Articoli di riviste sul tema "Dynamic attack graph"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Dynamic attack graph".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Jaiganesh, M., G. ShivajiRao, P. Dhivya, M. Udhayamoorthi e A. Vincent Antony Kumar. "Intrusion Optimal Path Attack detection using ACO for Cloud Computing". E3S Web of Conferences 472 (2024): 02009. http://dx.doi.org/10.1051/e3sconf/202447202009.
Pal, Arunangshu, e Prasenjit Choudhury. "Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph". Mapana - Journal of Sciences 11, n. 4 (22 agosto 2012): 65–76. http://dx.doi.org/10.12723/mjs.23.5.
Sæther, Sigve Hortemo, Jan Arne Telle e Martin Vatshelle. "Solving #SAT and MAXSAT by Dynamic Programming". Journal of Artificial Intelligence Research 54 (9 settembre 2015): 59–82. http://dx.doi.org/10.1613/jair.4831.
Rajeshwari, T., e C. Thangamani. "Attack Impact Discovery and Recovery with Dynamic Bayesian Networks". Asian Journal of Computer Science and Technology 8, S1 (5 febbraio 2019): 74–79. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1953.
Hu, Chenao, e Xuefeng Yan. "Dynamic Trilateral Game Model for Attack Graph Security Game". IOP Conference Series: Materials Science and Engineering 790 (7 aprile 2020): 012112. http://dx.doi.org/10.1088/1757-899x/790/1/012112.
Lv, Huiying, Yuan Zhang e Jie Wang. "Network Threat Identification and Analysis Based on a State Transition Graph". Cybernetics and Information Technologies 13, Special-Issue (1 dicembre 2013): 51–61. http://dx.doi.org/10.2478/cait-2013-0037.
Gao, Xiang, Xue Qin Xu e Min Wang. "Evaluating Network Security Based on Attack Graph". Advanced Materials Research 756-759 (settembre 2013): 2374–78. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2374.
Lee, Dongjin, Juho Lee e Kijung Shin. "Spear and Shield: Adversarial Attacks and Defense Methods for Model-Based Link Prediction on Continuous-Time Dynamic Graphs". Proceedings of the AAAI Conference on Artificial Intelligence 38, n. 12 (24 marzo 2024): 13374–82. http://dx.doi.org/10.1609/aaai.v38i12.29239.
Boudermine, Antoine, Rida Khatoun e Jean-Henri Choyer. "Dynamic logic-based attack graph for risk assessment in complex computer systems". Computer Networks 228 (giugno 2023): 109730. http://dx.doi.org/10.1016/j.comnet.2023.109730.
Guo, Mingyu, Max Ward, Aneta Neumann, Frank Neumann e Hung Nguyen. "Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs". Proceedings of the AAAI Conference on Artificial Intelligence 37, n. 5 (26 giugno 2023): 5649–56. http://dx.doi.org/10.1609/aaai.v37i5.25701.
Kavallieratos, Georgios, Nabin Chowdhury, Sokratis Katsikas, Vasileios Gkioulos e Stephen Wolthusen. "Threat Analysis for Smart Homes". Future Internet 11, n. 10 (25 settembre 2019): 207. http://dx.doi.org/10.3390/fi11100207.
Bopche, Ghanshyam S., e Babu M. Mehtre. "Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks". Computers & Security 64 (gennaio 2017): 16–43. http://dx.doi.org/10.1016/j.cose.2016.09.010.
Alwasel, Bader, Abdulaziz Aldribi, Mohammed Alreshoodi, Ibrahim S. Alsukayti e Mohammed Alsuhaibani. "Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection". Applied Sciences 13, n. 13 (30 giugno 2023): 7774. http://dx.doi.org/10.3390/app13137774.
Wan, Shanshan, e Ying Liu. "A security detection approach based on autonomy-oriented user sensor in social recommendation network". International Journal of Distributed Sensor Networks 18, n. 3 (marzo 2022): 155013292210824. http://dx.doi.org/10.1177/15501329221082415.
Shahpasand, Maryam, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani e Hoda Ghavamipoor. "A comprehensive security control selection model for inter-dependent organizational assets structure". Information & Computer Security 23, n. 2 (8 giugno 2015): 218–42. http://dx.doi.org/10.1108/ics-12-2013-0090.
Sen, Saurabh Kumar, e Anuradha Deolase. "Analyse Cyberattack at Organizations using Logistic Regression Algorithm". International Journal for Research in Applied Science and Engineering Technology 10, n. 3 (31 marzo 2022): 518–25. http://dx.doi.org/10.22214/ijraset.2022.40663.
Kholidy, Hisham A. "Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method". Sensors 22, n. 1 (21 dicembre 2021): 9. http://dx.doi.org/10.3390/s22010009.
Kim, Jiyeon, e Hyong S. Kim. "Intrusion Detection Based on Spatiotemporal Characterization of Cyberattacks". Electronics 9, n. 3 (9 marzo 2020): 460. http://dx.doi.org/10.3390/electronics9030460.
Gao, Yazhuo, Guomin Zhang e Changyou Xing. "A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction". Security and Communication Networks 2021 (21 ottobre 2021): 1–15. http://dx.doi.org/10.1155/2021/6378218.
Hu, Hao, Hongqi Zhang, Yuling Liu e Yongwei Wang. "Quantitative Method for Network Security Situation Based on Attack Prediction". Security and Communication Networks 2017 (2017): 1–19. http://dx.doi.org/10.1155/2017/3407642.
Qiang, Weizhong, Shizhen Wang, Hai Jin e Jiangying Zhong. "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS". Security and Communication Networks 2018 (17 ottobre 2018): 1–11. http://dx.doi.org/10.1155/2018/3130652.
Qin, Zhi-Quan, Hong-Zuo Xu, Xing-Kong Ma e Yong-Jun Wang. "Interaction Context-Aware Network Behavior Anomaly Detection for Discovering Unknown Attacks". Security and Communication Networks 2022 (11 aprile 2022): 1–24. http://dx.doi.org/10.1155/2022/3595304.
Turnip, Togu Novriansyah, William Suarez Lumbantobing, David Christian Sitorus e Friska Laurenzia Sianturi. "Software Watermarking Dinamis dengan Algoritme Collberg-Thomborson Dan Parent Pointer Graf pada Aplikasi Android". Jurnal Teknologi Informasi dan Ilmu Komputer 8, n. 4 (22 luglio 2021): 831. http://dx.doi.org/10.25126/jtiik.2021844500.
Wang, Chundong, Zheli Liu e Tong Zhao. "An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm". International Journal of Information and Computer Security 12, n. 4 (2020): 397. http://dx.doi.org/10.1504/ijics.2020.10028756.
Wang, Chundong, Tong Zhao e Zheli Liu. "An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm". International Journal of Information and Computer Security 12, n. 4 (2020): 397. http://dx.doi.org/10.1504/ijics.2020.107448.
Song, Xuyan, Chen Chen, Baojiang Cui e Junsong Fu. "Malicious JavaScript Detection Based on Bidirectional LSTM Model". Applied Sciences 10, n. 10 (16 maggio 2020): 3440. http://dx.doi.org/10.3390/app10103440.
Heigl, Michael, Enrico Weigelt, Andreas Urmann, Dalibor Fiala e Martin Schramm. "Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data". Electronics 10, n. 17 (4 settembre 2021): 2160. http://dx.doi.org/10.3390/electronics10172160.
Craandijk, Dennis, e Floris Bex. "Enforcement Heuristics for Argumentation with Deep Reinforcement Learning". Proceedings of the AAAI Conference on Artificial Intelligence 36, n. 5 (28 giugno 2022): 5573–81. http://dx.doi.org/10.1609/aaai.v36i5.20497.
Xu, Hanyi, Guozhen Cheng, Xiaohan Yang, Wenyan Liu, Dacheng Zhou e Wei Guo. "Multi-Dimensional Moving Target Defense Method Based on Adaptive Simulated Annealing Genetic Algorithm". Electronics 13, n. 3 (24 gennaio 2024): 487. http://dx.doi.org/10.3390/electronics13030487.
Аверьянов, В. С., e И. Н. Карцан. "ASSESSMENT OF THE SECURITY OF CYBER-PHYSICAL SYSTEMS BASED ON A GENERAL GRAPH". Южно-Сибирский научный вестник, n. 1(41) (28 febbraio 2022): 30–35. http://dx.doi.org/10.25699/sssb.2022.41.1.013.
Ustun, Taha Selim, e Saqib Ayyubi. "Automated Network Topology Extraction Based on Graph Theory for Distributed Microgrid Protection in Dynamic Power Systems". Electronics 8, n. 6 (10 giugno 2019): 655. http://dx.doi.org/10.3390/electronics8060655.
Zhang, Quan, Chijin Zhou, Yiwen Xu, Zijing Yin, Mingzhe Wang, Zhuo Su, Chengnian Sun, Yu Jiang e Jiaguang Sun. "Building Dynamic System Call Sandbox with Partial Order Analysis". Proceedings of the ACM on Programming Languages 7, OOPSLA2 (16 ottobre 2023): 1253–80. http://dx.doi.org/10.1145/3622842.
Inibhunu, Catherine, e Scott Langevin. "Adaptive Visualization of Complex Networks with FocalPoint". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, n. 1 (settembre 2016): 233–37. http://dx.doi.org/10.1177/1541931213601052.
Cheng, Xiao Han, Shan Ming Luo, Xue Feng Chang e Dan Xie. "Numerical Analysis of an External Flow-Field around a Formula SAE Car Body Based on FLUENT". Advanced Materials Research 1039 (ottobre 2014): 17–24. http://dx.doi.org/10.4028/www.scientific.net/amr.1039.17.
Mannarini, Gianandrea, Mario Leonardo Salinas, Lorenzo Carelli, Nicola Petacco e Josip Orović. "VISIR-2: ship weather routing in Python". Geoscientific Model Development 17, n. 10 (24 maggio 2024): 4355–82. http://dx.doi.org/10.5194/gmd-17-4355-2024.
Jayanthi Rao, Et al. "Intelligent Traffic Monitoring System Using Vehicular Ad Hoc Network". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 10 (2 novembre 2023): 629–35. http://dx.doi.org/10.17762/ijritcc.v11i10.8557.
Zhuang, Jun, e Mohammad Al Hasan. "Defending Graph Convolutional Networks against Dynamic Graph Perturbations via Bayesian Self-Supervision". Proceedings of the AAAI Conference on Artificial Intelligence 36, n. 4 (28 giugno 2022): 4405–13. http://dx.doi.org/10.1609/aaai.v36i4.20362.
Onyshchenko, Svitlana, Alina Yanko, Alina Hlushko e Polina Sabelnikova. "Assessment of information protection level against unauthorized access". ScienceRise, n. 2 (30 aprile 2023): 36–44. http://dx.doi.org/10.21303/2313-8416.2023.003211.
Manoharan, J. Samuel. "Design of an Intelligent Approach on Capsule Networks to Detect Forged Images". September 2021 3, n. 3 (2 ottobre 2021): 205–21. http://dx.doi.org/10.36548/jtcsst.2021.3.004.
Fang, Zhu, e Zhengquan Xu. "Dynamic Random Graph Protection Scheme Based on Chaos and Cryptographic Random Mapping". Information 13, n. 11 (14 novembre 2022): 537. http://dx.doi.org/10.3390/info13110537.
Zhang, Shuqin, Shijie Wang, Guangyao Bai, Minzhi Zhang, Peng Chen, Chunxia Zhao, Shuhan Li e Jiehan Zhou. "Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution". Wireless Communications and Mobile Computing 2022 (16 giugno 2022): 1–16. http://dx.doi.org/10.1155/2022/2323228.
Kalinin, Maxim, Evgenii Zavadskii e Alexey Busygin. "A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure". Sensors 23, n. 21 (26 ottobre 2023): 8724. http://dx.doi.org/10.3390/s23218724.
Nguyen, Thanh H., Mason Wright, Michael P. Wellman e Satinder Singh. "Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis". Security and Communication Networks 2018 (13 dicembre 2018): 1–28. http://dx.doi.org/10.1155/2018/2864873.
Wei, Zhuangkun, Liang Wang, Schyler Chengyao Sun, Bin Li e Weisi Guo. "Graph Layer Security: Encrypting Information via Common Networked Physics". Sensors 22, n. 10 (23 maggio 2022): 3951. http://dx.doi.org/10.3390/s22103951.
Poolsappasit, N., R. Dewri e I. Ray. "Dynamic Security Risk Management Using Bayesian Attack Graphs". IEEE Transactions on Dependable and Secure Computing 9, n. 1 (gennaio 2012): 61–74. http://dx.doi.org/10.1109/tdsc.2011.34.
Catal, Cagatay, Hakan Gunduz e Alper Ozcan. "Malware Detection Based on Graph Attention Networks for Intelligent Transportation Systems". Electronics 10, n. 20 (18 ottobre 2021): 2534. http://dx.doi.org/10.3390/electronics10202534.
Majeed, Abdul, Safiullah Khan e Seong Oun Hwang. "A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks". Electronics 11, n. 13 (21 giugno 2022): 1931. http://dx.doi.org/10.3390/electronics11131931.
Kang, Qiyu, Kai Zhao, Yang Song, Yihang Xie, Yanan Zhao, Sijie Wang, Rui She e Wee Peng Tay. "Coupling Graph Neural Networks with Fractional Order Continuous Dynamics: A Robustness Study". Proceedings of the AAAI Conference on Artificial Intelligence 38, n. 12 (24 marzo 2024): 13049–58. http://dx.doi.org/10.1609/aaai.v38i12.29203.
Dharmalingam, Jeya Mala, e M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks". International Journal of Intelligent Information Technologies 14, n. 3 (luglio 2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.
Li, Yicai, e Lin Shi. "Building Security Mechanisms for Cross-Border Business Customer Data Analysis Based on Smart Computing". Mathematical Problems in Engineering 2022 (22 marzo 2022): 1–10. http://dx.doi.org/10.1155/2022/9017267.