Articoli di riviste sul tema "Attack Path"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Attack Path".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi e A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing". E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Testo completoLi, Erxia, Chaoqun Kang, Deyu Huang, Modi Hu, Fangyuan Chang, Lianjie He e Xiaoyong Li. "Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees". Information 10, n. 8 (29 luglio 2019): 251. http://dx.doi.org/10.3390/info10080251.
Testo completoHuang, Yudi, Yilei Lin e Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance". Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, n. 3 (7 dicembre 2023): 1–30. http://dx.doi.org/10.1145/3626789.
Testo completoHuang, Yudi, Yilei Lin e Ting He. "Optimized Cross-Path Attacks via Adversarial Reconnaissance". ACM SIGMETRICS Performance Evaluation Review 52, n. 1 (11 giugno 2024): 51–52. http://dx.doi.org/10.1145/3673660.3655075.
Testo completoLi, Xinzhan, Yang Zhou, Xin Li, Lijuan Xu e Dawei Zhao. "Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm". Mathematics 10, n. 21 (24 ottobre 2022): 3938. http://dx.doi.org/10.3390/math10213938.
Testo completoLevner, Eugene, e Dmitry Tsadikovich. "Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes". Algorithms 17, n. 11 (4 novembre 2024): 504. http://dx.doi.org/10.3390/a17110504.
Testo completoBhavani, Y., V. Janaki e R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback". Oriental journal of computer science and technology 10, n. 2 (6 giugno 2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.
Testo completoGuo, Wei, Zhi Zhang, Liyuan Chang, Yue Song e Liuguo Yin. "A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid". Drones 8, n. 9 (28 agosto 2024): 437. http://dx.doi.org/10.3390/drones8090437.
Testo completoBhavani, Yerram, Vinjamuri Janaki e Rangu Sridevi. "IP Traceback using Flow Based Classification". Recent Advances in Computer Science and Communications 13, n. 3 (12 agosto 2020): 482–90. http://dx.doi.org/10.2174/2213275912666190328200635.
Testo completoAl-Araji, Zaid J., Sharifah Sakinah Syed Ahmad e Raihana Syahirah Abdullah. "Attack Prediction to Enhance Attack Path Discovery Using Improved Attack Graph". Karbala International Journal of Modern Science 8, n. 3 (2 agosto 2022): 313–29. http://dx.doi.org/10.33640/2405-609x.3235.
Testo completoHu, Jian, Zhenhong Zhang, Feilu Hang e Linjiang Xie. "Design of 0-day Vulnerability Monitoring and Defense Architecture based on Artificial Intelligence Technology". Scalable Computing: Practice and Experience 25, n. 5 (1 agosto 2024): 3491–99. http://dx.doi.org/10.12694/scpe.v25i5.3035.
Testo completoWu, Runze, Jinxin Gong, Weiyue Tong e Bing Fan. "Network Attack Path Selection and Evaluation Based on Q-Learning". Applied Sciences 11, n. 1 (30 dicembre 2020): 285. http://dx.doi.org/10.3390/app11010285.
Testo completoAbujassar, Radwan, Mohamed Sayed e Husam Yaseen. "A new algorithm to enhance security against cyber threats for internet of things application". International Journal of Electrical and Computer Engineering (IJECE) 13, n. 4 (1 agosto 2023): 4452. http://dx.doi.org/10.11591/ijece.v13i4.pp4452-4466.
Testo completoAlArnaout, Zakwan, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly e Ahmed Shdefat. "RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks". Sensors 23, n. 1 (22 dicembre 2022): 102. http://dx.doi.org/10.3390/s23010102.
Testo completoV, Suresh Kumar, Rajesh Khanna M e Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection". ECS Transactions 107, n. 1 (24 aprile 2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.
Testo completoAn, Hyok, Yoonjong Na, Heejo Lee e Adrian Perrig. "Resilience Evaluation of Multi-Path Routing against Network Attacks and Failures". Electronics 10, n. 11 (24 maggio 2021): 1240. http://dx.doi.org/10.3390/electronics10111240.
Testo completoKoo, Kijong, Daesung Moon, Jun-Ho Huh, Se-Hoon Jung e Hansung Lee. "Attack Graph Generation with Machine Learning for Network Security". Electronics 11, n. 9 (22 aprile 2022): 1332. http://dx.doi.org/10.3390/electronics11091332.
Testo completoQiu, Shenjian, Zhipeng Shao, Jian Wang, Shiyou Xu e Jiaxuan Fei. "Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge". Applied Sciences 14, n. 14 (16 luglio 2024): 6189. http://dx.doi.org/10.3390/app14146189.
Testo completoPanda, Niranjan, e Binod Kumar Pattanayak. "Defense Against Co-Operative Black-hole Attack and Gray-hole Attack in MANET". International Journal of Engineering & Technology 7, n. 3.4 (25 giugno 2018): 84. http://dx.doi.org/10.14419/ijet.v7i3.4.16752.
Testo completoHsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai e Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning". Sustainability 13, n. 22 (12 novembre 2021): 12514. http://dx.doi.org/10.3390/su132212514.
Testo completoWan, Gerry, Aaron Johnson, Ryan Wails, Sameer Wagh e Prateek Mittal. "Guard Placement Attacks on Path Selection Algorithms for Tor". Proceedings on Privacy Enhancing Technologies 2019, n. 4 (1 ottobre 2019): 272–91. http://dx.doi.org/10.2478/popets-2019-0069.
Testo completoKasturi, Santanam, Xiaolong Li, Peng Li e John Pickard. "Predicting Attack Paths from Application Security Vulnerabilities Using a Multi-Layer Perceptron". American Journal of Software Engineering and Applications 12, n. 1 (30 maggio 2024): 23–35. http://dx.doi.org/10.11648/j.ajsea.20241201.14.
Testo completoZhang, Shuqin, Peiyu Shi, Tianhui Du, Xinyu Su e Yunfei Han. "Threat Attribution and Reasoning for Industrial Control System Asset". International Journal of Ambient Computing and Intelligence 15, n. 1 (17 novembre 2023): 1–27. http://dx.doi.org/10.4018/ijaci.333853.
Testo completoHe, Jiaji, Haocheng Ma, Kaiyue Song e Yiqiang Zhao. "An Enhanced Logic Encryption Method with a Fully Correlated Key Interdependency Block". Electronics 8, n. 12 (22 novembre 2019): 1392. http://dx.doi.org/10.3390/electronics8121392.
Testo completoLiao, Yan. "Enhancing Industrial Control Network Security Through Vulnerability Detection and Attack Graph Analysis". Scalable Computing: Practice and Experience 25, n. 1 (4 gennaio 2024): 65–74. http://dx.doi.org/10.12694/scpe.v25i1.2254.
Testo completoChaves, Cesar, Siavoosh Azad, Thomas Hollstein e Johanna Sepúlveda. "DoS Attack Detection and Path Collision Localization in NoC-Based MPSoC Architectures". Journal of Low Power Electronics and Applications 9, n. 1 (5 febbraio 2019): 7. http://dx.doi.org/10.3390/jlpea9010007.
Testo completoYi, Junkai, e Xiaoyan Liu. "Deep Reinforcement Learning for Intelligent Penetration Testing Path Design". Applied Sciences 13, n. 16 (21 agosto 2023): 9467. http://dx.doi.org/10.3390/app13169467.
Testo completoShen, Limin, Hui Li, Hongyi Wang e Yihuan Wang. "Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications". Mobile Information Systems 2020 (5 giugno 2020): 1–16. http://dx.doi.org/10.1155/2020/3407437.
Testo completoZhang, Xiaojian, Qi Wang, Xiangqun Wang e Run Zhang. "Attack path analysis of power monitoring system based on attack graph". IOP Conference Series: Earth and Environmental Science 645 (26 gennaio 2021): 012064. http://dx.doi.org/10.1088/1755-1315/645/1/012064.
Testo completoKhlobystova, A. O., M. V. Abramov, A. L. Tulupyev e A. A. Zolotin. "Search for the shortest trajectory of a social engeneering attack between a pair of users in a graph with transition probabilities". Information and Control Systems, n. 6 (18 dicembre 2018): 74–81. http://dx.doi.org/10.31799/1684-8853-2018-6-74-81.
Testo completoZhang, Yan, Yong Wang, Yihua Hu, Zhi Lin, Yadi Zhai, Lei Wang, Qingsong Zhao, Kang Wen e Linshuang Kang. "Security Performance Analysis of LEO Satellite Constellation Networks under DDoS Attack". Sensors 22, n. 19 (26 settembre 2022): 7286. http://dx.doi.org/10.3390/s22197286.
Testo completoLi, Yanna. "The Cyber Attack in the Use of Force". Lecture Notes in Education Psychology and Public Media 69, n. 1 (15 novembre 2024): 122–30. http://dx.doi.org/10.54254/2753-7048/69/20240165.
Testo completoYang, Jinwei, e Yu Yang. "Optimal Security Protection Selection Strategy Based on Markov Model Attack Graph". Journal of Physics: Conference Series 2132, n. 1 (1 dicembre 2021): 012020. http://dx.doi.org/10.1088/1742-6596/2132/1/012020.
Testo completoBraimah, Joseph Odunayo, Tendai Makoni e Fabio Mathias Correa. "Predicting the Path of Insurgency: Data-Driven Strategies to Counter Boko Haram in Nigeria". F1000Research 13 (2 settembre 2024): 989. http://dx.doi.org/10.12688/f1000research.153978.1.
Testo completoLi, Xiaohong, Ran Liu, Zhiyong Feng e Ke He. "Threat modeling-oriented attack path evaluating algorithm". Transactions of Tianjin University 15, n. 3 (giugno 2009): 162–67. http://dx.doi.org/10.1007/s12209-009-0029-y.
Testo completoChandran, Rahul, e Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics". International Journal of Digital Crime and Forensics 6, n. 1 (gennaio 2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.
Testo completoChen, Yun, Kun Lv e Changzhen Hu. "A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments". Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/2058429.
Testo completoAl-janabi, Rana Jumaa Surayh. "Messenger Attack(Problems and Solutions)". Journal of Kufa for Mathematics and Computer 1, n. 2 (30 ottobre 2010): 12–22. http://dx.doi.org/10.31642/jokmc/2018/010202.
Testo completoYang, Rong, Fang Ming Huang e Hua Jun Gong. "Best Attack Position Model for BVR Multi-Target Air Combat". Advanced Materials Research 1016 (agosto 2014): 511–15. http://dx.doi.org/10.4028/www.scientific.net/amr.1016.511.
Testo completoVitali, Maycon. "Web Cache Deception Attack". H2HC Magazine, n. 16 (22 ottobre 2022): 34–40. http://dx.doi.org/10.47986/16/2.
Testo completoHarmeet Singh, Er, e Dr Vijay Dhir. "A Novel Hybrid and Secure Clustering Black hole Attacks Mitigation Technique in Wireless LAN". International Journal of Engineering & Technology 7, n. 4.7 (27 settembre 2018): 389. http://dx.doi.org/10.14419/ijet.v7i4.7.23035.
Testo completoElavarasan, R., K. Chitra e Amsalu Gosu Adigo. "Enhanced Lion Optimization with Efficient Path Routing Equalization Technique against DoS Attack in Wireless Sensor Network". Wireless Communications and Mobile Computing 2022 (14 giugno 2022): 1–9. http://dx.doi.org/10.1155/2022/3321870.
Testo completoGuo, Mingyu, Jialiang Li, Aneta Neumann, Frank Neumann e Hung Nguyen. "Practical Fixed-Parameter Algorithms for Defending Active Directory Style Attack Graphs". Proceedings of the AAAI Conference on Artificial Intelligence 36, n. 9 (28 giugno 2022): 9360–67. http://dx.doi.org/10.1609/aaai.v36i9.21167.
Testo completoLin, Hsiao-Chung, Ping Wang, Wen-Hui Lin e Yu-Hsiang Huang. "A Multiple-Swarm Particle Swarm Optimisation Scheme for Tracing Packets Back to the Attack Sources of Botnet". Applied Sciences 11, n. 3 (26 gennaio 2021): 1139. http://dx.doi.org/10.3390/app11031139.
Testo completoUmaparvathi, M., e Dharmishtan K. Varughese. "Secure Video Transmission Against Black Hole Attack in MANETs". International Journal of Business Data Communications and Networking 7, n. 4 (ottobre 2011): 1–17. http://dx.doi.org/10.4018/jbdcn.2011100101.
Testo completoSingh, Rupinder, Jatinder Singh e Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks". Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.
Testo completoSrinivas, T. Aditya Sai, e S. S. Manivannan. "Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing". Journal of Ambient Intelligence and Smart Environments 13, n. 2 (26 marzo 2021): 133–56. http://dx.doi.org/10.3233/ais-210591.
Testo completoFortilla, Zeny Arsya, e Muhammad Syauqi Jazuli. "Developing a 3D Virus Attack Simulation in Unity: A Case Study for Healthcare Education". Gameology and Multimedia Expert 1, n. 2 (1 aprile 2024): 33. http://dx.doi.org/10.29103/game.v1i2.15885.
Testo completoZhang, Bing, Hui Li, Shuai Zhang, Jing Sun, Ning Wei, Wenhong Xu e Huan Wang. "Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN". Future Internet 16, n. 4 (22 aprile 2024): 143. http://dx.doi.org/10.3390/fi16040143.
Testo completoTan, Sery Vuth, Minh Yuk Choi e Kee Cheon Kim. "The New Mechanism to Detect and Prevent BlackHole Attacks on AODV-Based MANET". Advanced Materials Research 684 (aprile 2013): 547–50. http://dx.doi.org/10.4028/www.scientific.net/amr.684.547.
Testo completo