Artículos de revistas sobre el tema "Dynamic attack graph"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Dynamic attack graph".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi, and A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing." E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Texto completoPal, Arunangshu, and Prasenjit Choudhury. "Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph." Mapana - Journal of Sciences 11, no. 4 (2012): 65–76. http://dx.doi.org/10.12723/mjs.23.5.
Texto completoSæther, Sigve Hortemo, Jan Arne Telle, and Martin Vatshelle. "Solving #SAT and MAXSAT by Dynamic Programming." Journal of Artificial Intelligence Research 54 (September 9, 2015): 59–82. http://dx.doi.org/10.1613/jair.4831.
Texto completoRajeshwari, T., and C. Thangamani. "Attack Impact Discovery and Recovery with Dynamic Bayesian Networks." Asian Journal of Computer Science and Technology 8, S1 (2019): 74–79. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1953.
Texto completoHu, Chenao, and Xuefeng Yan. "Dynamic Trilateral Game Model for Attack Graph Security Game." IOP Conference Series: Materials Science and Engineering 790 (April 7, 2020): 012112. http://dx.doi.org/10.1088/1757-899x/790/1/012112.
Texto completoLv, Huiying, Yuan Zhang, and Jie Wang. "Network Threat Identification and Analysis Based on a State Transition Graph." Cybernetics and Information Technologies 13, Special-Issue (2013): 51–61. http://dx.doi.org/10.2478/cait-2013-0037.
Texto completoGao, Xiang, Xue Qin Xu, and Min Wang. "Evaluating Network Security Based on Attack Graph." Advanced Materials Research 756-759 (September 2013): 2374–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2374.
Texto completoLee, Dongjin, Juho Lee, and Kijung Shin. "Spear and Shield: Adversarial Attacks and Defense Methods for Model-Based Link Prediction on Continuous-Time Dynamic Graphs." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 12 (2024): 13374–82. http://dx.doi.org/10.1609/aaai.v38i12.29239.
Texto completoBoudermine, Antoine, Rida Khatoun, and Jean-Henri Choyer. "Dynamic logic-based attack graph for risk assessment in complex computer systems." Computer Networks 228 (June 2023): 109730. http://dx.doi.org/10.1016/j.comnet.2023.109730.
Texto completoGuo, Mingyu, Max Ward, Aneta Neumann, Frank Neumann, and Hung Nguyen. "Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 5 (2023): 5649–56. http://dx.doi.org/10.1609/aaai.v37i5.25701.
Texto completoKavallieratos, Georgios, Nabin Chowdhury, Sokratis Katsikas, Vasileios Gkioulos, and Stephen Wolthusen. "Threat Analysis for Smart Homes." Future Internet 11, no. 10 (2019): 207. http://dx.doi.org/10.3390/fi11100207.
Texto completoBopche, Ghanshyam S., and Babu M. Mehtre. "Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks." Computers & Security 64 (January 2017): 16–43. http://dx.doi.org/10.1016/j.cose.2016.09.010.
Texto completoAlwasel, Bader, Abdulaziz Aldribi, Mohammed Alreshoodi, Ibrahim S. Alsukayti, and Mohammed Alsuhaibani. "Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection." Applied Sciences 13, no. 13 (2023): 7774. http://dx.doi.org/10.3390/app13137774.
Texto completoWan, Shanshan, and Ying Liu. "A security detection approach based on autonomy-oriented user sensor in social recommendation network." International Journal of Distributed Sensor Networks 18, no. 3 (2022): 155013292210824. http://dx.doi.org/10.1177/15501329221082415.
Texto completoShahpasand, Maryam, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani, and Hoda Ghavamipoor. "A comprehensive security control selection model for inter-dependent organizational assets structure." Information & Computer Security 23, no. 2 (2015): 218–42. http://dx.doi.org/10.1108/ics-12-2013-0090.
Texto completoSen, Saurabh Kumar, and Anuradha Deolase. "Analyse Cyberattack at Organizations using Logistic Regression Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 518–25. http://dx.doi.org/10.22214/ijraset.2022.40663.
Texto completoKholidy, Hisham A. "Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method." Sensors 22, no. 1 (2021): 9. http://dx.doi.org/10.3390/s22010009.
Texto completoKim, Jiyeon, and Hyong S. Kim. "Intrusion Detection Based on Spatiotemporal Characterization of Cyberattacks." Electronics 9, no. 3 (2020): 460. http://dx.doi.org/10.3390/electronics9030460.
Texto completoGao, Yazhuo, Guomin Zhang, and Changyou Xing. "A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction." Security and Communication Networks 2021 (October 21, 2021): 1–15. http://dx.doi.org/10.1155/2021/6378218.
Texto completoHu, Hao, Hongqi Zhang, Yuling Liu, and Yongwei Wang. "Quantitative Method for Network Security Situation Based on Attack Prediction." Security and Communication Networks 2017 (2017): 1–19. http://dx.doi.org/10.1155/2017/3407642.
Texto completoQiang, Weizhong, Shizhen Wang, Hai Jin, and Jiangying Zhong. "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS." Security and Communication Networks 2018 (October 17, 2018): 1–11. http://dx.doi.org/10.1155/2018/3130652.
Texto completoQin, Zhi-Quan, Hong-Zuo Xu, Xing-Kong Ma, and Yong-Jun Wang. "Interaction Context-Aware Network Behavior Anomaly Detection for Discovering Unknown Attacks." Security and Communication Networks 2022 (April 11, 2022): 1–24. http://dx.doi.org/10.1155/2022/3595304.
Texto completoTurnip, Togu Novriansyah, William Suarez Lumbantobing, David Christian Sitorus, and Friska Laurenzia Sianturi. "Software Watermarking Dinamis dengan Algoritme Collberg-Thomborson Dan Parent Pointer Graf pada Aplikasi Android." Jurnal Teknologi Informasi dan Ilmu Komputer 8, no. 4 (2021): 831. http://dx.doi.org/10.25126/jtiik.2021844500.
Texto completoWang, Chundong, Zheli Liu, and Tong Zhao. "An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm." International Journal of Information and Computer Security 12, no. 4 (2020): 397. http://dx.doi.org/10.1504/ijics.2020.10028756.
Texto completoWang, Chundong, Tong Zhao, and Zheli Liu. "An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm." International Journal of Information and Computer Security 12, no. 4 (2020): 397. http://dx.doi.org/10.1504/ijics.2020.107448.
Texto completoSong, Xuyan, Chen Chen, Baojiang Cui, and Junsong Fu. "Malicious JavaScript Detection Based on Bidirectional LSTM Model." Applied Sciences 10, no. 10 (2020): 3440. http://dx.doi.org/10.3390/app10103440.
Texto completoHeigl, Michael, Enrico Weigelt, Andreas Urmann, Dalibor Fiala, and Martin Schramm. "Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data." Electronics 10, no. 17 (2021): 2160. http://dx.doi.org/10.3390/electronics10172160.
Texto completoCraandijk, Dennis, and Floris Bex. "Enforcement Heuristics for Argumentation with Deep Reinforcement Learning." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 5 (2022): 5573–81. http://dx.doi.org/10.1609/aaai.v36i5.20497.
Texto completoXu, Hanyi, Guozhen Cheng, Xiaohan Yang, Wenyan Liu, Dacheng Zhou, and Wei Guo. "Multi-Dimensional Moving Target Defense Method Based on Adaptive Simulated Annealing Genetic Algorithm." Electronics 13, no. 3 (2024): 487. http://dx.doi.org/10.3390/electronics13030487.
Texto completoАверьянов, В. С., and И. Н. Карцан. "ASSESSMENT OF THE SECURITY OF CYBER-PHYSICAL SYSTEMS BASED ON A GENERAL GRAPH." Южно-Сибирский научный вестник, no. 1(41) (February 28, 2022): 30–35. http://dx.doi.org/10.25699/sssb.2022.41.1.013.
Texto completoUstun, Taha Selim, and Saqib Ayyubi. "Automated Network Topology Extraction Based on Graph Theory for Distributed Microgrid Protection in Dynamic Power Systems." Electronics 8, no. 6 (2019): 655. http://dx.doi.org/10.3390/electronics8060655.
Texto completoZhang, Quan, Chijin Zhou, Yiwen Xu, et al. "Building Dynamic System Call Sandbox with Partial Order Analysis." Proceedings of the ACM on Programming Languages 7, OOPSLA2 (2023): 1253–80. http://dx.doi.org/10.1145/3622842.
Texto completoInibhunu, Catherine, and Scott Langevin. "Adaptive Visualization of Complex Networks with FocalPoint." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (2016): 233–37. http://dx.doi.org/10.1177/1541931213601052.
Texto completoCheng, Xiao Han, Shan Ming Luo, Xue Feng Chang, and Dan Xie. "Numerical Analysis of an External Flow-Field around a Formula SAE Car Body Based on FLUENT." Advanced Materials Research 1039 (October 2014): 17–24. http://dx.doi.org/10.4028/www.scientific.net/amr.1039.17.
Texto completoMannarini, Gianandrea, Mario Leonardo Salinas, Lorenzo Carelli, Nicola Petacco, and Josip Orović. "VISIR-2: ship weather routing in Python." Geoscientific Model Development 17, no. 10 (2024): 4355–82. http://dx.doi.org/10.5194/gmd-17-4355-2024.
Texto completoJayanthi Rao, Et al. "Intelligent Traffic Monitoring System Using Vehicular Ad Hoc Network." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 629–35. http://dx.doi.org/10.17762/ijritcc.v11i10.8557.
Texto completoZhuang, Jun, and Mohammad Al Hasan. "Defending Graph Convolutional Networks against Dynamic Graph Perturbations via Bayesian Self-Supervision." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 4 (2022): 4405–13. http://dx.doi.org/10.1609/aaai.v36i4.20362.
Texto completoOnyshchenko, Svitlana, Alina Yanko, Alina Hlushko, and Polina Sabelnikova. "Assessment of information protection level against unauthorized access." ScienceRise, no. 2 (April 30, 2023): 36–44. http://dx.doi.org/10.21303/2313-8416.2023.003211.
Texto completoManoharan, J. Samuel. "Design of an Intelligent Approach on Capsule Networks to Detect Forged Images." September 2021 3, no. 3 (2021): 205–21. http://dx.doi.org/10.36548/jtcsst.2021.3.004.
Texto completoFang, Zhu, and Zhengquan Xu. "Dynamic Random Graph Protection Scheme Based on Chaos and Cryptographic Random Mapping." Information 13, no. 11 (2022): 537. http://dx.doi.org/10.3390/info13110537.
Texto completoZhang, Shuqin, Shijie Wang, Guangyao Bai, et al. "Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution." Wireless Communications and Mobile Computing 2022 (June 16, 2022): 1–16. http://dx.doi.org/10.1155/2022/2323228.
Texto completoKalinin, Maxim, Evgenii Zavadskii, and Alexey Busygin. "A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure." Sensors 23, no. 21 (2023): 8724. http://dx.doi.org/10.3390/s23218724.
Texto completoNguyen, Thanh H., Mason Wright, Michael P. Wellman, and Satinder Singh. "Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis." Security and Communication Networks 2018 (December 13, 2018): 1–28. http://dx.doi.org/10.1155/2018/2864873.
Texto completoWei, Zhuangkun, Liang Wang, Schyler Chengyao Sun, Bin Li, and Weisi Guo. "Graph Layer Security: Encrypting Information via Common Networked Physics." Sensors 22, no. 10 (2022): 3951. http://dx.doi.org/10.3390/s22103951.
Texto completoPoolsappasit, N., R. Dewri, and I. Ray. "Dynamic Security Risk Management Using Bayesian Attack Graphs." IEEE Transactions on Dependable and Secure Computing 9, no. 1 (2012): 61–74. http://dx.doi.org/10.1109/tdsc.2011.34.
Texto completoCatal, Cagatay, Hakan Gunduz, and Alper Ozcan. "Malware Detection Based on Graph Attention Networks for Intelligent Transportation Systems." Electronics 10, no. 20 (2021): 2534. http://dx.doi.org/10.3390/electronics10202534.
Texto completoMajeed, Abdul, Safiullah Khan, and Seong Oun Hwang. "A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks." Electronics 11, no. 13 (2022): 1931. http://dx.doi.org/10.3390/electronics11131931.
Texto completoKang, Qiyu, Kai Zhao, Yang Song, et al. "Coupling Graph Neural Networks with Fractional Order Continuous Dynamics: A Robustness Study." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 12 (2024): 13049–58. http://dx.doi.org/10.1609/aaai.v38i12.29203.
Texto completoDharmalingam, Jeya Mala, and M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks." International Journal of Intelligent Information Technologies 14, no. 3 (2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.
Texto completoLi, Yicai, and Lin Shi. "Building Security Mechanisms for Cross-Border Business Customer Data Analysis Based on Smart Computing." Mathematical Problems in Engineering 2022 (March 22, 2022): 1–10. http://dx.doi.org/10.1155/2022/9017267.
Texto completo