Littérature scientifique sur le sujet « Trust attacks Prevention »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Trust attacks Prevention ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Trust attacks Prevention"
Karabacak, Bilge, et Todd Whittaker. « Zero Trust and Advanced Persistent Threats : Who Will Win the War ? » International Conference on Cyber Warfare and Security 17, no 1 (2 mars 2022) : 92–101. http://dx.doi.org/10.34190/iccws.17.1.10.
Texte intégralLi, Lixiang, Jürgen Kurths, Yixian Yang et Guole Liu. « Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks ». Mathematical Problems in Engineering 2014 (2014) : 1–11. http://dx.doi.org/10.1155/2014/189213.
Texte intégralKhan, Muhammad Ali, Rao Naveed Bin Rais, Osman Khalid et Sanan Ahmad. « Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks ». Sensors 24, no 6 (9 mars 2024) : 1775. http://dx.doi.org/10.3390/s24061775.
Texte intégralS, Ananthakumaran. « Prevention of Routing Attacks using Trust-Based Multipath Protocol ». International Journal of Advanced Trends in Computer Science and Engineering 9, no 3 (25 juin 2020) : 4022–29. http://dx.doi.org/10.30534/ijatcse/2020/227932020.
Texte intégralAtiq, Eman, Maheen Mujeeb et Mujeeb Ur Rehman. « An Epidemiological study of Acid Burn Incidents in Pakistan : Causes, Consequences and Prevention Strategies ». British journal of Psychology Research 11, no 2 (15 février 2023) : 51–58. http://dx.doi.org/10.37745/bjpr.2013/vol11n25158.
Texte intégralBoakye-Boateng, Kwasi, Ali A. Ghorbani et Arash Habibi Lashkari. « A Trust-Influenced Smart Grid : A Survey and a Proposal ». Journal of Sensor and Actuator Networks 11, no 3 (11 juillet 2022) : 34. http://dx.doi.org/10.3390/jsan11030034.
Texte intégralSalahdine, Fatima, et Naima Kaabouch. « Social Engineering Attacks : A Survey ». Future Internet 11, no 4 (2 avril 2019) : 89. http://dx.doi.org/10.3390/fi11040089.
Texte intégralSubathra, P., S. Sivagurunathan et N. Ramaraj. « Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks ». International Journal of Business Data Communications and Networking 6, no 1 (janvier 2010) : 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.
Texte intégralMoinescu, Radu. « Study of social engineering attacks in Romania 2019 ». Scientific Bulletin of Naval Academy XXIII, no 1 (15 juillet 2020) : 263–70. http://dx.doi.org/10.21279/1454-864x-20-i1-037.
Texte intégralQuader, Faisal, et Vandana P. Janeja. « Insights into Organizational Security Readiness : Lessons Learned from Cyber-Attack Case Studies ». Journal of Cybersecurity and Privacy 1, no 4 (11 novembre 2021) : 638–59. http://dx.doi.org/10.3390/jcp1040032.
Texte intégralThèses sur le sujet "Trust attacks Prevention"
Masmoudi, Mariam. « Prévention des attaques de confiance en temps réel dans l'IoT social ». Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.
Texte intégralThe social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
Alruwaili, Fahad F. « Information security, privacy, and compliance models for cloud computing services ». Thesis, 2016. http://hdl.handle.net/1828/7119.
Texte intégralGraduate
0984
0790
fahd333@gmail.com
Livres sur le sujet "Trust attacks Prevention"
Office, General Accounting. Financial management : Recommendations on Indian trust fund Strategic Plan proposals : report to the Secretary of the Interior. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) : The Office, 1997.
Trouver le texte intégralUnited States. Congress. Senate. Committee on Indian Affairs., dir. Financial management : Creation of Bureau of Indian Affairs' Trust Fund Special Projects Team : report to the Chairman, Committee on Indian Affairs, U.S. Senate. Washington, D.C : The Office, 1993.
Trouver le texte intégralOffice, General Accounting. Financial management : Status of the governmentwide efforts to address improper payment problems : report to the Subcommittee on Government Efficiency and Financial Management, Committee on Government Reform, House of Representatives. Washington, D.C : GAO, 2003.
Trouver le texte intégralOffice, General Accounting. Financial management : Survey of capitalization threshold and other policies for property, plant, and equipment : report to Agency officials. Washington, D.C : U.S. General Accounting Office, 2002.
Trouver le texte intégralOffice, General Accounting. Financial management : Profile of Army financial managers : report to the Assistant Secretary of the Army (Financial Management and Comptroller). Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) : The Office, 1998.
Trouver le texte intégralOffice, General Accounting. Financial management : Differences in Army and Air Force disbursing and accounting records : report to the Honorable Charles E. Grassley, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington 20013) : The Office, 2000.
Trouver le texte intégralOffice, General Accounting. Financial management : Coordinated approach needed to address the government's improper payments problems : report to the Ranking Minority Member, Committee on Governmental Affairs, U.S. Senate. Washington, D.C : United States General Accounting Office, 2002.
Trouver le texte intégralOffice, General Accounting. Financial management : Profile of Navy and Marine Corps financial managers : report to the Acting Assistant Secretary of the Navy (Financial Management and Comptroller). Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) : The Office, 1998.
Trouver le texte intégralOffice, General Accounting. Financial management : Problems in accounting for Navy transactions impair funds control and financial reporting : report to agency officials. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) : The Office, 1999.
Trouver le texte intégralOffice, General Accounting. Financial management : An overview of finance and accounting activities in DOD : report to the Chairman, Subcommittee on Defense, Committee on Appropriations, U.S. Senate. Washington, D.C : The Office, 1997.
Trouver le texte intégralChapitres de livres sur le sujet "Trust attacks Prevention"
Sardar, Mousumi, Subhashis Banerjee, Kishore Majhi et Koushik Majumder. « Trust Based Network Layer Attacks Prevention in MANET ». Dans Lecture Notes in Electrical Engineering, 193–204. New Delhi : Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1817-3_21.
Texte intégralChouhan, Piyush, et Swapnil Jain. « Prevention of DDoS Attack Through Trust Management System for VANET Environment ». Dans Second International Conference on Computer Networks and Communication Technologies, 424–35. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37051-0_49.
Texte intégralRoy, Amit Kumar, et Ajoy Kumar Khan. « Prevention Against Internal Attack via Trust-Based Detection for Wireless Mesh Networks ». Dans Lecture Notes in Electrical Engineering, 109–17. Singapore : Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5341-7_8.
Texte intégralSingla, Bhawna, A. K. Verma et L. R. Raheja. « Preventing Black Hole Attack in AODV Routing Protocol using Dynamic Trust Handshake-based Malicious Behavior Detection ». Dans Machine Learning for Computer and Cyber Security, 258–77. Boca Raton, FL : Taylor & Francis Group, [2019] | “A science publishers book.” : CRC Press, 2019. http://dx.doi.org/10.1201/9780429504044-11.
Texte intégral« Chapter 7 : Terrorism prevention through trust-building ». Dans A Mindsponge-Based Investigation into the Psycho-Religious Mechanism Behind Suicide Attacks, 70–82. Sciendo, 2021. http://dx.doi.org/10.2478/9788366675599-013.
Texte intégralShukla, Piyush Kumar, et Kirti Raj Bhatele. « Security in Ad-Hoc Networks (MANETS) ». Dans Next Generation Wireless Network Security and Privacy, 286–312. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8687-8.ch010.
Texte intégralKapoor, Janesh, et Nor Azlina Abdul Rahman. « Organizational Security Improvement in Preventing Deepfake Ransomware ». Dans Digital Innovation Adoption : Architectural Recommendations and Security Solutions, 58–78. BENTHAM SCIENCE PUBLISHERS, 2024. http://dx.doi.org/10.2174/9789815079661124010009.
Texte intégralRevathy P et Belshia Jebamalar G. « A Review Based on Secure Banking Application Against Server Attacks ». Dans Advances in Parallel Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210044.
Texte intégralGorman, Sara E., et Jack M. Gorman. « The Attack on Health and Science Institutions ». Dans Denying to the Grave, 303–32. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197547458.003.0009.
Texte intégralDe Rango, Floriano. « Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs ». Dans Networking and Telecommunications, 1488–505. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch097.
Texte intégralActes de conférences sur le sujet "Trust attacks Prevention"
Rathour, Shimmi Singh, et Nitin Manjhi. « Trust base hybrid approach for detection and prevention MANET from attacks ». Dans 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). IEEE, 2016. http://dx.doi.org/10.1109/icacdot.2016.7877737.
Texte intégralChoudhary, Sarika, et Nishtha Kesswani. « Detection and Prevention of Routing Attacks in Internet of Things ». Dans 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018. http://dx.doi.org/10.1109/trustcom/bigdatase.2018.00219.
Texte intégralVaseer, Gurveen, Garima Ghai et Dhruva Ghai. « Distributed Trust-Based Multiple Attack Prevention for Secure MANETs ». Dans 2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS). IEEE, 2018. http://dx.doi.org/10.1109/ises.2018.00032.
Texte intégralGriscioli, Federico, Maurizio Pizzonia et Marco Sacchetti. « USBCheckIn : Preventing BadUSB attacks by forcing human-device interaction ». Dans 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7907004.
Texte intégralGhosh, Shamit, et Dipanwita Roy Chowdhury. « Preventing fault attack on stream cipher using randomization ». Dans 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2015. http://dx.doi.org/10.1109/hst.2015.7140243.
Texte intégralDachowicz, Adam, Mikhail Atallah et Jitesh H. Panchal. « Extraction and Analysis of Spatial Correlation Micrograph Features for Traceability in Manufacturing ». Dans ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-98378.
Texte intégralPadmanabhan, Jayashree, K. S. Easwarakumar, Gokul B. et Harishankar S. « Trust based traffic monitoring approach for preventing denial of service attacks ». Dans the 2nd international conference. New York, New York, USA : ACM Press, 2009. http://dx.doi.org/10.1145/1626195.1626245.
Texte intégralBhawsar, Aditya, Yogadhar Pandey et Upendra Singh. « Detection and Prevention of Wormhole Attack using the Trust-based Routing System ». Dans 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2020. http://dx.doi.org/10.1109/icesc48915.2020.9156009.
Texte intégralSaxena, Mohit. « A mutual playmate attack prevention algorithm enhancing trust levels in MANET's systems ». Dans 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7155036.
Texte intégralNakano, Hironori, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida et Iwao Sasase. « Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN ». Dans 2019 25th Asia-Pacific Conference on Communications (APCC). IEEE, 2019. http://dx.doi.org/10.1109/apcc47188.2019.9026521.
Texte intégral