full textHan, Kai. "Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy Systems." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/26917.
Full textPh. D.
Chen, Ho-Chun, and 陳和均. "The Study of Byzantine Attack in Large Scale Wireless Sensor Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/n2y87u.
Full text國立臺灣大學
電信工程學研究所
106
In this thesis, we study the problem of Byzantine attacks in large scale wireless sensor networks (WSNs). WSN is a critical technology in the future Internet of Things era, supporting various applications such as smart home, environmental monitoring, Internet of vehicles, etc. A WSN generally consists of some sensors and a fusion center (FC). Each sensor makes an observation about a phenomenon of interest, and transmits local message to the FC, who then makes a final decision based on those messages. Due to the exposed nature of the sensors and the characteristics of wireless channel, WSN is prone to be attacked and faulty. One of the attacks against WSN is called the Byzantine attack, which the attacker compromises some sensors and sends falsified messages to the FC. Unlike channel errors caused by noise or interference, Byzantine attack is targeted and may be more harmful to the system. It''s thus an important and challenging goal to design a robust system that is immune to the attack, and this is the purpose of our research. The effect of Byzantine attack has been studied a lot in recent years, however, many works formulate it as a simple hypothesis testing problem by assuming each sensor being independently compromised with probability alpha_t, where alpha_t is the fraction of Byzantine sensors. We call this model the i.i.d. mixture model since the local messages are i.i.d. to a mixture distribution. It''s easy to obtain the optimal error exponent in this problem formulation, however, we are not satisfied with the model since in practice it''s unlikely an attacker randomly attack the sensors each time. To fix this assumption, we introduce a parameter that indicates the indices of compromised sensors and formulate the Byzantine attack as a composite hypothesis testing problem. Using the idea of Hoeffding test in conventional composite hypothesis testing, we propose a "Hoeffding-type test''. The Hoeffding-type test depends only on the type of local messages, and achieves an error exponent which is the same as the optimal exponent in i.i.d. mixture model. We also show that it''s easy to generalize the Hoeffding-type test so that it becomes universal over all possible attack distributions. Since Hoeffding-type test only uses the type information, we further propose an "Order-aware Hoeffding-type test''. In the order-aware test, we perform joint detection of the indices parameter and the underlying hypothesis by brute-force search. Although the order-aware test seems to be using more information than the Hoeffding-type test, we show that they are equivalent in the asymptotic regime. The proposed detect algorithms can be applied in two kinds of defense scheme: 1. Direct Detect: FC has no information on the identities of Byzantine sensors and performs detection with all local messages 2. Clustering and Detect: FC will first identifies the Byzantines and clusters the sensors into two groups through some side information. For each group, independent detection is performed then results from both groups are combined using 0-AND rule. We show that the Clustering Detect scheme performs better than Direct Detect scheme, and FC can''t be blinded unless all sensors are compromised. Finally, some numerical results are presented to compare the two defense scheme.
(9154928), Aritra Mitra. "New Approaches to Distributed State Estimation, Inference and Learning with Extensions to Byzantine-Resilience." Thesis, 2020.
Find full textTseng, Yi-Ying, and 曾奕穎. "Countering Byzantine Attacks in a Network with Random Linear Network Coding." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/88fyjp.
Full text國立東華大學
電機工程學系
100
Network coding is an elegant technique where, instead of simply relaying the packets of information they receive, the nodes of a network are allowed to combine \emph{several} packets together for transmission and this technique can be used to achieve the maximum possible information flow in a network. Recent implementations of network coding for wired and wireless environments have demonstrated its practical benefits, especially in multicast communication. Because communication in wireless environment is essentially multicast, network coding has highly attracted research attention in this field. Due to that one transmitting information is actually combination of multiple other information , network coding has variety of applications such as P2P, redundant data storage, switch and etc. However, this special characteristic also exposes network coding systems to a wide range of error attacks, especially Byzantine attacks. When some adversary nodes generate error data in the network with network coding, those erroneous information will be mixed at intermeidate nodes and thus corrupt all the information reaching a destination. In short, network coding will propagate errors. Recent research has shown that network coding can be combined with classical cryptography for secure communication, such as using concept of ECC (error correcting code) to perform end-to-end error correction or misbehavaior detection. Nevertheless, when it comes to Byzantine attacks, these results have limited effect. In fact, unless we find out those adversary nodes and isolate them, network coding may perform much worse than pure routing in the presence of malicious nodes. Our research develops a distributed hierarchical algorithm based on random linear network coding to locate malicious nodes.
Cheng, Sheng-Hong, and 鄭勝鴻. "Defense and Detection of Sybil Attack Using Byzantine Agreement Algorithm in Mobile Ad Hoc Network." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/24pgmr.
Full text淡江大學
資訊工程學系碩士班
106
The topology of mobile ad hoc networks (MANET) is dynamic, can be quickly configured, and lacks features such as wireless APs and adapters. Due to these benefits, a MANET system is able to be applied to specific situations, such as search and rescue operations, military use or emergency operations. Based on the routing protocol, node connections provide information to each other and can jointly establish a complete transmission path independently. But security is a major issue in MANET systems. Because MANET system are open and perform on a non-centralized infrastructure, they lacks security considerations in routing protocols, which make MANET systems more difficult to secure than wired networks. Attacks are easily exploited by its weaknesses. In this study, we conducted further research on the most common Sybil Attack of MANET systems. The common Sybil attack may cause packet flow redirection and other extended effects. We used the simulation environment NS-3 Project to create a consensus-based practical Byzantine Fault Tolerance algorithm to explore solutions to the Sybil attack''s threat to free mobile networks. Ensuring that all the original network nodes that are vulnerable to tampering are protected can ensure the integrity of the data during transmission. We must demonstrate in the simulation experiment that this method can have an ideal performance in both network and security performance. The goal is to ensure that the general network has the security of the network form under the infrastructure without being compromised.
Books on the topic "Byzantines Attack"
Los dorismos del Corpus Bucolicorum. Amsterdam: A.M. Hakkert, 1990.
Find full textBook chapters on the topic "Byzantines Attack"
Hancock, James F. "Spice trade in the dark ages of Europe." In Spices, scents and silk: catalysts of world trade, 146–56. Wallingford: CABI, 2021. http://dx.doi.org/10.1079/9781789249743.0012.
Full textFiat, Amos, Jared Saia, and Maxwell Young. "Making Chord Robust to Byzantine Attacks." In Algorithms – ESA 2005, 803–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11561071_71.
Full textPooja, A. Saraswathi, Rampa Theresa, Satya Govind, and Anuja Aloy Mary. "Detection of Byzantine Attack in Cognitive Radio Network." In Advances in Intelligent Systems and Computing, 459–68. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5029-4_37.
Full textHe, Xiaofan, and Huaiyu Dai. "Case Study II: HMM-Based Byzantine Attack Detection." In SpringerBriefs in Electrical and Computer Engineering, 51–62. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_5.
Full textHe, Xiaofan, and Huaiyu Dai. "Case Study III: CFC-Based Byzantine Attack Detection." In SpringerBriefs in Electrical and Computer Engineering, 63–72. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_6.
Full textZhang, Linyuan, Guoru Ding, and Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion." In Encyclopedia of Wireless Networks, 147–50. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_301.
Full textZhang, Linyuan, Guoru Ding, and Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion." In Encyclopedia of Wireless Networks, 1–4. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_301-1.
Full textAbrardo, Andrea, Mauro Barni, Kassem Kallas, and Benedetta Tondi. "Security Attacks and Defenses in Distributed Sensor Networks." In Information Fusion in Distributed Sensor Networks with Byzantines, 29–43. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-32-9001-3_3.
Full textBing, Yuchen, Long Wang, and Zesheng Chen. "A Spectrum Sensing Method for UAV Swarms Under Byzantine Attack." In Proceedings of 2021 International Conference on Autonomous Unmanned Systems (ICAUS 2021), 1748–58. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9492-9_172.
Full textSingla, Gagan, and Pallavi Kaliyar. "A Secure Routing Protocol for MANETs Against Byzantine Attacks." In Lecture Notes in Electrical Engineering, 571–78. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-6154-8_56.
Full textConference papers on the topic "Byzantines Attack"
Stanev, Kamen. "THE FIFTH SLAVIC SIEGE OF THESSALONIKI." In THE PATH OF CYRIL AND METHODIUS – SPATIAL AND CULTURAL HISTORICAL DIMENSIONS. Cyrillo-Methodian Research Centre – Bulgarian Academy of Sciences, 2023. http://dx.doi.org/10.59076/2815-3855.2023.33.16.
Full textAmir, Yair, Brian Coan, Jonathan Kirsch, and John Lane. "Byzantine replication under attack." In 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). IEEE, 2008. http://dx.doi.org/10.1109/dsn.2008.4630088.
Full textSun, Ziteng, Chuang Zhang, and Pingyi Fan. "Optimal Byzantine Attack and Byzantine Identification in Distributed Sensor Networks." In 2016 IEEE Globecom Workshops (GC Wkshps). IEEE, 2016. http://dx.doi.org/10.1109/glocomw.2016.7848991.
Full textWan, Wei, Shengshan Hu, jianrong Lu, Leo Yu Zhang, Hai Jin, and Yuanyuan He. "Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/106.
Full textXia, Qi, Zeyi Tao, Zijiang Hao, and Qun Li. "FABA: An Algorithm for Fast Aggregation against Byzantine Attacks in Distributed Neural Networks." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/670.
Full textJi, Jinlong, Xuhui Chen, Qianlong Wang, Lixing Yu, and Pan Li. "Learning to Learn Gradient Aggregation by Gradient Descent." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/363.
Full textZhu, Heng, and Qing Ling. "Bridging Differential Privacy and Byzantine-Robustness via Model Aggregation." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/337.
Full textDeng, Gelei, Yuan Zhou, Yuan Xu, Tianwei Zhang, and Yang Liu. "An Investigation of Byzantine Threats in Multi-Robot Systems." In RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3471621.3471867.
Full textXiao, Guomei, Bo Mi, Darong Huang, Yang Liu, Yang Li, and Yuan Weng. "Anonymous Voting System Against Byzantine Attacks." In 2021 CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes (SAFEPROCESS). IEEE, 2021. http://dx.doi.org/10.1109/safeprocess52771.2021.9693543.
Full textGouissem, A., K. Abualsaud, E. Yaacoub, T. Khattab, and M. Guizani. "Federated Learning Stability Under Byzantine Attacks." In 2022 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2022. http://dx.doi.org/10.1109/wcnc51071.2022.9771594.
Full text