Artículos de revistas sobre el tema "Dynamic attack graph"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Dynamic attack graph".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi y A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing". E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Texto completoPal, Arunangshu y Prasenjit Choudhury. "Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph". Mapana - Journal of Sciences 11, n.º 4 (22 de agosto de 2012): 65–76. http://dx.doi.org/10.12723/mjs.23.5.
Texto completoSæther, Sigve Hortemo, Jan Arne Telle y Martin Vatshelle. "Solving #SAT and MAXSAT by Dynamic Programming". Journal of Artificial Intelligence Research 54 (9 de septiembre de 2015): 59–82. http://dx.doi.org/10.1613/jair.4831.
Texto completoRajeshwari, T. y C. Thangamani. "Attack Impact Discovery and Recovery with Dynamic Bayesian Networks". Asian Journal of Computer Science and Technology 8, S1 (5 de febrero de 2019): 74–79. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1953.
Texto completoHu, Chenao y Xuefeng Yan. "Dynamic Trilateral Game Model for Attack Graph Security Game". IOP Conference Series: Materials Science and Engineering 790 (7 de abril de 2020): 012112. http://dx.doi.org/10.1088/1757-899x/790/1/012112.
Texto completoLv, Huiying, Yuan Zhang y Jie Wang. "Network Threat Identification and Analysis Based on a State Transition Graph". Cybernetics and Information Technologies 13, Special-Issue (1 de diciembre de 2013): 51–61. http://dx.doi.org/10.2478/cait-2013-0037.
Texto completoGao, Xiang, Xue Qin Xu y Min Wang. "Evaluating Network Security Based on Attack Graph". Advanced Materials Research 756-759 (septiembre de 2013): 2374–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2374.
Texto completoLee, Dongjin, Juho Lee y Kijung Shin. "Spear and Shield: Adversarial Attacks and Defense Methods for Model-Based Link Prediction on Continuous-Time Dynamic Graphs". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 12 (24 de marzo de 2024): 13374–82. http://dx.doi.org/10.1609/aaai.v38i12.29239.
Texto completoBoudermine, Antoine, Rida Khatoun y Jean-Henri Choyer. "Dynamic logic-based attack graph for risk assessment in complex computer systems". Computer Networks 228 (junio de 2023): 109730. http://dx.doi.org/10.1016/j.comnet.2023.109730.
Texto completoGuo, Mingyu, Max Ward, Aneta Neumann, Frank Neumann y Hung Nguyen. "Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs". Proceedings of the AAAI Conference on Artificial Intelligence 37, n.º 5 (26 de junio de 2023): 5649–56. http://dx.doi.org/10.1609/aaai.v37i5.25701.
Texto completoKavallieratos, Georgios, Nabin Chowdhury, Sokratis Katsikas, Vasileios Gkioulos y Stephen Wolthusen. "Threat Analysis for Smart Homes". Future Internet 11, n.º 10 (25 de septiembre de 2019): 207. http://dx.doi.org/10.3390/fi11100207.
Texto completoBopche, Ghanshyam S. y Babu M. Mehtre. "Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks". Computers & Security 64 (enero de 2017): 16–43. http://dx.doi.org/10.1016/j.cose.2016.09.010.
Texto completoAlwasel, Bader, Abdulaziz Aldribi, Mohammed Alreshoodi, Ibrahim S. Alsukayti y Mohammed Alsuhaibani. "Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection". Applied Sciences 13, n.º 13 (30 de junio de 2023): 7774. http://dx.doi.org/10.3390/app13137774.
Texto completoWan, Shanshan y Ying Liu. "A security detection approach based on autonomy-oriented user sensor in social recommendation network". International Journal of Distributed Sensor Networks 18, n.º 3 (marzo de 2022): 155013292210824. http://dx.doi.org/10.1177/15501329221082415.
Texto completoShahpasand, Maryam, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani y Hoda Ghavamipoor. "A comprehensive security control selection model for inter-dependent organizational assets structure". Information & Computer Security 23, n.º 2 (8 de junio de 2015): 218–42. http://dx.doi.org/10.1108/ics-12-2013-0090.
Texto completoSen, Saurabh Kumar y Anuradha Deolase. "Analyse Cyberattack at Organizations using Logistic Regression Algorithm". International Journal for Research in Applied Science and Engineering Technology 10, n.º 3 (31 de marzo de 2022): 518–25. http://dx.doi.org/10.22214/ijraset.2022.40663.
Texto completoKholidy, Hisham A. "Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method". Sensors 22, n.º 1 (21 de diciembre de 2021): 9. http://dx.doi.org/10.3390/s22010009.
Texto completoKim, Jiyeon y Hyong S. Kim. "Intrusion Detection Based on Spatiotemporal Characterization of Cyberattacks". Electronics 9, n.º 3 (9 de marzo de 2020): 460. http://dx.doi.org/10.3390/electronics9030460.
Texto completoGao, Yazhuo, Guomin Zhang y Changyou Xing. "A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction". Security and Communication Networks 2021 (21 de octubre de 2021): 1–15. http://dx.doi.org/10.1155/2021/6378218.
Texto completoHu, Hao, Hongqi Zhang, Yuling Liu y Yongwei Wang. "Quantitative Method for Network Security Situation Based on Attack Prediction". Security and Communication Networks 2017 (2017): 1–19. http://dx.doi.org/10.1155/2017/3407642.
Texto completoQiang, Weizhong, Shizhen Wang, Hai Jin y Jiangying Zhong. "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS". Security and Communication Networks 2018 (17 de octubre de 2018): 1–11. http://dx.doi.org/10.1155/2018/3130652.
Texto completoQin, Zhi-Quan, Hong-Zuo Xu, Xing-Kong Ma y Yong-Jun Wang. "Interaction Context-Aware Network Behavior Anomaly Detection for Discovering Unknown Attacks". Security and Communication Networks 2022 (11 de abril de 2022): 1–24. http://dx.doi.org/10.1155/2022/3595304.
Texto completoTurnip, Togu Novriansyah, William Suarez Lumbantobing, David Christian Sitorus y Friska Laurenzia Sianturi. "Software Watermarking Dinamis dengan Algoritme Collberg-Thomborson Dan Parent Pointer Graf pada Aplikasi Android". Jurnal Teknologi Informasi dan Ilmu Komputer 8, n.º 4 (22 de julio de 2021): 831. http://dx.doi.org/10.25126/jtiik.2021844500.
Texto completoWang, Chundong, Zheli Liu y Tong Zhao. "An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm". International Journal of Information and Computer Security 12, n.º 4 (2020): 397. http://dx.doi.org/10.1504/ijics.2020.10028756.
Texto completoWang, Chundong, Tong Zhao y Zheli Liu. "An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm". International Journal of Information and Computer Security 12, n.º 4 (2020): 397. http://dx.doi.org/10.1504/ijics.2020.107448.
Texto completoSong, Xuyan, Chen Chen, Baojiang Cui y Junsong Fu. "Malicious JavaScript Detection Based on Bidirectional LSTM Model". Applied Sciences 10, n.º 10 (16 de mayo de 2020): 3440. http://dx.doi.org/10.3390/app10103440.
Texto completoHeigl, Michael, Enrico Weigelt, Andreas Urmann, Dalibor Fiala y Martin Schramm. "Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data". Electronics 10, n.º 17 (4 de septiembre de 2021): 2160. http://dx.doi.org/10.3390/electronics10172160.
Texto completoCraandijk, Dennis y Floris Bex. "Enforcement Heuristics for Argumentation with Deep Reinforcement Learning". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 5 (28 de junio de 2022): 5573–81. http://dx.doi.org/10.1609/aaai.v36i5.20497.
Texto completoXu, Hanyi, Guozhen Cheng, Xiaohan Yang, Wenyan Liu, Dacheng Zhou y Wei Guo. "Multi-Dimensional Moving Target Defense Method Based on Adaptive Simulated Annealing Genetic Algorithm". Electronics 13, n.º 3 (24 de enero de 2024): 487. http://dx.doi.org/10.3390/electronics13030487.
Texto completoАверьянов, В. С. y И. Н. Карцан. "ASSESSMENT OF THE SECURITY OF CYBER-PHYSICAL SYSTEMS BASED ON A GENERAL GRAPH". Южно-Сибирский научный вестник, n.º 1(41) (28 de febrero de 2022): 30–35. http://dx.doi.org/10.25699/sssb.2022.41.1.013.
Texto completoUstun, Taha Selim y Saqib Ayyubi. "Automated Network Topology Extraction Based on Graph Theory for Distributed Microgrid Protection in Dynamic Power Systems". Electronics 8, n.º 6 (10 de junio de 2019): 655. http://dx.doi.org/10.3390/electronics8060655.
Texto completoZhang, Quan, Chijin Zhou, Yiwen Xu, Zijing Yin, Mingzhe Wang, Zhuo Su, Chengnian Sun, Yu Jiang y Jiaguang Sun. "Building Dynamic System Call Sandbox with Partial Order Analysis". Proceedings of the ACM on Programming Languages 7, OOPSLA2 (16 de octubre de 2023): 1253–80. http://dx.doi.org/10.1145/3622842.
Texto completoInibhunu, Catherine y Scott Langevin. "Adaptive Visualization of Complex Networks with FocalPoint". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, n.º 1 (septiembre de 2016): 233–37. http://dx.doi.org/10.1177/1541931213601052.
Texto completoCheng, Xiao Han, Shan Ming Luo, Xue Feng Chang y Dan Xie. "Numerical Analysis of an External Flow-Field around a Formula SAE Car Body Based on FLUENT". Advanced Materials Research 1039 (octubre de 2014): 17–24. http://dx.doi.org/10.4028/www.scientific.net/amr.1039.17.
Texto completoMannarini, Gianandrea, Mario Leonardo Salinas, Lorenzo Carelli, Nicola Petacco y Josip Orović. "VISIR-2: ship weather routing in Python". Geoscientific Model Development 17, n.º 10 (24 de mayo de 2024): 4355–82. http://dx.doi.org/10.5194/gmd-17-4355-2024.
Texto completoJayanthi Rao, Et al. "Intelligent Traffic Monitoring System Using Vehicular Ad Hoc Network". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 10 (2 de noviembre de 2023): 629–35. http://dx.doi.org/10.17762/ijritcc.v11i10.8557.
Texto completoZhuang, Jun y Mohammad Al Hasan. "Defending Graph Convolutional Networks against Dynamic Graph Perturbations via Bayesian Self-Supervision". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 4 (28 de junio de 2022): 4405–13. http://dx.doi.org/10.1609/aaai.v36i4.20362.
Texto completoOnyshchenko, Svitlana, Alina Yanko, Alina Hlushko y Polina Sabelnikova. "Assessment of information protection level against unauthorized access". ScienceRise, n.º 2 (30 de abril de 2023): 36–44. http://dx.doi.org/10.21303/2313-8416.2023.003211.
Texto completoManoharan, J. Samuel. "Design of an Intelligent Approach on Capsule Networks to Detect Forged Images". September 2021 3, n.º 3 (2 de octubre de 2021): 205–21. http://dx.doi.org/10.36548/jtcsst.2021.3.004.
Texto completoFang, Zhu y Zhengquan Xu. "Dynamic Random Graph Protection Scheme Based on Chaos and Cryptographic Random Mapping". Information 13, n.º 11 (14 de noviembre de 2022): 537. http://dx.doi.org/10.3390/info13110537.
Texto completoZhang, Shuqin, Shijie Wang, Guangyao Bai, Minzhi Zhang, Peng Chen, Chunxia Zhao, Shuhan Li y Jiehan Zhou. "Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution". Wireless Communications and Mobile Computing 2022 (16 de junio de 2022): 1–16. http://dx.doi.org/10.1155/2022/2323228.
Texto completoKalinin, Maxim, Evgenii Zavadskii y Alexey Busygin. "A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure". Sensors 23, n.º 21 (26 de octubre de 2023): 8724. http://dx.doi.org/10.3390/s23218724.
Texto completoNguyen, Thanh H., Mason Wright, Michael P. Wellman y Satinder Singh. "Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis". Security and Communication Networks 2018 (13 de diciembre de 2018): 1–28. http://dx.doi.org/10.1155/2018/2864873.
Texto completoWei, Zhuangkun, Liang Wang, Schyler Chengyao Sun, Bin Li y Weisi Guo. "Graph Layer Security: Encrypting Information via Common Networked Physics". Sensors 22, n.º 10 (23 de mayo de 2022): 3951. http://dx.doi.org/10.3390/s22103951.
Texto completoPoolsappasit, N., R. Dewri y I. Ray. "Dynamic Security Risk Management Using Bayesian Attack Graphs". IEEE Transactions on Dependable and Secure Computing 9, n.º 1 (enero de 2012): 61–74. http://dx.doi.org/10.1109/tdsc.2011.34.
Texto completoCatal, Cagatay, Hakan Gunduz y Alper Ozcan. "Malware Detection Based on Graph Attention Networks for Intelligent Transportation Systems". Electronics 10, n.º 20 (18 de octubre de 2021): 2534. http://dx.doi.org/10.3390/electronics10202534.
Texto completoMajeed, Abdul, Safiullah Khan y Seong Oun Hwang. "A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks". Electronics 11, n.º 13 (21 de junio de 2022): 1931. http://dx.doi.org/10.3390/electronics11131931.
Texto completoKang, Qiyu, Kai Zhao, Yang Song, Yihang Xie, Yanan Zhao, Sijie Wang, Rui She y Wee Peng Tay. "Coupling Graph Neural Networks with Fractional Order Continuous Dynamics: A Robustness Study". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 12 (24 de marzo de 2024): 13049–58. http://dx.doi.org/10.1609/aaai.v38i12.29203.
Texto completoDharmalingam, Jeya Mala y M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks". International Journal of Intelligent Information Technologies 14, n.º 3 (julio de 2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.
Texto completoLi, Yicai y Lin Shi. "Building Security Mechanisms for Cross-Border Business Customer Data Analysis Based on Smart Computing". Mathematical Problems in Engineering 2022 (22 de marzo de 2022): 1–10. http://dx.doi.org/10.1155/2022/9017267.
Texto completo