Artículos de revistas sobre el tema "Byzantines Attack"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Byzantines Attack".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Böhm, Marcin. "Constantine X Doukas (1059–1067) versus Uzes – about the Nomads on Boats on the Danube in 1064". Studia Ceranea 11 (30 de diciembre de 2021): 39–49. http://dx.doi.org/10.18778/2084-140x.11.02.
Texto completoVeselinović, Ivana. "The role of the despotess Irene Kantakouzene in the political life of the Serbian Despotate". Zbornik radova Filozofskog fakulteta u Pristini 52, n.º 2 (2022): 177–90. http://dx.doi.org/10.5937/zrffp52-36443.
Texto completoYang, Xiong, Wang y Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks". Sensors 19, n.º 15 (5 de agosto de 2019): 3436. http://dx.doi.org/10.3390/s19153436.
Texto completoWang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long y Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median". Electronics 12, n.º 5 (1 de marzo de 2023): 1190. http://dx.doi.org/10.3390/electronics12051190.
Texto completoSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama y Khaled Mahmoud Badran. "CSMCSM". International Journal of Information Security and Privacy 15, n.º 1 (enero de 2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Texto completoWang, Jingyao, Xingming Deng, Jinghua Guo y Zeqin Zeng. "Resilient Consensus Control for Multi-Agent Systems: A Comparative Survey". Sensors 23, n.º 6 (7 de marzo de 2023): 2904. http://dx.doi.org/10.3390/s23062904.
Texto completoAmir, Y., B. Coan, J. Kirsch y J. Lane. "Prime: Byzantine Replication under Attack". IEEE Transactions on Dependable and Secure Computing 8, n.º 4 (julio de 2011): 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.
Texto completoWan, Fangyi, Ting Ma, Yi Hua, Bin Liao y Xinlin Qing. "Secure distributed estimation under Byzantine attack and manipulation attack". Engineering Applications of Artificial Intelligence 116 (noviembre de 2022): 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.
Texto completoABORISADE, D. O., A. S. SODIYA, A. A. ODUMOSU, O. Y. ALOWOSILE y A. A. ADEDEJI. "A SURVIVABLE DISTRIBUTED DATABASE AGAINST BYZANTINE FAILURE". Journal of Natural Sciences Engineering and Technology 15, n.º 2 (22 de noviembre de 2017): 61–72. http://dx.doi.org/10.51406/jnset.v15i2.1684.
Texto completoMakani, Ruchi y Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks". International Journal of Sensors, Wireless Communications and Control 10, n.º 1 (7 de febrero de 2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.
Texto completoPlatt, Moritz y Peter McBurney. "Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance". Algorithms 16, n.º 1 (6 de enero de 2023): 34. http://dx.doi.org/10.3390/a16010034.
Texto completoKaya, Tülin. "Understanding the Use of Byzantine Routes in Central Anatolia (ca. 7TH–9TH Centuries)". Studia Ceranea 9 (30 de diciembre de 2019): 259–78. http://dx.doi.org/10.18778/2084-140x.09.14.
Texto completoFilatov, Alexey. "The power of the arab caliphs in the byzantine literature of the 9th and 10th centuries". Metamorphoses of history, n.º 26 (2022): 0. http://dx.doi.org/10.37490/s230861810023611-2.
Texto completoWhealey, Alice. "Muslim Motives for Conquering the Byzantine Empire 634–720: The Evidence from Eastern Christian Sources". Russian History 40, n.º 1 (2013): 9–26. http://dx.doi.org/10.1163/18763316-04001002.
Texto completoPashkin, Nikolai G. "Aims of the Byzantine Attack on Gallipoli in 1410". Античная древность и средние века 48 (2020): 156–71. http://dx.doi.org/10.15826/adsv.2020.48.010.
Texto completoCheng, Chien-Fu, Jerry Chun-Wei Lin, Gautam Srivastava y Chu-Chiao Hsu. "Reaching Consensus with Byzantine Faulty Controllers in Software-Defined Networks". Wireless Communications and Mobile Computing 2021 (12 de abril de 2021): 1–9. http://dx.doi.org/10.1155/2021/6662175.
Texto completoLi, Liping, Wei Xu, Tianyi Chen, Georgios B. Giannakis y Qing Ling. "RSA: Byzantine-Robust Stochastic Aggregation Methods for Distributed Learning from Heterogeneous Datasets". Proceedings of the AAAI Conference on Artificial Intelligence 33 (17 de julio de 2019): 1544–51. http://dx.doi.org/10.1609/aaai.v33i01.33011544.
Texto completoKim, Woocheol y Hyuk Lim. "FedCC: Federated Learning with Consensus Confirmation for Byzantine Attack Resistance (Student Abstract)". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 11 (28 de junio de 2022): 12981–82. http://dx.doi.org/10.1609/aaai.v36i11.21627.
Texto completoZhai, Kun, Qiang Ren, Junli Wang y Chungang Yan. "Byzantine-robust federated learning via credibility assessment on non-IID data". Mathematical Biosciences and Engineering 19, n.º 2 (2021): 1659–76. http://dx.doi.org/10.3934/mbe.2022078.
Texto completoGuru, Abhishek, Bhabendu Kumar Mohanta, Hitesh Mohapatra, Fadi Al-Turjman, Chadi Altrjman y Arvind Yadav. "A Survey on Consensus Protocols and Attacks on Blockchain Technology". Applied Sciences 13, n.º 4 (17 de febrero de 2023): 2604. http://dx.doi.org/10.3390/app13042604.
Texto completoCao, Ruohan, Tan F. Wong, Tiejun Lv, Hui Gao y Shaoshi Yang. "Detecting Byzantine Attacks Without Clean Reference". IEEE Transactions on Information Forensics and Security 11, n.º 12 (diciembre de 2016): 2717–31. http://dx.doi.org/10.1109/tifs.2016.2596140.
Texto completoGupta, Chitvan, Laxman Singh y Rajdev Tiwari. "Wormhole attack detection techniques in ad-hoc network: A systematic review". Open Computer Science 12, n.º 1 (1 de enero de 2022): 260–88. http://dx.doi.org/10.1515/comp-2022-0245.
Texto completoPrabhakar, Anjana y Tricha Anjali. "Gray Hole Attack as a Byzantine Attack in a Wireless Multi-Hop Network". Journal of Applied Security Research 15, n.º 1 (18 de octubre de 2019): 116–45. http://dx.doi.org/10.1080/19361610.2019.1669988.
Texto completoAgrawal, Neha, Krishna Kumar y Neelam Joshi. "Implemented and Evaluated the Byzantine Attack with the Aid of Rushing Attack in Manet". International Journal of Computer Applications 130, n.º 6 (17 de noviembre de 2015): 6–11. http://dx.doi.org/10.5120/ijca2015906621.
Texto completoB.Dhakde, Apeksha y Sonali U. Nimbhorkar Sonali.U.Nimbhorkar. "Distributed Detection Methods for Byzantine Attack in Tree Topology". International Journal of Computer Applications 90, n.º 18 (26 de marzo de 2014): 1–4. http://dx.doi.org/10.5120/15817-4238.
Texto completoAgrawal, Neha, Krishna Kumar y Neelam Joshi. "Performance Evaluation of Byzantine Rushing Attack in ADHOC Network". International Journal of Computer Applications 123, n.º 6 (18 de agosto de 2015): 1–4. http://dx.doi.org/10.5120/ijca2015905339.
Texto completoWu, Jun, Pei Li, Yang Chen, Jifei Tang, Chao Wei, Lanhua Xia y Tiecheng Song. "Analysis of Byzantine Attack Strategy for Cooperative Spectrum Sensing". IEEE Communications Letters 24, n.º 8 (agosto de 2020): 1631–35. http://dx.doi.org/10.1109/lcomm.2020.2990869.
Texto completoMenelaou, Iakovos. "Byzantine Satire: The Background in the Timarion". Hiperboreea 4, n.º 2 (1 de diciembre de 2017): 53–66. http://dx.doi.org/10.5325/hiperboreea.4.2.0053.
Texto completoNazário Coelho, Vitor, Rodolfo Pereira Araújo, Haroldo Gambini Santos, Wang Yong Qiang y Igor Machado Coelho. "A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus". Future Internet 12, n.º 11 (29 de octubre de 2020): 185. http://dx.doi.org/10.3390/fi12110185.
Texto completoHarris, Simon. "The Byzantine prokeimena". Plainsong and Medieval Music 3, n.º 2 (octubre de 1994): 133–47. http://dx.doi.org/10.1017/s096113710000070x.
Texto completoWu, Jun, Yue Yu, Hancheng Zhu, Tiecheng Song y Jing Hu. "Cost-Benefit Tradeoff of Byzantine Attack in Cooperative Spectrum Sensing". IEEE Systems Journal 14, n.º 2 (junio de 2020): 2532–43. http://dx.doi.org/10.1109/jsyst.2019.2952395.
Texto completoSarmah, Rupam, Amar Taggu y Ningrinla Marchang. "Detecting Byzantine attack in cognitive radio networks using machine learning". Wireless Networks 26, n.º 8 (9 de julio de 2020): 5939–50. http://dx.doi.org/10.1007/s11276-020-02398-w.
Texto completoZhang, Linyuan, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han y Jinlong Wang. "Byzantine Attack and Defense in Cognitive Radio Networks: A Survey". IEEE Communications Surveys & Tutorials 17, n.º 3 (2015): 1342–63. http://dx.doi.org/10.1109/comst.2015.2422735.
Texto completoMarano, S., V. Matta y Lang Tong. "Distributed Detection in the Presence of Byzantine Attacks". IEEE Transactions on Signal Processing 57, n.º 1 (enero de 2009): 16–29. http://dx.doi.org/10.1109/tsp.2008.2007335.
Texto completoZhao, Bo, Peng Sun, Tao Wang y Keyu Jiang. "FedInv: Byzantine-Robust Federated Learning by Inversing Local Model Updates". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 8 (28 de junio de 2022): 9171–79. http://dx.doi.org/10.1609/aaai.v36i8.20903.
Texto completoJanus, Tomasz, Mateusz Skomra y Marcin Dziubiński. "Individual Security and Network Design with Malicious Nodes". Information 9, n.º 9 (25 de agosto de 2018): 214. http://dx.doi.org/10.3390/info9090214.
Texto completoHong, Sangwoo, Heecheol Yang y Jungwoo Lee. "Hierarchical Group Testing for Byzantine Attack Identification in Distributed Matrix Multiplication". IEEE Journal on Selected Areas in Communications 40, n.º 3 (marzo de 2022): 1013–29. http://dx.doi.org/10.1109/jsac.2022.3142364.
Texto completoXu, Chentao, Qingshan Liu y Tingwen Huang. "Resilient Penalty Function Method for Distributed Constrained Optimization under Byzantine Attack". Information Sciences 596 (junio de 2022): 362–79. http://dx.doi.org/10.1016/j.ins.2022.02.055.
Texto completoFoss, Clive. "Byzantine Malagina and the Lower Sangarius". Anatolian Studies 40 (diciembre de 1990): 161–83. http://dx.doi.org/10.2307/3642800.
Texto completoRodríguez-Barroso, Nuria, Eugenio Martínez-Cámara, M. Victoria Luzón y Francisco Herrera. "Dynamic defense against byzantine poisoning attacks in federated learning". Future Generation Computer Systems 133 (agosto de 2022): 1–9. http://dx.doi.org/10.1016/j.future.2022.03.003.
Texto completoLuo, Junhai y Zan Cao. "Distributed Detection in Wireless Sensor Networks under Byzantine Attacks". International Journal of Distributed Sensor Networks 11, n.º 11 (enero de 2015): 381642. http://dx.doi.org/10.1155/2015/381642.
Texto completoAkbar, Nur Arifin, Amgad Muneer, Narmine ElHakim y Suliman Mohamed Fati. "Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses". Future Internet 13, n.º 11 (12 de noviembre de 2021): 285. http://dx.doi.org/10.3390/fi13110285.
Texto completoLang, Wei Min, Yuan Cheng Zhu y Hu Sheng Li. "A Bayesian Game Analysis of Byzantine Attacks for Wireless Cognitive Sensor Networks in Smart Grids". Advanced Materials Research 571 (septiembre de 2012): 636–40. http://dx.doi.org/10.4028/www.scientific.net/amr.571.636.
Texto completoChen, Huifang, Lei Xie y Congqi Shen. "Optimal Byzantine attack strategy for distributed localisation with M ‐ary quantised data". Electronics Letters 51, n.º 25 (diciembre de 2015): 2158–60. http://dx.doi.org/10.1049/el.2015.2172.
Texto completoFu, Yuanhua y Zhiming He. "Entropy-Based Weighted Decision Combining for Collaborative Spectrum Sensing Over Byzantine Attack". IEEE Wireless Communications Letters 8, n.º 6 (diciembre de 2019): 1528–32. http://dx.doi.org/10.1109/lwc.2019.2926087.
Texto completoHe, Xiaofan, Huaiyu Dai y Peng Ning. "A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check". IEEE Transactions on Wireless Communications 12, n.º 5 (mayo de 2013): 2512–23. http://dx.doi.org/10.1109/twc.2013.031313.121551.
Texto completoFylypchuk, Oleksandr M. "Harald Sigurdsson and the Russo-Byzantine War of 1043". Slovene 3, n.º 1 (2014): 193–205. http://dx.doi.org/10.31168/2305-6754.2014.3.1.7.
Texto completoCoelho, Igor M., Vitor N. Coelho, Rodolfo P. Araujo, Wang Yong Qiang y Brett D. Rhodes. "Challenges of PBFT-Inspired Consensus for Blockchain and Enhancements over Neo dBFT". Future Internet 12, n.º 8 (30 de julio de 2020): 129. http://dx.doi.org/10.3390/fi12080129.
Texto completoJianqi Lu, Ping Wei y Zhe Chen. "Cooperative Spectrum Sensing under Byzantine Attacks in Cognitive Radio Networks". International Journal of Digital Content Technology and its Applications 7, n.º 5 (15 de marzo de 2013): 512–20. http://dx.doi.org/10.4156/jdcta.vol7.issue5.61.
Texto completoXiao, Zhiqing, Yunzhou Li, Ming Zhao, Xibin Xu y Jing Wang. "Allocation of Network Error Correction Flow to Combat Byzantine Attacks". IEEE Transactions on Communications 63, n.º 7 (julio de 2015): 2605–18. http://dx.doi.org/10.1109/tcomm.2015.2438811.
Texto completo