Journal articles on the topic 'Byzantines Attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Byzantines Attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Böhm, Marcin. "Constantine X Doukas (1059–1067) versus Uzes – about the Nomads on Boats on the Danube in 1064." Studia Ceranea 11 (December 30, 2021): 39–49. http://dx.doi.org/10.18778/2084-140x.11.02.
Full textVeselinović, Ivana. "The role of the despotess Irene Kantakouzene in the political life of the Serbian Despotate." Zbornik radova Filozofskog fakulteta u Pristini 52, no. 2 (2022): 177–90. http://dx.doi.org/10.5937/zrffp52-36443.
Full textYang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (August 5, 2019): 3436. http://dx.doi.org/10.3390/s19153436.
Full textWang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long, and Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median." Electronics 12, no. 5 (March 1, 2023): 1190. http://dx.doi.org/10.3390/electronics12051190.
Full textSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (January 2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Full textWang, Jingyao, Xingming Deng, Jinghua Guo, and Zeqin Zeng. "Resilient Consensus Control for Multi-Agent Systems: A Comparative Survey." Sensors 23, no. 6 (March 7, 2023): 2904. http://dx.doi.org/10.3390/s23062904.
Full textAmir, Y., B. Coan, J. Kirsch, and J. Lane. "Prime: Byzantine Replication under Attack." IEEE Transactions on Dependable and Secure Computing 8, no. 4 (July 2011): 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.
Full textWan, Fangyi, Ting Ma, Yi Hua, Bin Liao, and Xinlin Qing. "Secure distributed estimation under Byzantine attack and manipulation attack." Engineering Applications of Artificial Intelligence 116 (November 2022): 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.
Full textABORISADE, D. O., A. S. SODIYA, A. A. ODUMOSU, O. Y. ALOWOSILE, and A. A. ADEDEJI. "A SURVIVABLE DISTRIBUTED DATABASE AGAINST BYZANTINE FAILURE." Journal of Natural Sciences Engineering and Technology 15, no. 2 (November 22, 2017): 61–72. http://dx.doi.org/10.51406/jnset.v15i2.1684.
Full textMakani, Ruchi, and Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (February 7, 2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.
Full textPlatt, Moritz, and Peter McBurney. "Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance." Algorithms 16, no. 1 (January 6, 2023): 34. http://dx.doi.org/10.3390/a16010034.
Full textKaya, Tülin. "Understanding the Use of Byzantine Routes in Central Anatolia (ca. 7TH–9TH Centuries)." Studia Ceranea 9 (December 30, 2019): 259–78. http://dx.doi.org/10.18778/2084-140x.09.14.
Full textFilatov, Alexey. "The power of the arab caliphs in the byzantine literature of the 9th and 10th centuries." Metamorphoses of history, no. 26 (2022): 0. http://dx.doi.org/10.37490/s230861810023611-2.
Full textWhealey, Alice. "Muslim Motives for Conquering the Byzantine Empire 634–720: The Evidence from Eastern Christian Sources." Russian History 40, no. 1 (2013): 9–26. http://dx.doi.org/10.1163/18763316-04001002.
Full textPashkin, Nikolai G. "Aims of the Byzantine Attack on Gallipoli in 1410." Античная древность и средние века 48 (2020): 156–71. http://dx.doi.org/10.15826/adsv.2020.48.010.
Full textCheng, Chien-Fu, Jerry Chun-Wei Lin, Gautam Srivastava, and Chu-Chiao Hsu. "Reaching Consensus with Byzantine Faulty Controllers in Software-Defined Networks." Wireless Communications and Mobile Computing 2021 (April 12, 2021): 1–9. http://dx.doi.org/10.1155/2021/6662175.
Full textLi, Liping, Wei Xu, Tianyi Chen, Georgios B. Giannakis, and Qing Ling. "RSA: Byzantine-Robust Stochastic Aggregation Methods for Distributed Learning from Heterogeneous Datasets." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1544–51. http://dx.doi.org/10.1609/aaai.v33i01.33011544.
Full textKim, Woocheol, and Hyuk Lim. "FedCC: Federated Learning with Consensus Confirmation for Byzantine Attack Resistance (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 11 (June 28, 2022): 12981–82. http://dx.doi.org/10.1609/aaai.v36i11.21627.
Full textZhai, Kun, Qiang Ren, Junli Wang, and Chungang Yan. "Byzantine-robust federated learning via credibility assessment on non-IID data." Mathematical Biosciences and Engineering 19, no. 2 (2021): 1659–76. http://dx.doi.org/10.3934/mbe.2022078.
Full textGuru, Abhishek, Bhabendu Kumar Mohanta, Hitesh Mohapatra, Fadi Al-Turjman, Chadi Altrjman, and Arvind Yadav. "A Survey on Consensus Protocols and Attacks on Blockchain Technology." Applied Sciences 13, no. 4 (February 17, 2023): 2604. http://dx.doi.org/10.3390/app13042604.
Full textCao, Ruohan, Tan F. Wong, Tiejun Lv, Hui Gao, and Shaoshi Yang. "Detecting Byzantine Attacks Without Clean Reference." IEEE Transactions on Information Forensics and Security 11, no. 12 (December 2016): 2717–31. http://dx.doi.org/10.1109/tifs.2016.2596140.
Full textGupta, Chitvan, Laxman Singh, and Rajdev Tiwari. "Wormhole attack detection techniques in ad-hoc network: A systematic review." Open Computer Science 12, no. 1 (January 1, 2022): 260–88. http://dx.doi.org/10.1515/comp-2022-0245.
Full textPrabhakar, Anjana, and Tricha Anjali. "Gray Hole Attack as a Byzantine Attack in a Wireless Multi-Hop Network." Journal of Applied Security Research 15, no. 1 (October 18, 2019): 116–45. http://dx.doi.org/10.1080/19361610.2019.1669988.
Full textAgrawal, Neha, Krishna Kumar, and Neelam Joshi. "Implemented and Evaluated the Byzantine Attack with the Aid of Rushing Attack in Manet." International Journal of Computer Applications 130, no. 6 (November 17, 2015): 6–11. http://dx.doi.org/10.5120/ijca2015906621.
Full textB.Dhakde, Apeksha, and Sonali U. Nimbhorkar Sonali.U.Nimbhorkar. "Distributed Detection Methods for Byzantine Attack in Tree Topology." International Journal of Computer Applications 90, no. 18 (March 26, 2014): 1–4. http://dx.doi.org/10.5120/15817-4238.
Full textAgrawal, Neha, Krishna Kumar, and Neelam Joshi. "Performance Evaluation of Byzantine Rushing Attack in ADHOC Network." International Journal of Computer Applications 123, no. 6 (August 18, 2015): 1–4. http://dx.doi.org/10.5120/ijca2015905339.
Full textWu, Jun, Pei Li, Yang Chen, Jifei Tang, Chao Wei, Lanhua Xia, and Tiecheng Song. "Analysis of Byzantine Attack Strategy for Cooperative Spectrum Sensing." IEEE Communications Letters 24, no. 8 (August 2020): 1631–35. http://dx.doi.org/10.1109/lcomm.2020.2990869.
Full textMenelaou, Iakovos. "Byzantine Satire: The Background in the Timarion." Hiperboreea 4, no. 2 (December 1, 2017): 53–66. http://dx.doi.org/10.5325/hiperboreea.4.2.0053.
Full textNazário Coelho, Vitor, Rodolfo Pereira Araújo, Haroldo Gambini Santos, Wang Yong Qiang, and Igor Machado Coelho. "A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus." Future Internet 12, no. 11 (October 29, 2020): 185. http://dx.doi.org/10.3390/fi12110185.
Full textHarris, Simon. "The Byzantine prokeimena." Plainsong and Medieval Music 3, no. 2 (October 1994): 133–47. http://dx.doi.org/10.1017/s096113710000070x.
Full textWu, Jun, Yue Yu, Hancheng Zhu, Tiecheng Song, and Jing Hu. "Cost-Benefit Tradeoff of Byzantine Attack in Cooperative Spectrum Sensing." IEEE Systems Journal 14, no. 2 (June 2020): 2532–43. http://dx.doi.org/10.1109/jsyst.2019.2952395.
Full textSarmah, Rupam, Amar Taggu, and Ningrinla Marchang. "Detecting Byzantine attack in cognitive radio networks using machine learning." Wireless Networks 26, no. 8 (July 9, 2020): 5939–50. http://dx.doi.org/10.1007/s11276-020-02398-w.
Full textZhang, Linyuan, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, and Jinlong Wang. "Byzantine Attack and Defense in Cognitive Radio Networks: A Survey." IEEE Communications Surveys & Tutorials 17, no. 3 (2015): 1342–63. http://dx.doi.org/10.1109/comst.2015.2422735.
Full textMarano, S., V. Matta, and Lang Tong. "Distributed Detection in the Presence of Byzantine Attacks." IEEE Transactions on Signal Processing 57, no. 1 (January 2009): 16–29. http://dx.doi.org/10.1109/tsp.2008.2007335.
Full textZhao, Bo, Peng Sun, Tao Wang, and Keyu Jiang. "FedInv: Byzantine-Robust Federated Learning by Inversing Local Model Updates." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 8 (June 28, 2022): 9171–79. http://dx.doi.org/10.1609/aaai.v36i8.20903.
Full textJanus, Tomasz, Mateusz Skomra, and Marcin Dziubiński. "Individual Security and Network Design with Malicious Nodes." Information 9, no. 9 (August 25, 2018): 214. http://dx.doi.org/10.3390/info9090214.
Full textHong, Sangwoo, Heecheol Yang, and Jungwoo Lee. "Hierarchical Group Testing for Byzantine Attack Identification in Distributed Matrix Multiplication." IEEE Journal on Selected Areas in Communications 40, no. 3 (March 2022): 1013–29. http://dx.doi.org/10.1109/jsac.2022.3142364.
Full textXu, Chentao, Qingshan Liu, and Tingwen Huang. "Resilient Penalty Function Method for Distributed Constrained Optimization under Byzantine Attack." Information Sciences 596 (June 2022): 362–79. http://dx.doi.org/10.1016/j.ins.2022.02.055.
Full textFoss, Clive. "Byzantine Malagina and the Lower Sangarius." Anatolian Studies 40 (December 1990): 161–83. http://dx.doi.org/10.2307/3642800.
Full textRodríguez-Barroso, Nuria, Eugenio Martínez-Cámara, M. Victoria Luzón, and Francisco Herrera. "Dynamic defense against byzantine poisoning attacks in federated learning." Future Generation Computer Systems 133 (August 2022): 1–9. http://dx.doi.org/10.1016/j.future.2022.03.003.
Full textLuo, Junhai, and Zan Cao. "Distributed Detection in Wireless Sensor Networks under Byzantine Attacks." International Journal of Distributed Sensor Networks 11, no. 11 (January 2015): 381642. http://dx.doi.org/10.1155/2015/381642.
Full textAkbar, Nur Arifin, Amgad Muneer, Narmine ElHakim, and Suliman Mohamed Fati. "Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses." Future Internet 13, no. 11 (November 12, 2021): 285. http://dx.doi.org/10.3390/fi13110285.
Full textLang, Wei Min, Yuan Cheng Zhu, and Hu Sheng Li. "A Bayesian Game Analysis of Byzantine Attacks for Wireless Cognitive Sensor Networks in Smart Grids." Advanced Materials Research 571 (September 2012): 636–40. http://dx.doi.org/10.4028/www.scientific.net/amr.571.636.
Full textChen, Huifang, Lei Xie, and Congqi Shen. "Optimal Byzantine attack strategy for distributed localisation with M ‐ary quantised data." Electronics Letters 51, no. 25 (December 2015): 2158–60. http://dx.doi.org/10.1049/el.2015.2172.
Full textFu, Yuanhua, and Zhiming He. "Entropy-Based Weighted Decision Combining for Collaborative Spectrum Sensing Over Byzantine Attack." IEEE Wireless Communications Letters 8, no. 6 (December 2019): 1528–32. http://dx.doi.org/10.1109/lwc.2019.2926087.
Full textHe, Xiaofan, Huaiyu Dai, and Peng Ning. "A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check." IEEE Transactions on Wireless Communications 12, no. 5 (May 2013): 2512–23. http://dx.doi.org/10.1109/twc.2013.031313.121551.
Full textFylypchuk, Oleksandr M. "Harald Sigurdsson and the Russo-Byzantine War of 1043." Slovene 3, no. 1 (2014): 193–205. http://dx.doi.org/10.31168/2305-6754.2014.3.1.7.
Full textCoelho, Igor M., Vitor N. Coelho, Rodolfo P. Araujo, Wang Yong Qiang, and Brett D. Rhodes. "Challenges of PBFT-Inspired Consensus for Blockchain and Enhancements over Neo dBFT." Future Internet 12, no. 8 (July 30, 2020): 129. http://dx.doi.org/10.3390/fi12080129.
Full textJianqi Lu, Ping Wei, and Zhe Chen. "Cooperative Spectrum Sensing under Byzantine Attacks in Cognitive Radio Networks." International Journal of Digital Content Technology and its Applications 7, no. 5 (March 15, 2013): 512–20. http://dx.doi.org/10.4156/jdcta.vol7.issue5.61.
Full textXiao, Zhiqing, Yunzhou Li, Ming Zhao, Xibin Xu, and Jing Wang. "Allocation of Network Error Correction Flow to Combat Byzantine Attacks." IEEE Transactions on Communications 63, no. 7 (July 2015): 2605–18. http://dx.doi.org/10.1109/tcomm.2015.2438811.
Full text