Artículos de revistas sobre el tema "Security attacks detection"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Security attacks detection".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Jimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, n.º 1 (12 de abril de 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.
Texto completoJimmy, Fnu. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, n.º 1 (12 de abril de 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.
Texto completoKumavat, Kavita S. y Joanne Gomes. "Common Mechanism for Detecting Multiple DDoS Attacks". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 4 (4 de mayo de 2023): 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Texto completoKareem, Mohammed Ibrahim, Mohammad Jawad Kadhim Abood y Karrar Ibrahim. "Machine learning-based PortScan attacks detection using OneR classifier". Bulletin of Electrical Engineering and Informatics 12, n.º 6 (1 de diciembre de 2023): 3690–96. http://dx.doi.org/10.11591/eei.v12i6.4142.
Texto completoDu, Dajun, Rui Chen, Xue Li, Lei Wu, Peng Zhou y Minrui Fei. "Malicious data deception attacks against power systems: A new case and its detection method". Transactions of the Institute of Measurement and Control 41, n.º 6 (8 de enero de 2018): 1590–99. http://dx.doi.org/10.1177/0142331217740622.
Texto completoKumar, Sunil y Maninder Singh. "Detection and Isolation of Zombie Attack under Cloud Environment". Oriental journal of computer science and technology 10, n.º 2 (12 de abril de 2017): 338–44. http://dx.doi.org/10.13005/ojcst/10.02.12.
Texto completoFarane Shradha, Gotane Rutuja, Chandanshive Sakshi, Agrawal Khushi y Khandekar Srushti. "Detection of cyber-attacks and network attacks using Machine Learning". World Journal of Advanced Engineering Technology and Sciences 12, n.º 1 (30 de mayo de 2024): 128–32. http://dx.doi.org/10.30574/wjaets.2024.12.1.0184.
Texto completoAslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz y Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions". Electronics 12, n.º 6 (11 de marzo de 2023): 1333. http://dx.doi.org/10.3390/electronics12061333.
Texto completoAlamsyah, Hendri, Riska y Abdussalam Al Akbar. "Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System". JOINTECS (Journal of Information Technology and Computer Science) 5, n.º 1 (25 de enero de 2020): 17. http://dx.doi.org/10.31328/jointecs.v5i1.1240.
Texto completoSalih, Azar Abid y Maiwan Bahjat Abdulrazzaq. "Cyber security: performance analysis and challenges for cyber attacks detection". Indonesian Journal of Electrical Engineering and Computer Science 31, n.º 3 (1 de septiembre de 2023): 1763. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1763-1775.
Texto completoNeelaveni, Dr R., Abhinav . y Sahas . "Analysis of Efficient Intrusion Detection System using Ensemble Learning". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de mayo de 2023): 1521–30. http://dx.doi.org/10.22214/ijraset.2023.51858.
Texto completoSheikh, Zakir Ahmad, Yashwant Singh, Pradeep Kumar Singh y Paulo J. Sequeira Gonçalves. "Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS)". Sensors 23, n.º 12 (9 de junio de 2023): 5459. http://dx.doi.org/10.3390/s23125459.
Texto completoSoe, Yan Naung, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto y Kouichi Sakurai. "Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture". Sensors 20, n.º 16 (5 de agosto de 2020): 4372. http://dx.doi.org/10.3390/s20164372.
Texto completoQiu, Ling y Cai Ming Liu. "An Intelligent Detection Method for Network Security". Applied Mechanics and Materials 530-531 (febrero de 2014): 646–49. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.646.
Texto completoRohit Khedkar et al. "Detection of Cyber Attacks and Network Attacks Using Machine Learning Algorithms". Proceeding International Conference on Science and Engineering 11, n.º 1 (18 de febrero de 2023): 241–52. http://dx.doi.org/10.52783/cienceng.v11i1.120.
Texto completoGavrić, Nikola y Živko Bojović. "Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat". Sensors 22, n.º 20 (14 de octubre de 2022): 7791. http://dx.doi.org/10.3390/s22207791.
Texto completoCho, Youngho. "Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms". Electronics 8, n.º 11 (13 de noviembre de 2019): 1338. http://dx.doi.org/10.3390/electronics8111338.
Texto completoPanduardi, Farizqi, Herman Yuliandoko y Agus Priyo Utomo. "Network Security Using Honeypot and Attack Detection with Android Application". Indonesian Journal of Engineering Research 2, n.º 2 (27 de noviembre de 2021): 53–60. http://dx.doi.org/10.11594/10.11594/ijer.02.02.04.
Texto completoSachdev, Rithik, Shreya Mishra y Shekhar Sharma. "Comparison of Supervised Learning Algorithms for DDOS Attack Detection". International Journal for Research in Applied Science and Engineering Technology 10, n.º 8 (31 de agosto de 2022): 1766–72. http://dx.doi.org/10.22214/ijraset.2022.46506.
Texto completoVinod Kumar, Boddupally, K. Pranaya Vardhan, Kurceti Subba Rao y Thipparthy Navya Sree. "IDENTIFICATION OF UNSATURATED ATTACKS IN VIRTUALIZED INFRASTRUCTURES WITH BIG DATA ANALYTICS IN CLOUD COMPUTING". Journal of Nonlinear Analysis and Optimization 14, n.º 02 (2023): 286–92. http://dx.doi.org/10.36893/jnao.2023.v14i2.286-292.
Texto completoGhugar, Umashankar, Jayaram Pradhan, Sourav Kumar Bhoi y Rashmi Ranjan Sahoo. "LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System". Journal of Computer Networks and Communications 2019 (6 de enero de 2019): 1–13. http://dx.doi.org/10.1155/2019/2054298.
Texto completoPatil, Shruti, Vijayakumar Varadarajan, Devika Walimbe, Siddharth Gulechha, Sushant Shenoy, Aditya Raina y Ketan Kotecha. "Improving the Robustness of AI-Based Malware Detection Using Adversarial Machine Learning". Algorithms 14, n.º 10 (15 de octubre de 2021): 297. http://dx.doi.org/10.3390/a14100297.
Texto completoGupta, Punit y Pallavi Kaliyar. "History Aware Anomaly Based IDS for Cloud IaaS". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, n.º 6 (30 de agosto de 2013): 1779–84. http://dx.doi.org/10.24297/ijct.v10i6.3205.
Texto completoRajan, Del. "Entropic DDoS Detection for Quantum Networks". Quantum Reports 4, n.º 4 (13 de diciembre de 2022): 604–15. http://dx.doi.org/10.3390/quantum4040044.
Texto completoAl-Zewairi, Malek, Sufyan Almajali y Moussa Ayyash. "Unknown Security Attack Detection Using Shallow and Deep ANN Classifiers". Electronics 9, n.º 12 (26 de noviembre de 2020): 2006. http://dx.doi.org/10.3390/electronics9122006.
Texto completoFang, Xing, Wenhui Zhang, Jiming Lin y Yuming Liu. "Research on SDN Fingerprint Attack Defense Mechanism Based on Dynamic Disturbance and Information Entropy Detection". Security and Communication Networks 2022 (13 de agosto de 2022): 1–14. http://dx.doi.org/10.1155/2022/1957497.
Texto completoSilva, Rui Filipe, Raul Barbosa y Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks". International Journal of Information Security and Privacy 14, n.º 2 (abril de 2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.
Texto completoMuhammad, Hafsat, Olumide B. Longe, Abimbola Baale, y U.-O. Ekpo Antai. "Towards the Development of a Machine Learning Enhanceed Framework for Honeypot and CAPTCHA Intrusion Detection Systems". Advances in Multidisciplinary and scientific Research Journal Publication 34 (30 de diciembre de 2022): 43–50. http://dx.doi.org/10.22624/aims/accrabespoke2022/v34p4.
Texto completoO, Belej, Spas N, Artyshchuk I y Fedastsou M. "Construction of a multi-agent attack detection system based on artificial intelligence models". Artificial Intelligence 26, jai2021.26(1) (30 de junio de 2021): 22–30. http://dx.doi.org/10.15407/jai2021.01.022.
Texto completoHairab, Belal Ibrahim, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut y Marianne A. Azer. "Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques". Electronics 12, n.º 3 (23 de enero de 2023): 573. http://dx.doi.org/10.3390/electronics12030573.
Texto completoHaseeb-ur-rehman, Rana M. Abdul, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, Khairul Akram Zainol Ariffin, Abdallah Namoun, Ali Tufail y Ki-Hyung Kim. "High-Speed Network DDoS Attack Detection: A Survey". Sensors 23, n.º 15 (1 de agosto de 2023): 6850. http://dx.doi.org/10.3390/s23156850.
Texto completoTolіupa, Serhii, Oleksandr Pliushch y Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES". Cybersecurity: Education, Science, Technique 2, n.º 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.
Texto completoBdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam y Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review". International Journal of Electrical and Computer Engineering (IJECE) 11, n.º 6 (1 de diciembre de 2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.
Texto completoAbuabid, Ali y Abdulrahman Aldeij. "Cyber Security Incident Response". Journal of Information Security and Cybercrimes Research 7, n.º 1 (2 de junio de 2024): 29–50. http://dx.doi.org/10.26735/pnob5534.
Texto completoLin, Hsiao-Chung, Ping Wang y Wen-Hui Lin. "Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks". Computers 8, n.º 4 (4 de diciembre de 2019): 88. http://dx.doi.org/10.3390/computers8040088.
Texto completoGara, Fatma, Leila Ben Saad y Rahma Ben Ayed. "An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility". International Journal on Semantic Web and Information Systems 13, n.º 3 (julio de 2017): 22–47. http://dx.doi.org/10.4018/ijswis.2017070102.
Texto completoYan, Guanghua, Qiang Li, Dong Guo y Bing Li. "AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats". Sensors 19, n.º 14 (19 de julio de 2019): 3180. http://dx.doi.org/10.3390/s19143180.
Texto completoXuan, Cho Do, Duc Duong y Hoang Xuan Dau. "A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic". Journal of Intelligent & Fuzzy Systems 40, n.º 6 (21 de junio de 2021): 11311–29. http://dx.doi.org/10.3233/jifs-202465.
Texto completoAlashhab, Abdussalam Ahmed, Mohd Soperi Mohd Zahid, Mohamed A. Azim, Muhammad Yunis Daha, Babangida Isyaku y Shimhaz Ali. "A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks". Symmetry 14, n.º 8 (29 de julio de 2022): 1563. http://dx.doi.org/10.3390/sym14081563.
Texto completoShang, Fute, Buhong Wang, Fuhu Yan y Tengyao Li. "Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems". Security and Communication Networks 2019 (3 de marzo de 2019): 1–11. http://dx.doi.org/10.1155/2019/8936784.
Texto completoVermani, Kunal, Amandeep Noliya, Sunil Kumar y Kamlesh Dutta. "Ensemble Learning Based Malicious Node Detection in SDN-Based VANETs". Journal of Information Systems Engineering and Business Intelligence 9, n.º 2 (1 de noviembre de 2023): 136–46. http://dx.doi.org/10.20473/jisebi.9.2.136-146.
Texto completoLiu, Likun, Hongli Zhang, Xiangzhan Yu, Yi Xin, Muhammad Shafiq y Mengmeng Ge. "An Efficient Security System for Mobile Data Monitoring". Wireless Communications and Mobile Computing 2018 (11 de junio de 2018): 1–10. http://dx.doi.org/10.1155/2018/9809345.
Texto completoDesai, Vinod y Dinesha Hagare Annappaiah. "Reputation-based Security model for detecting biased attacks in BigData". Indonesian Journal of Electrical Engineering and Computer Science 29, n.º 3 (1 de marzo de 2023): 1567. http://dx.doi.org/10.11591/ijeecs.v29.i3.pp1567-1576.
Texto completoALAzzawi, Abdulbasit. "SQL Injection Detection Using RNN Deep Learning Model". Journal of Applied Engineering and Technological Science (JAETS) 5, n.º 1 (10 de diciembre de 2023): 531–41. http://dx.doi.org/10.37385/jaets.v5i1.2864.
Texto completoDasari, Kishore Babu y Nagaraju Devarakonda. "Detection of Different DDoS Attacks Using Machine Learning Classification Algorithms". Ingénierie des systèmes d information 26, n.º 5 (31 de octubre de 2021): 461–68. http://dx.doi.org/10.18280/isi.260505.
Texto completoAl-Rajeh, Noura S. y Amal A. Al-Shargabi. "Dual Spectral Attention Model for Iris Presentation Attack Detection". International Journal of Interactive Mobile Technologies (iJIM) 18, n.º 10 (22 de mayo de 2024): 71–89. http://dx.doi.org/10.3991/ijim.v18i10.46981.
Texto completoXia, Kui Liang. "Modeling and Simulation of Low Rate of Denial of Service Attacks". Applied Mechanics and Materials 484-485 (enero de 2014): 1063–66. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.1063.
Texto completoSkaruz, Jarosław. "Database security: combining neural networks and classification approach". Studia Informatica, n.º 23 (22 de diciembre de 2020): 95–115. http://dx.doi.org/10.34739/si.2019.23.06.
Texto completoKhan, Zulfiqar Ali y Akbar Siami Namin. "A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology". Electronics 11, n.º 23 (24 de noviembre de 2022): 3892. http://dx.doi.org/10.3390/electronics11233892.
Texto completoBarabanov, Alexander, Denis Dergunov, Denis Makrushin y Aleksey Teplov. "AUTOMATIC DETECTION OF ACCESS CONTROL VULNERABILITIES VIA API SPECIFICATION PROCESSING". Voprosy kiberbezopasnosti, n.º 1(47) (2022): 49–65. http://dx.doi.org/10.21681/2311-3456-2022-1-49-65.
Texto completo