Artículos de revistas sobre el tema "Attacks detection"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Attacks detection".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
BALIGA, SANDEEP, ETHAN BUENO DE MESQUITA y ALEXANDER WOLITZKY. "Deterrence with Imperfect Attribution". American Political Science Review 114, n.º 4 (3 de agosto de 2020): 1155–78. http://dx.doi.org/10.1017/s0003055420000362.
Texto completoKareem, Mohammed Ibrahim, Mohammad Jawad Kadhim Abood y Karrar Ibrahim. "Machine learning-based PortScan attacks detection using OneR classifier". Bulletin of Electrical Engineering and Informatics 12, n.º 6 (1 de diciembre de 2023): 3690–96. http://dx.doi.org/10.11591/eei.v12i6.4142.
Texto completoO, Belej, Spas N, Artyshchuk I y Fedastsou M. "Construction of a multi-agent attack detection system based on artificial intelligence models". Artificial Intelligence 26, jai2021.26(1) (30 de junio de 2021): 22–30. http://dx.doi.org/10.15407/jai2021.01.022.
Texto completoSambangi, Swathi y Lakshmeeswari Gondi. "A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression". Proceedings 63, n.º 1 (25 de diciembre de 2020): 51. http://dx.doi.org/10.3390/proceedings2020063051.
Texto completoXuan, Cho Do, Duc Duong y Hoang Xuan Dau. "A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic". Journal of Intelligent & Fuzzy Systems 40, n.º 6 (21 de junio de 2021): 11311–29. http://dx.doi.org/10.3233/jifs-202465.
Texto completoHaseeb-ur-rehman, Rana M. Abdul, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, Khairul Akram Zainol Ariffin, Abdallah Namoun, Ali Tufail y Ki-Hyung Kim. "High-Speed Network DDoS Attack Detection: A Survey". Sensors 23, n.º 15 (1 de agosto de 2023): 6850. http://dx.doi.org/10.3390/s23156850.
Texto completoZhou, Qing Lei, Yan Ke Zhao y Wei Jun Zhu. "Intrusion Detection for Universal Attack Mode Based on Projection Temporal Logic". Applied Mechanics and Materials 556-562 (mayo de 2014): 2821–24. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.2821.
Texto completoSravanthi, P. "Machine Learning Methods for Attack Detection in Smart Grid". International Journal for Research in Applied Science and Engineering Technology 12, n.º 3 (31 de marzo de 2024): 2257–61. http://dx.doi.org/10.22214/ijraset.2024.59222.
Texto completoGupta, Punit y Pallavi Kaliyar. "History Aware Anomaly Based IDS for Cloud IaaS". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, n.º 6 (30 de agosto de 2013): 1779–84. http://dx.doi.org/10.24297/ijct.v10i6.3205.
Texto completoQiao, Peng Zhe, Yi Ran Wang y Yan Ke Zhao. "Intrusion Detection for Universal Attack Mode Based on Linear Temporal Logic with Past Construct". Applied Mechanics and Materials 680 (octubre de 2014): 433–36. http://dx.doi.org/10.4028/www.scientific.net/amm.680.433.
Texto completoLi, Yong Liang, Wei Jun Zhu y Qing Lei Zhou. "Intrusion Detection for Universal Attack Mode Based on Interval Temporal Logic with Past Construct". Advanced Materials Research 1006-1007 (agosto de 2014): 1047–50. http://dx.doi.org/10.4028/www.scientific.net/amr.1006-1007.1047.
Texto completoSachdev, Rithik, Shreya Mishra y Shekhar Sharma. "Comparison of Supervised Learning Algorithms for DDOS Attack Detection". International Journal for Research in Applied Science and Engineering Technology 10, n.º 8 (31 de agosto de 2022): 1766–72. http://dx.doi.org/10.22214/ijraset.2022.46506.
Texto completoZaini, Nur Sholihah, Deris Stiawan, Mohd Faizal Ab Razak, Ahmad Firdaus, Wan Isni Sofiah Wan Din, Shahreen Kasim y Tole Sutikno. "Phishing detection system using nachine learning classifiers". Indonesian Journal of Electrical Engineering and Computer Science 17, n.º 3 (1 de marzo de 2020): 1165. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1165-1171.
Texto completoDeng, Wenping, Ziyu Yang, Peng Xun, Peidong Zhu y Baosheng Wang. "Advanced Bad Data Injection Attack and Its Migration in Cyber-Physical Systems". Electronics 8, n.º 9 (26 de agosto de 2019): 941. http://dx.doi.org/10.3390/electronics8090941.
Texto completoShang, Fute, Buhong Wang, Fuhu Yan y Tengyao Li. "Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems". Security and Communication Networks 2019 (3 de marzo de 2019): 1–11. http://dx.doi.org/10.1155/2019/8936784.
Texto completoJaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi y A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing". E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Texto completoKumavat, Kavita S. y Joanne Gomes. "Common Mechanism for Detecting Multiple DDoS Attacks". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 4 (4 de mayo de 2023): 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Texto completoLi, Feng y Hai Ying Wang. "Design on DDoS Attack Detection and Prevention Systems". Applied Mechanics and Materials 530-531 (febrero de 2014): 798–801. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.798.
Texto completoFarane Shradha, Gotane Rutuja, Chandanshive Sakshi, Agrawal Khushi y Khandekar Srushti. "Detection of cyber-attacks and network attacks using Machine Learning". World Journal of Advanced Engineering Technology and Sciences 12, n.º 1 (30 de mayo de 2024): 128–32. http://dx.doi.org/10.30574/wjaets.2024.12.1.0184.
Texto completoMiller, David, Yujia Wang y George Kesidis. "When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time". Neural Computation 31, n.º 8 (agosto de 2019): 1624–70. http://dx.doi.org/10.1162/neco_a_01209.
Texto completoHsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai y Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning". Sustainability 13, n.º 22 (12 de noviembre de 2021): 12514. http://dx.doi.org/10.3390/su132212514.
Texto completoAridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications". International Journal of Handheld Computing Research 8, n.º 4 (octubre de 2017): 40–51. http://dx.doi.org/10.4018/ijhcr.2017100104.
Texto completoGhugar, Umashankar, Jayaram Pradhan, Sourav Kumar Bhoi y Rashmi Ranjan Sahoo. "LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System". Journal of Computer Networks and Communications 2019 (6 de enero de 2019): 1–13. http://dx.doi.org/10.1155/2019/2054298.
Texto completoGara, Fatma, Leila Ben Saad y Rahma Ben Ayed. "An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility". International Journal on Semantic Web and Information Systems 13, n.º 3 (julio de 2017): 22–47. http://dx.doi.org/10.4018/ijswis.2017070102.
Texto completoDu, Dajun, Rui Chen, Xue Li, Lei Wu, Peng Zhou y Minrui Fei. "Malicious data deception attacks against power systems: A new case and its detection method". Transactions of the Institute of Measurement and Control 41, n.º 6 (8 de enero de 2018): 1590–99. http://dx.doi.org/10.1177/0142331217740622.
Texto completoShchetinin, Eugeny Yu y Tatyana R. Velieva. "Detection of cyber-attacks on the power smart grids using semi-supervised deep learning models". Discrete and Continuous Models and Applied Computational Science 30, n.º 3 (5 de octubre de 2022): 258–68. http://dx.doi.org/10.22363/2658-4670-2022-30-3-258-268.
Texto completoWang, Jing Lei. "Research on the Detection Method of the Malicious Attacks on Campus Network". Applied Mechanics and Materials 644-650 (septiembre de 2014): 3291–94. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3291.
Texto completoAslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz y Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions". Electronics 12, n.º 6 (11 de marzo de 2023): 1333. http://dx.doi.org/10.3390/electronics12061333.
Texto completoLiu, Bo, Hongyu Wu, Qihui Yang y Hang Zhang. "Random-Enabled Hidden Moving Target Defense against False Data Injection Alert Attackers". Processes 11, n.º 2 (21 de enero de 2023): 348. http://dx.doi.org/10.3390/pr11020348.
Texto completoD., Glăvan. "DDoS detection and prevention based on artificial intelligence techniques". Scientific Bulletin of Naval Academy XXII, n.º 1 (15 de julio de 2019): 134–43. http://dx.doi.org/10.21279/1454-864x-19-i1-018.
Texto completoSoe, Yan Naung, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto y Kouichi Sakurai. "Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture". Sensors 20, n.º 16 (5 de agosto de 2020): 4372. http://dx.doi.org/10.3390/s20164372.
Texto completoFadlil, Abdul, Imam Riadi y Sukma Aji. "Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics". Bulletin of Electrical Engineering and Informatics 6, n.º 2 (1 de junio de 2017): 140–48. http://dx.doi.org/10.11591/eei.v6i2.605.
Texto completoWatson, Lauren, Anupam Mediratta, Tariq Elahi y Rik Sarkar. "Privacy Preserving Detection of Path Bias Attacks in Tor". Proceedings on Privacy Enhancing Technologies 2020, n.º 4 (1 de octubre de 2020): 111–30. http://dx.doi.org/10.2478/popets-2020-0065.
Texto completoHairab, Belal Ibrahim, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut y Marianne A. Azer. "Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques". Electronics 12, n.º 3 (23 de enero de 2023): 573. http://dx.doi.org/10.3390/electronics12030573.
Texto completoXia, Kui Liang. "Modeling and Simulation of Low Rate of Denial of Service Attacks". Applied Mechanics and Materials 484-485 (enero de 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.1063.
Texto completoAlansari, Zainab, Nor Badrul Anuar, Amirrudin Kamsin y Mohammad Riyaz Belgaum. "A systematic review of routing attacks detection in wireless sensor networks". PeerJ Computer Science 8 (21 de octubre de 2022): e1135. http://dx.doi.org/10.7717/peerj-cs.1135.
Texto completoHan, Dezhi, Kun Bi, Han Liu y Jianxin Jia. "A DDoS attack detection system based on spark framework". Computer Science and Information Systems 14, n.º 3 (2017): 769–88. http://dx.doi.org/10.2298/csis161217028h.
Texto completoWu, Kongpei, Huiqin Qu y Conggui Huang. "A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part". Future Internet 15, n.º 4 (28 de marzo de 2023): 128. http://dx.doi.org/10.3390/fi15040128.
Texto completodos Santos, Rodrigo, Ashwitha Kassetty y Shirin Nilizadeh. "Disrupting Audio Event Detection Deep Neural Networks with White Noise". Technologies 9, n.º 3 (6 de septiembre de 2021): 64. http://dx.doi.org/10.3390/technologies9030064.
Texto completoGavrić, Nikola y Živko Bojović. "Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat". Sensors 22, n.º 20 (14 de octubre de 2022): 7791. http://dx.doi.org/10.3390/s22207791.
Texto completoLee, Kyungroul, Jaehyuk Lee y Kangbin Yim. "Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack". Applied Sciences 13, n.º 5 (23 de febrero de 2023): 2894. http://dx.doi.org/10.3390/app13052894.
Texto completoYu, Zhenhua, Xudong Duan, Xuya Cong, Xiangning Li y Li Zheng. "Detection of Actuator Enablement Attacks by Petri Nets in Supervisory Control Systems". Mathematics 11, n.º 4 (13 de febrero de 2023): 943. http://dx.doi.org/10.3390/math11040943.
Texto completoKasture, Pradnya. "DDoS Attack Detection using ML". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de mayo de 2023): 6421–24. http://dx.doi.org/10.22214/ijraset.2023.53133.
Texto completoAlamsyah, Hendri, Riska y Abdussalam Al Akbar. "Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System". JOINTECS (Journal of Information Technology and Computer Science) 5, n.º 1 (25 de enero de 2020): 17. http://dx.doi.org/10.31328/jointecs.v5i1.1240.
Texto completoChauhan, Ravi, Ulya Sabeel, Alireza Izaddoost y Shahram Shah Heydari. "Polymorphic Adversarial Cyberattacks Using WGAN". Journal of Cybersecurity and Privacy 1, n.º 4 (12 de diciembre de 2021): 767–92. http://dx.doi.org/10.3390/jcp1040037.
Texto completoJoshi, Sagar Vasantrao, Nanda Wagh, Jambi Ratna Raja Kumar, Deepika Dongre, Nuzhat Rizvi y Mahua Bhowmik. "Mitigating DDoS attacks with an intrusion detection and prevention system based on 2-player Bayesian game theory". Journal of Discrete Mathematical Sciences and Cryptography 27, n.º 2-B (2024): 809–20. http://dx.doi.org/10.47974/jdmsc-1957.
Texto completoSiddiqa, Ayesha. "Web Based Intrusion Detection System for SQLIA". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, n.º 11 (1 de noviembre de 2023): 1–11. http://dx.doi.org/10.55041/ijsrem26708.
Texto completoChaves, Cesar, Siavoosh Azad, Thomas Hollstein y Johanna Sepúlveda. "DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures". Journal of Low Power Electronics and Applications 9, n.º 1 (5 de febrero de 2019): 7. http://dx.doi.org/10.3390/jlpea9010007.
Texto completoPeterson, Matthew, Todd Andel y Ryan Benton. "Towards Detection of Selfish Mining Using Machine Learning". International Conference on Cyber Warfare and Security 17, n.º 1 (2 de marzo de 2022): 237–43. http://dx.doi.org/10.34190/iccws.17.1.15.
Texto completoChamotra, Saurabh, Rakesh Kumar Sehgal y Ram Swaroop Misra. "Honeypot Baselining for Zero Day Attack Detection". International Journal of Information Security and Privacy 11, n.º 3 (julio de 2017): 63–74. http://dx.doi.org/10.4018/ijisp.2017070106.
Texto completo