Academic literature on the topic 'Trust attacks Prevention'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trust attacks Prevention.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Trust attacks Prevention"
Karabacak, Bilge, and Todd Whittaker. "Zero Trust and Advanced Persistent Threats: Who Will Win the War?" International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 92–101. http://dx.doi.org/10.34190/iccws.17.1.10.
Full textLi, Lixiang, Jürgen Kurths, Yixian Yang, and Guole Liu. "Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks." Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/189213.
Full textKhan, Muhammad Ali, Rao Naveed Bin Rais, Osman Khalid, and Sanan Ahmad. "Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks." Sensors 24, no. 6 (March 9, 2024): 1775. http://dx.doi.org/10.3390/s24061775.
Full textS, Ananthakumaran. "Prevention of Routing Attacks using Trust-Based Multipath Protocol." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 3 (June 25, 2020): 4022–29. http://dx.doi.org/10.30534/ijatcse/2020/227932020.
Full textAtiq, Eman, Maheen Mujeeb, and Mujeeb Ur Rehman. "An Epidemiological study of Acid Burn Incidents in Pakistan: Causes, Consequences and Prevention Strategies." British journal of Psychology Research 11, no. 2 (February 15, 2023): 51–58. http://dx.doi.org/10.37745/bjpr.2013/vol11n25158.
Full textBoakye-Boateng, Kwasi, Ali A. Ghorbani, and Arash Habibi Lashkari. "A Trust-Influenced Smart Grid: A Survey and a Proposal." Journal of Sensor and Actuator Networks 11, no. 3 (July 11, 2022): 34. http://dx.doi.org/10.3390/jsan11030034.
Full textSalahdine, Fatima, and Naima Kaabouch. "Social Engineering Attacks: A Survey." Future Internet 11, no. 4 (April 2, 2019): 89. http://dx.doi.org/10.3390/fi11040089.
Full textSubathra, P., S. Sivagurunathan, and N. Ramaraj. "Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks." International Journal of Business Data Communications and Networking 6, no. 1 (January 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.
Full textMoinescu, Radu. "Study of social engineering attacks in Romania 2019." Scientific Bulletin of Naval Academy XXIII, no. 1 (July 15, 2020): 263–70. http://dx.doi.org/10.21279/1454-864x-20-i1-037.
Full textQuader, Faisal, and Vandana P. Janeja. "Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies." Journal of Cybersecurity and Privacy 1, no. 4 (November 11, 2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.
Full textDissertations / Theses on the topic "Trust attacks Prevention"
Masmoudi, Mariam. "Prévention des attaques de confiance en temps réel dans l'IoT social." Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.
Full textThe social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
Alruwaili, Fahad F. "Information security, privacy, and compliance models for cloud computing services." Thesis, 2016. http://hdl.handle.net/1828/7119.
Full textGraduate
0984
0790
fahd333@gmail.com
Books on the topic "Trust attacks Prevention"
Office, General Accounting. Financial management: Recommendations on Indian trust fund Strategic Plan proposals : report to the Secretary of the Interior. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1997.
Find full textUnited States. Congress. Senate. Committee on Indian Affairs., ed. Financial management: Creation of Bureau of Indian Affairs' Trust Fund Special Projects Team : report to the Chairman, Committee on Indian Affairs, U.S. Senate. Washington, D.C: The Office, 1993.
Find full textOffice, General Accounting. Financial management: Status of the governmentwide efforts to address improper payment problems : report to the Subcommittee on Government Efficiency and Financial Management, Committee on Government Reform, House of Representatives. Washington, D.C: GAO, 2003.
Find full textOffice, General Accounting. Financial management: Survey of capitalization threshold and other policies for property, plant, and equipment : report to Agency officials. Washington, D.C: U.S. General Accounting Office, 2002.
Find full textOffice, General Accounting. Financial management: Profile of Army financial managers : report to the Assistant Secretary of the Army (Financial Management and Comptroller). Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1998.
Find full textOffice, General Accounting. Financial management: Differences in Army and Air Force disbursing and accounting records : report to the Honorable Charles E. Grassley, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 2000.
Find full textOffice, General Accounting. Financial management: Coordinated approach needed to address the government's improper payments problems : report to the Ranking Minority Member, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: United States General Accounting Office, 2002.
Find full textOffice, General Accounting. Financial management: Profile of Navy and Marine Corps financial managers : report to the Acting Assistant Secretary of the Navy (Financial Management and Comptroller). Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1998.
Find full textOffice, General Accounting. Financial management: Problems in accounting for Navy transactions impair funds control and financial reporting : report to agency officials. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Find full textOffice, General Accounting. Financial management: An overview of finance and accounting activities in DOD : report to the Chairman, Subcommittee on Defense, Committee on Appropriations, U.S. Senate. Washington, D.C: The Office, 1997.
Find full textBook chapters on the topic "Trust attacks Prevention"
Sardar, Mousumi, Subhashis Banerjee, Kishore Majhi, and Koushik Majumder. "Trust Based Network Layer Attacks Prevention in MANET." In Lecture Notes in Electrical Engineering, 193–204. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.
Full textChouhan, Piyush, and Swapnil Jain. "Prevention of DDoS Attack Through Trust Management System for VANET Environment." In Second International Conference on Computer Networks and Communication Technologies, 424–35. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37051-0_49.
Full textRoy, Amit Kumar, and Ajoy Kumar Khan. "Prevention Against Internal Attack via Trust-Based Detection for Wireless Mesh Networks." In Lecture Notes in Electrical Engineering, 109–17. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5341-7_8.
Full textSingla, Bhawna, A. K. Verma, and L. R. Raheja. "Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection." In Machine Learning for Computer and Cyber Security, 258–77. Boca Raton, FL : Taylor & Francis Group, [2019] | “A science publishers book.”: CRC Press, 2019. http://dx.doi.org/10.1201/9780429504044-11.
Full text"Chapter 7: Terrorism prevention through trust-building." In A Mindsponge-Based Investigation into the Psycho-Religious Mechanism Behind Suicide Attacks, 70–82. Sciendo, 2021. http://dx.doi.org/10.2478/9788366675599-013.
Full textShukla, Piyush Kumar, and Kirti Raj Bhatele. "Security in Ad-Hoc Networks (MANETS)." In Next Generation Wireless Network Security and Privacy, 286–312. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8687-8.ch010.
Full textKapoor, Janesh, and Nor Azlina Abdul Rahman. "Organizational Security Improvement in Preventing Deepfake Ransomware." In Digital Innovation Adoption: Architectural Recommendations and Security Solutions, 58–78. BENTHAM SCIENCE PUBLISHERS, 2024. http://dx.doi.org/10.2174/9789815079661124010009.
Full textRevathy P and Belshia Jebamalar G. "A Review Based on Secure Banking Application Against Server Attacks." In Advances in Parallel Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210044.
Full textGorman, Sara E., and Jack M. Gorman. "The Attack on Health and Science Institutions." In Denying to the Grave, 303–32. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197547458.003.0009.
Full textDe Rango, Floriano. "Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs." In Networking and Telecommunications, 1488–505. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch097.
Full textConference papers on the topic "Trust attacks Prevention"
Rathour, Shimmi Singh, and Nitin Manjhi. "Trust base hybrid approach for detection and prevention MANET from attacks." In 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). IEEE, 2016. http://dx.doi.org/10.1109/icacdot.2016.7877737.
Full textChoudhary, Sarika, and Nishtha Kesswani. "Detection and Prevention of Routing Attacks in Internet of Things." In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018. http://dx.doi.org/10.1109/trustcom/bigdatase.2018.00219.
Full textVaseer, Gurveen, Garima Ghai, and Dhruva Ghai. "Distributed Trust-Based Multiple Attack Prevention for Secure MANETs." In 2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS). IEEE, 2018. http://dx.doi.org/10.1109/ises.2018.00032.
Full textGriscioli, Federico, Maurizio Pizzonia, and Marco Sacchetti. "USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7907004.
Full textGhosh, Shamit, and Dipanwita Roy Chowdhury. "Preventing fault attack on stream cipher using randomization." In 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2015. http://dx.doi.org/10.1109/hst.2015.7140243.
Full textDachowicz, Adam, Mikhail Atallah, and Jitesh H. Panchal. "Extraction and Analysis of Spatial Correlation Micrograph Features for Traceability in Manufacturing." In ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-98378.
Full textPadmanabhan, Jayashree, K. S. Easwarakumar, Gokul B., and Harishankar S. "Trust based traffic monitoring approach for preventing denial of service attacks." In the 2nd international conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1626195.1626245.
Full textBhawsar, Aditya, Yogadhar Pandey, and Upendra Singh. "Detection and Prevention of Wormhole Attack using the Trust-based Routing System." In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2020. http://dx.doi.org/10.1109/icesc48915.2020.9156009.
Full textSaxena, Mohit. "A mutual playmate attack prevention algorithm enhancing trust levels in MANET's systems." In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7155036.
Full textNakano, Hironori, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, and Iwao Sasase. "Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN." In 2019 25th Asia-Pacific Conference on Communications (APCC). IEEE, 2019. http://dx.doi.org/10.1109/apcc47188.2019.9026521.
Full text